Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe

Overview

General Information

Sample name:SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
Analysis ID:1477394
MD5:c0d645827131ac1166dbe06d45511323
SHA1:1dfa4d4a7ad6817f3d774ecf1fea7b6730f6cbac
SHA256:3b0dc5d40dc74076656f303aa3652910d44ac2cf6492a4a405c6652a4e777714
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to delete services
Contains functionality to detect virtual machines (STR)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Enables debug privileges
Enables driver privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries device information via Setup API
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Spawns drivers
Stores files to the Windows start menu directory
Too many similar processes found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe (PID: 5460 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe" MD5: C0D645827131AC1166DBE06D45511323)
    • setx.exe (PID: 8 cmdline: setx /M IDmelonMode access-key MD5: 5B700BC00E451033B2F9EEF349A91D1C)
      • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 2520 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 4180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 1196 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 1928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6908 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 1700 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 1612 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6668 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 2124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6864 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 1184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6836 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 1432 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 5180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6552 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 5052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 5004 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 3732 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 4476 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 1432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 6552 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" restart AccesskeyService MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 3732 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 6668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 1520 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 5180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • devcon.exe (PID: 3428 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid MD5: 6EA4F64D02AE236A6B60E5E665079A89)
      • conhost.exe (PID: 5180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • devcon.exe (PID: 2424 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhid MD5: 6EA4F64D02AE236A6B60E5E665079A89)
      • conhost.exe (PID: 5904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • devcon.exe (PID: 3732 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid MD5: 6EA4F64D02AE236A6B60E5E665079A89)
      • conhost.exe (PID: 3428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7600 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7652 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7720 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7776 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7824 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7896 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Description "IDmelon Accesskey reader service which is responsible for reading Accesskey IDs" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nssm.exe (PID: 7952 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdoutCreationDisposition 4 MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
      • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • nssm.exe (PID: 1928 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" MD5: 17DE7869B1B721B3FFF9DBE111CAAFF8)
    • conhost.exe (PID: 5164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Service.exe (PID: 5064 cmdline: "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" MD5: 9E99F6F2DC43830D3959E55EDDDDB422)
      • conhost.exe (PID: 6904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • dsregcmd.exe (PID: 7148 cmdline: "C:\Windows\System32\dsregcmd.exe" /status MD5: 866989AA656CF67780143376C12DF510)
  • svchost.exe (PID: 7236 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • drvinst.exe (PID: 7268 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\accesskeyfidovhid.inf" "9" "4196477d7" "0000000000000168" "WinSta0\Default" "0000000000000100" "208" "c:\program files (x86)\idmelon\accesskey\driver" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 7416 cmdline: DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "0000000000000168" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 7552 cmdline: DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • WUDFRd.sys (PID: 4 cmdline: MD5: 0B7A5464602DA68DA6BEFC2A1B5BE4C5)
  • mshidumdf.sys (PID: 4 cmdline: MD5: 9E90FE6DF363D2427A5C773120E7B27D)
  • WUDFHost.exe (PID: 7484 cmdline: "C:\Windows\System32\WUDFHost.exe" -HostGUID:{193a1820-d9ac-4997-8c55-be817523f6aa} -IoEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-3ba73f07-7082-44ba-ac25-62d6a3756b80 -SystemEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-0c2aa50f-a6b5-49c5-8b4d-5aa353434dea -IoCancelEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-d4f7a26f-e897-4801-9374-f1c601e77e78 -NonStateChangingEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-ec48fbad-1509-4711-bef9-62c3b1e095c0 -LifetimeId:a4533485-4f57-41b2-936a-ec5cac55ccfb -DeviceGroupId:WudfDefaultDevicePool -HostArg:0 MD5: 00E2EF3D2C9309CA4135195A049CC79C)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\drivers\WUDFRd.sys, NewProcessName: C:\Windows\System32\drivers\WUDFRd.sys, OriginalFileName: C:\Windows\System32\drivers\WUDFRd.sys, ParentCommandLine: , ParentImage: , ParentProcessId: -1, ProcessCommandLine: , ProcessId: 4, ProcessName: WUDFRd.sys
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, ProcessId: 7236, ProcessName: svchost.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeReversingLabs: Detection: 15%
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeVirustotal: Detection: 6%Perma Link
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 34.214.245.150:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdbSHA256 source: Service.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr
Source: Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdbSHA256 source: Service.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmp
Source: Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdbSHA256 source: System.Text.Encodings.Web.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdb source: GrpcClients.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb62P2 B2_CorDllMainmscoree.dll source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\IDmelonVirtualHidAPI\obj\Release\IDmelonVirtualHidAPI.pdb source: Service.exe, 00000021.00000002.3601729165.0000019D3B2C2000.00000002.00000001.01000000.00000014.sdmp, IDmelonVirtualHidAPI.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\ServerApi\obj\Release\ServerApi.pdb source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdbSHA256 source: Service.exe, 00000021.00000002.3602128842.0000019D3B382000.00000002.00000001.01000000.0000001A.sdmp, DeviceId.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdbg_ source: Service.exe, 00000021.00000002.3604875434.0000019D3C292000.00000002.00000001.01000000.00000025.sdmp, DB.dll.0.dr
Source: Binary string: T:\altsrc\github\grpc\workspace_csharp_ext_windows_x64\cmake\build\x64\grpc_csharp_ext.pdb source: Service.exe, 00000021.00000002.3618132699.00007FFDF63BA000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256 source: Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdb source: Service.exe, 00000021.00000002.3604875434.0000019D3C292000.00000002.00000001.01000000.00000025.sdmp, DB.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\AccesskeyCli\obj\Release\AccesskeyCli.pdb_ source: AccesskeyCli.exe.0.dr
Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Buffers\netfx\System.Buffers.pdb source: System.Buffers.dll.0.dr
Source: Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdbSHA256n source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.dr
Source: Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb source: EllipticCurve.dll.0.dr
Source: Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdb source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.Numerics.Vectors/net46\System.Numerics.Vectors.pdb source: System.Numerics.Vectors.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256N source: Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp
Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: Service.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Threading.Tasks.Extensions.dll.0.dr
Source: Binary string: C:\xcode\envar test\envar release3\Contrib\EnVar\Release Unicode\EnVar.pdbEnvironmentSystem\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment3System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironmentNULLSystem\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment6System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment033NULL40165056461116063415160path646System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment06HKCUHKLMHKLM134NULL134160 source: EnVar.dll.0.dr
Source: Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb~y source: EllipticCurve.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcProtoCompiler\obj\Release\TagReaderGRPC.pdb source: Service.exe, 00000021.00000002.3601894777.0000019D3B2F2000.00000002.00000001.01000000.00000017.sdmp, TagReaderGRPC.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\arm\e_sqlite3.pdb source: e_sqlite3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmp
Source: Binary string: c:\dev\sqlite\core\sqlite3.pdb source: sqlite3.dll0.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdbSHA256w#NtW source: SocketIO.Serializer.Core.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Logger\obj\Release\Logger.pdb source: Service.exe, 00000021.00000002.3599331221.0000019D22A92000.00000002.00000001.01000000.00000013.sdmp, Logger.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdb source: Service.exe, 00000021.00000002.3604346724.0000019D3BB52000.00000002.00000001.01000000.00000022.sdmp
Source: Binary string: C:\Program Files (x86)\Jenkins\workspace\pcProxAPI-sdk-release-bot\pcProxAPI\runtime\win\x64\Release\USBWejAPI.pdb source: pcProxAPI.dll0.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256CM source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Service\obj\Release\Service.pdb source: Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr
Source: Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdbSHA256 source: Service.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.dr
Source: Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdb source: Service.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmp
Source: Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdb source: Service.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Fido\obj\Release\Fido.pdb source: Service.exe, 00000021.00000002.3604129531.0000019D3BAF2000.00000002.00000001.01000000.00000020.sdmp, Fido.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdb source: Service.exe, 00000021.00000002.3604923669.0000019D3C2A2000.00000002.00000001.01000000.00000026.sdmp, BioKey.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x86\e_sqlite3.pdb source: e_sqlite3.dll1.0.dr
Source: Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb source: websocket-sharp.dll.0.dr
Source: Binary string: devcon.pdb source: devcon.exe, 00000028.00000000.1876422070.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000000.1878914711.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000002.1880845418.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000000.1881554737.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000002.1922841753.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr
Source: Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdb source: SocketIO.Serializer.Core.dll.0.dr
Source: Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdb source: Service.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: devcon.pdbGCTL source: devcon.exe, 00000028.00000000.1876422070.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000000.1878914711.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000002.1880845418.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000000.1881554737.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000002.1922841753.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr
Source: Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb* source: websocket-sharp.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\AccesskeyCli\obj\Release\AccesskeyCli.pdb source: AccesskeyCli.exe.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Encryption\obj\Release\Encryption.pdb source: Service.exe, 00000021.00000002.3601851877.0000019D3B2E2000.00000002.00000001.01000000.00000016.sdmp, Encryption.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdbAF[F MF_CorDllMainmscoree.dll source: GrpcClients.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x64\e_sqlite3.pdb source: Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, e_sqlite3.dll0.0.dr
Source: Binary string: C:\xcode\envar test\envar release3\Contrib\EnVar\Release Unicode\EnVar.pdb source: EnVar.dll.0.dr
Source: Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdb source: Service.exe, 00000021.00000002.3602128842.0000019D3B382000.00000002.00000001.01000000.0000001A.sdmp, DeviceId.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdb source: System.Text.Encodings.Web.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\WindowsDriverDevelopment\virtual_hid_fido\driver\umdf2\AccessKey\x64\Release\AccessKeyFidoVhid.pdb source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, WUDFHost.exe, 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmp, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr
Source: Binary string: C:\Users\Amini\Downloads\WpfToggleSwitchs\WpfToggleSwitch\CSharp\CSharpControls.Wpf\obj\Release\CSharpControls.Wpf.pdb source: CSharpControls.Wpf.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256 source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdbqI source: Service.exe, 00000021.00000002.3604346724.0000019D3BB52000.00000002.00000001.01000000.00000022.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdbo source: Service.exe, 00000021.00000002.3604923669.0000019D3C2A2000.00000002.00000001.01000000.00000026.sdmp, BioKey.dll.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_004068D4 FindFirstFileW,FindClose,0_2_004068D4
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00405C83 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C83
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF6946169C0 GetWindowsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,40_2_00007FF6946169C0
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: skm.idmelon.com
Source: unknownHTTP traffic detected: POST /apis/access-key-cli/v1/apps HTTP/1.1Accept: application/json, text/json, text/x-json, text/javascript, application/xml, text/xmlUser-Agent: RestSharp/110.2.0.0Content-Type: application/jsonHost: skm.idmelon.comContent-Length: 348Expect: 100-continueAccept-Encoding: gzipConnection: Keep-Alive
Source: Grpc.Core.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Grpc.Core.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: Grpc.Core.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Grpc.Core.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: Service.exe, 00000021.00000002.3599633247.0000019D22EA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://idmelon.com
Source: Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.drString found in binary or memory: http://idmelon.com9Failed
Source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: http://idmelon.comoThe
Source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
Source: Service.exe, 00000021.00000002.3601954060.0000019D3B312000.00000002.00000001.01000000.00000018.sdmp, log4net.dll.0.drString found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
Source: Service.exe, 00000021.00000002.3603461570.0000019D3B8FC000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Service.exe, 00000021.00000002.3601327320.0000019D32C23000.00000004.00000800.00020000.00000000.sdmp, Grpc.Core.dll.0.drString found in binary or memory: http://mozilla.org/MPL/2.0/.
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: nssm.exe, nssm.exe, 00000003.00000000.1816759065.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000005.00000002.1821554597.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000007.00000002.1824056715.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000009.00000002.1826504358.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000B.00000000.1827718062.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000D.00000000.1830187905.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000F.00000002.1835388792.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000011.00000000.1835854085.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000013.00000000.1838414436.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000015.00000002.1842863095.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000017.00000002.1845034170.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000019.00000000.1846041093.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001B.00000002.1849679192.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001D.00000000.1850811410.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001F.00000000.1852024276.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000024.00000002.1871928036.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000026.00000000.1873191186.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000038.00000000.1933180702.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000003A.00000002.1937478499.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000003C.00000000.1938257275.0000000140065000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://nssm.cc/
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: Grpc.Core.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: Grpc.Core.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Grpc.Core.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: pcProxAPI.dll0.0.drString found in binary or memory: http://ocsp.sectigo.com0A
Source: AccesskeyCli.exe.0.drString found in binary or memory: http://schemas.fontawesome.io/icons/
Source: Service.exe, 00000021.00000002.3599633247.0000019D22CA5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: Service.exe, 00000021.00000002.3599633247.0000019D22C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Service.exe, 00000021.00000002.3599633247.0000019D22CFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: AccesskeyCli.exe.0.drString found in binary or memory: http://wpfanimatedgif.codeplex.com
Source: Grpc.Core.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000002.2061205840.000000000062F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000003.2060679922.000000000062D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.idmelon.com
Source: sqlite3.dll0.0.drString found in binary or memory: http://www.sqlite.org/copyright.html.
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://aka.ms/binaryformatter
Source: System.Text.Json.dll.0.drString found in binary or memory: https://aka.ms/dotnet-warnings/
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://aka.ms/serializationformat-binary-obsolete
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://authnapi.idmelon.com
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate/?redirectUrl=idmelonpt://login
Source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json
Source: SocketIO.Serializer.Core.dll.0.drString found in binary or memory: https://github.com/doghappy/socket.io-client-csharp
Source: SocketIO.Serializer.Core.dll.0.drString found in binary or memory: https://github.com/doghappy/socket.io-client-csharp&
Source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.drString found in binary or memory: https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
Source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.drString found in binary or memory: https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8
Source: Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e3958
Source: Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39588
Source: Service.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.drString found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f
Source: Service.exe, 00000021.00000002.3602766191.0000019D3B562000.00000002.00000001.01000000.0000001D.sdmp, Service.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.dr, System.Runtime.CompilerServices.Unsafe.dll.0.drString found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f8
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://github.com/dotnet/roslyn/issues/46646
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://github.com/dotnet/roslyn/issues/46646~
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Encodings.Web.dll.0.dr, System.Text.Json.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime/issues/73124.
Source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime8
Source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp, SQLitePCLRaw.core.dll.0.dr, SQLitePCLRaw.batteries_v2.dll.0.drString found in binary or memory: https://github.com/ericsink/SQLitePCL.raw
Source: Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmpString found in binary or memory: https://github.com/ericsink/SQLitePCL.rawH
Source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.drString found in binary or memory: https://github.com/ericsink/SQLitePCL.rawX
Source: Service.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmpString found in binary or memory: https://github.com/grpc/grpc-dotnet.git
Source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.drString found in binary or memory: https://github.com/grpc/grpc.git
Source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.drString found in binary or memory: https://github.com/grpc/grpc.git6
Source: Service.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://github.com/netty/netty/issues/6520.
Source: Service.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://github.com/netty/netty/issues/6520.s
Source: Service.exe, 00000021.00000002.3605079178.0000019D3C2D2000.00000002.00000001.01000000.00000028.sdmpString found in binary or memory: https://github.com/praeclarum/sqlite-net.git
Source: Service.exe, 00000021.00000002.3605079178.0000019D3C2D2000.00000002.00000001.01000000.00000028.sdmpString found in binary or memory: https://github.com/praeclarum/sqlite-net.git7
Source: Service.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmpString found in binary or memory: https://github.com/protocolbuffers/protobuf.git
Source: Service.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.drString found in binary or memory: https://github.com/restsharp/RestSharp.git
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://idmp.idmelon.com
Source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000021.00000002.3599633247.0000019D22C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://idmp.idmelon.com/v2
Source: Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.drString found in binary or memory: https://idmp.idmelon.com/v2/Received
Source: pcProxAPI.dll0.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: pcProxAPI.dll0.0.drString found in binary or memory: https://sectigo.com/CPS0D
Source: Service.exe, 00000021.00000002.3599633247.0000019D22C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skm.idmelon.com
Source: Service.exe, 00000021.00000002.3599633247.0000019D22FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skm.idmelon.com/apis/access-key
Source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000021.00000002.3599633247.0000019D22C01000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v1
Source: Service.exe, 00000021.00000002.3599633247.0000019D22C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v1/apps
Source: Service.exe, 00000021.00000002.3599633247.0000019D22FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skm.idmelon.com/apis/access-key-cli/v18
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://test.authnapi.idmelon.com/apis/access-key-cli/v1
Source: Grpc.Core.dll.0.drString found in binary or memory: https://www.catcert.net/verarrel
Source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, Service.exe.0.dr, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr, accesskey-reader-service.exe.0.dr, AccesskeyCli.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: Service.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://www.googleapis.com/auth/cloud-platform
Source: Service.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://www.googleapis.com/auth/cloud-platformExternalAccountCredentials
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://www.idmelon.com/
Source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://www.idmelon.com/downloads/pairing_tool/setup.exe?v=
Source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://www.idmelon.com/downloads/pairing_tool/version.json
Source: AccesskeyCli.exe.0.drString found in binary or memory: https://www.idmelon.com/pairing-tool/
Source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownHTTPS traffic detected: 34.214.245.150:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_0040573B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040573B
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\wudf.catJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeFile created: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\SETD337.tmpJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeFile created: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\wudf.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\SETD4FC.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\wudf.cat (copy)Jump to dropped file
Source: nssm.exeProcess created: 43
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400133A0 _snwprintf_s,CreateServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,3_2_00000001400133A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00403552 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403552
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\accesskeyfidovhid.inf_amd64_cf0f0293add529ac
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.inf
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\SETDB43.tmp
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\SETDB43.tmp
Source: C:\Windows\System32\drvinst.exeFile deleted: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\SETD4DA.tmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00406DE60_2_00406DE6
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_004075BD0_2_004075BD
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000D2D03_2_000000014000D2D0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400238643_2_0000000140023864
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400104703_2_0000000140010470
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400070A03_2_00000001400070A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140019CB43_2_0000000140019CB4
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400030D03_2_00000001400030D0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000F5003_2_000000014000F500
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140013D103_2_0000000140013D10
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140005D203_2_0000000140005D20
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000DD403_2_000000014000DD40
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400125503_2_0000000140012550
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140022D603_2_0000000140022D60
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014001CDD43_2_000000014001CDD4
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140012E003_2_0000000140012E00
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140008E203_2_0000000140008E20
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140020A2C3_2_0000000140020A2C
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000EE503_2_000000014000EE50
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140021B403_2_0000000140021B40
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140002B503_2_0000000140002B50
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014001ABAC3_2_000000014001ABAC
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014001DBB83_2_000000014001DBB8
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58A20F033_2_00007FFDF58A20F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF582C0E033_2_00007FFDF582C0E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58383B033_2_00007FFDF58383B0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58EA3C033_2_00007FFDF58EA3C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5927D2033_2_00007FFDF5927D20
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58BDC6033_2_00007FFDF58BDC60
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58F1BF033_2_00007FFDF58F1BF0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF584A5E033_2_00007FFDF584A5E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF584057033_2_00007FFDF5840570
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58435D033_2_00007FFDF58435D0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58365C033_2_00007FFDF58365C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58654F033_2_00007FFDF58654F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585050F33_2_00007FFDF585050F
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF584950033_2_00007FFDF5849500
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587853033_2_00007FFDF5878530
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF589652033_2_00007FFDF5896520
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587946033_2_00007FFDF5879460
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58CF46033_2_00007FFDF58CF460
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587D48033_2_00007FFDF587D480
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585248033_2_00007FFDF5852480
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58D24D033_2_00007FFDF58D24D0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF586384033_2_00007FFDF5863840
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585C77033_2_00007FFDF585C770
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58C078033_2_00007FFDF58C0780
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587F7C033_2_00007FFDF587F7C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF583271E33_2_00007FFDF583271E
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF591468033_2_00007FFDF5914680
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587B6D033_2_00007FFDF587B6D0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58206C033_2_00007FFDF58206C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF588A6C033_2_00007FFDF588A6C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587A21033_2_00007FFDF587A210
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF583622033_2_00007FFDF5836220
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF586A25033_2_00007FFDF586A250
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58D724033_2_00007FFDF58D7240
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF592D1A033_2_00007FFDF592D1A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58F20F033_2_00007FFDF58F20F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF586C0E033_2_00007FFDF586C0E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF592708033_2_00007FFDF5927080
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF584D08033_2_00007FFDF584D080
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58760A033_2_00007FFDF58760A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58BB0A033_2_00007FFDF58BB0A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF589F0A033_2_00007FFDF589F0A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58370C033_2_00007FFDF58370C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58263F033_2_00007FFDF58263F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585645033_2_00007FFDF5856450
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF583536033_2_00007FFDF5835360
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58573B033_2_00007FFDF58573B0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58CD3A033_2_00007FFDF58CD3A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF586F3C033_2_00007FFDF586F3C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58893C033_2_00007FFDF58893C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58B02F033_2_00007FFDF58B02F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF591934033_2_00007FFDF5919340
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF588733033_2_00007FFDF5887330
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF589432033_2_00007FFDF5894320
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF581335033_2_00007FFDF5813350
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58C126033_2_00007FFDF58C1260
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58DDDE033_2_00007FFDF58DDDE0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5933DE033_2_00007FFDF5933DE0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5894E3033_2_00007FFDF5894E30
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF593AE5033_2_00007FFDF593AE50
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58C2DB033_2_00007FFDF58C2DB0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58D9DD033_2_00007FFDF58D9DD0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF587ACE033_2_00007FFDF587ACE0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF586BD0033_2_00007FFDF586BD00
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5874CC033_2_00007FFDF5874CC0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF592DFF033_2_00007FFDF592DFF0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF591505033_2_00007FFDF5915050
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58DB05033_2_00007FFDF58DB050
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5866F7033_2_00007FFDF5866F70
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5930F6033_2_00007FFDF5930F60
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5898F9033_2_00007FFDF5898F90
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5822FB033_2_00007FFDF5822FB0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58B5EF033_2_00007FFDF58B5EF0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58CDEF033_2_00007FFDF58CDEF0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58E4F0033_2_00007FFDF58E4F00
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5837EB033_2_00007FFDF5837EB0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5850ED033_2_00007FFDF5850ED0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58E79E033_2_00007FFDF58E79E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5887A2033_2_00007FFDF5887A20
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58B6A2033_2_00007FFDF58B6A20
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF583498033_2_00007FFDF5834980
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF589B98033_2_00007FFDF589B980
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58309C033_2_00007FFDF58309C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF59309B033_2_00007FFDF59309B0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58868F033_2_00007FFDF58868F0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF592191033_2_00007FFDF5921910
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58EA92033_2_00007FFDF58EA920
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF588F86033_2_00007FFDF588F860
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585688033_2_00007FFDF5856880
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF59358B033_2_00007FFDF59358B0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF58718C033_2_00007FFDF58718C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF592EC0033_2_00007FFDF592EC00
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585EC1033_2_00007FFDF585EC10
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5868C0033_2_00007FFDF5868C00
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF583BC2033_2_00007FFDF583BC20
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF585FC4033_2_00007FFDF585FC40
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5828B8033_2_00007FFDF5828B80
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF5861B8033_2_00007FFDF5861B80
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF694611A2040_2_00007FF694611A20
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF69461418040_2_00007FF694614180
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF694615C8040_2_00007FF694615C80
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF694612A0440_2_00007FF694612A04
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE1320103C54_2_00007FFE1320103C
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE132027CC54_2_00007FFE132027CC
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess token adjusted: Load Driver
Source: C:\Windows\System32\svchost.exeProcess token adjusted: Security
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: String function: 00007FFDF58261E0 appears 97 times
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: String function: 00007FFDF5835660 appears 246 times
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: String function: 00007FFDF58C7070 appears 79 times
Source: C:\Windows\System32\WUDFHost.exeCode function: String function: 00007FFE13201768 appears 42 times
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: invalid certificate
Source: unknownDriver loaded: C:\Windows\System32\drivers\WUDFRd.sys
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: AccesskeyCli.exe.0.dr, Constants.csBase64 encoded string: 'ICBfX18gX19fXyAgICAgICAgICAgICAgICAgXyAgICAgICAgICAgICAgICAgIF8gICAgICAgICAgICAgICAgICAgICAgICAgXyAgICAgICAgICAgICAgCiB8XyBffCAgXyBcIF8gX18gX19fICAgX19ffCB8IF9fXyAgXyBfXyAgICAgIC8gXCAgIF9fXyBfX18gX19fICBfX18gX19ffCB8IF9fX19fIF8gICBfIAogIHwgfHwgfCB8IHwgJ18gYCBfIFwgLyBfIFwgfC8gXyBcfCAnXyBcICAgIC8gXyBcIC8gX18vIF9fLyBfIFwvIF9fLyBfX3wgfC8gLyBfIFwgfCB8IHwKICB8IHx8IHxffCB8IHwgfCB8IHwgfCAgX18vIHwgKF8pIHwgfCB8IHwgIC8gX19fIFwgKF98IChffCAgX18vXF9fIFxfXyBcICAgPCAgX18vIHxffCB8CiB8X19ffF9fX18vfF98IHxffCB8X3xcX19ffF98XF9fXy98X3wgfF98IC9fLyAgIFxfXF9fX1xfX19cX19ffHxfX18vX19fL198XF9cX19ffFxfXywgfAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8X19fLyA='
Source: classification engineClassification label: mal52.evad.winEXE@101/120@1/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00403552 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403552
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000A810 GetCurrentThread,OpenThreadToken,GetLastError,ImpersonateSelf,GetCurrentThread,OpenThreadToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,3_2_000000014000A810
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF6946111C4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,InitiateSystemShutdownExW,40_2_00007FF6946111C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_004049E7 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049E7
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: _snwprintf_s,CreateServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,3_2_00000001400133A0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000ACB0 CreateToolhelp32Snapshot,GetLastError,GetLastError,CloseHandle,PostThreadMessageW,Thread32Next,PostThreadMessageW,Thread32Next,GetLastError,GetLastError,CloseHandle,3_2_000000014000ACB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140002840 GetUserDefaultLangID,FindResourceExW,GetLastError,FindResourceExW,LoadResource,CreateDialogIndirectParamW,3_2_0000000140002840
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140012160 _snwprintf_s,GetProcessHeap,HeapAlloc,ChangeServiceConfigW,GetProcessHeap,HeapFree,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,ChangeServiceConfig2W,GetLastError,3_2_0000000140012160
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000A2E0 _snwprintf_s,PathQuoteSpacesW,GetModuleFileNameW,GetModuleFileNameW,PathQuoteSpacesW,TlsAlloc,GetStdHandle,StartServiceCtrlDispatcherW,GetLastError,3_2_000000014000A2E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelonJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IDmelonJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3428:120:WilError_03
Source: C:\Windows\System32\drvinst.exeMutant created: \BaseNamedObjects\DrvInst.exe_mutex_{5B10AC83-4F13-4fde-8C0B-B85681BA8D73}
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1928:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7608:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1184:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4180:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5180:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6864:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6360:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7728:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5164:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
Source: C:\Windows\System32\WUDFHost.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2124:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6668:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6928:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1520:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1432:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6528:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5052:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Local\Temp\nsu9AB0.tmpJump to behavior
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: sqlite3.dll0.0.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: sqlite3.dll0.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: sqlite3.dll0.0.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
Source: sqlite3.dll0.0.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: sqlite3.dll0.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: sqlite3.dll0.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, sqlite3.dll0.0.dr, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: sqlite3.dll0.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: Service.exe, Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, e_sqlite3.dll.0.dr, e_sqlite3.dll0.0.dr, e_sqlite3.dll1.0.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: sqlite3.dll0.0.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: sqlite3.dll0.0.drBinary or memory string: CREATE TABLE xx( name STRING, /* Name of table or index */ path INTEGER, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype STRING, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeReversingLabs: Detection: 15%
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeVirustotal: Detection: 6%
Source: devcon.exeString found in binary or memory: ng of the list. When the subcommand completes, the cursor is positioned on the newly-added filter. + Add after
Source: devcon.exeString found in binary or memory: positioned on the newly-added filter. ! Deletes the next occurrence of the specified filter. When the subcommand
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-key
Source: C:\Windows\SysWOW64\setx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhid
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\accesskeyfidovhid.inf" "9" "4196477d7" "0000000000000168" "WinSta0\Default" "0000000000000100" "208" "c:\program files (x86)\idmelon\accesskey\driver"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "0000000000000168"
Source: unknownProcess created: C:\Windows\System32\WUDFHost.exe "C:\Windows\System32\WUDFHost.exe" -HostGUID:{193a1820-d9ac-4997-8c55-be817523f6aa} -IoEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-3ba73f07-7082-44ba-ac25-62d6a3756b80 -SystemEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-0c2aa50f-a6b5-49c5-8b4d-5aa353434dea -IoCancelEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-d4f7a26f-e897-4801-9374-f1c601e77e78 -NonStateChangingEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-ec48fbad-1509-4711-bef9-62c3b1e095c0 -LifetimeId:a4533485-4f57-41b2-936a-ec5cac55ccfb -DeviceGroupId:WudfDefaultDevicePool -HostArg:0
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000"
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Description "IDmelon Accesskey reader service which is responsible for reading Accesskey IDs"
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdoutCreationDisposition 4
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-keyJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_STARTJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Description "IDmelon Accesskey reader service which is responsible for reading Accesskey IDs"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdoutCreationDisposition 4Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" Jump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\accesskeyfidovhid.inf" "9" "4196477d7" "0000000000000168" "WinSta0\Default" "0000000000000100" "208" "c:\program files (x86)\idmelon\accesskey\driver"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "0000000000000168"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000"
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\setx.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: mscoree.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: version.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: windows.storage.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: wldp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: profapi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ncrypt.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ntasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ncrypt.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ntasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ncryptprov.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: iphlpapi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: dnsapi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: dhcpcsvc6.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: winnsi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: wbemcomn.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: amsi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: sspicli.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: rasapi32.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: rasman.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: rtutils.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: mswsock.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: winhttp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: rasadhlp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: fwpuclnt.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: secur32.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: schannel.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: mskeyprotect.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: ncryptsslp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: dsreg.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: winhttp.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: wininet.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: userenv.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: secur32.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: wkscli.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: netutils.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: profapi.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: cryptngc.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: devobj.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: winsta.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\dsregcmd.exeSection loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: devobj.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: devobj.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: devobj.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: newdev.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\svchost.exeSection loaded: umpnpmgr.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: devobj.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: devobj.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: wudfplatform.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WUDFHost.exeSection loaded: wudfx02000.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
Source: C:\Windows\System32\drvinst.exeSection loaded: devobj.dll
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeSection loaded: cryptbase.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile written: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\ioSpecial.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic file information: File size 32784232 > 1048576
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdbSHA256 source: Service.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr
Source: Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdbSHA256 source: Service.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmp
Source: Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdbSHA256 source: System.Text.Encodings.Web.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdb source: GrpcClients.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb62P2 B2_CorDllMainmscoree.dll source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\IDmelonVirtualHidAPI\obj\Release\IDmelonVirtualHidAPI.pdb source: Service.exe, 00000021.00000002.3601729165.0000019D3B2C2000.00000002.00000001.01000000.00000014.sdmp, IDmelonVirtualHidAPI.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\ServerApi\obj\Release\ServerApi.pdb source: Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp
Source: Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdbSHA256 source: Service.exe, 00000021.00000002.3602128842.0000019D3B382000.00000002.00000001.01000000.0000001A.sdmp, DeviceId.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdbg_ source: Service.exe, 00000021.00000002.3604875434.0000019D3C292000.00000002.00000001.01000000.00000025.sdmp, DB.dll.0.dr
Source: Binary string: T:\altsrc\github\grpc\workspace_csharp_ext_windows_x64\cmake\build\x64\grpc_csharp_ext.pdb source: Service.exe, 00000021.00000002.3618132699.00007FFDF63BA000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256 source: Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\DB\obj\Release\DB.pdb source: Service.exe, 00000021.00000002.3604875434.0000019D3C292000.00000002.00000001.01000000.00000025.sdmp, DB.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\AccesskeyCli\obj\Release\AccesskeyCli.pdb_ source: AccesskeyCli.exe.0.dr
Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Buffers\netfx\System.Buffers.pdb source: System.Buffers.dll.0.dr
Source: Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdbSHA256n source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.dr
Source: Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb source: EllipticCurve.dll.0.dr
Source: Binary string: /var/local/git/grpc/src/csharp/Grpc.Core/obj/Release/net45/Grpc.Core.pdb source: Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.Numerics.Vectors/net46\System.Numerics.Vectors.pdb source: System.Numerics.Vectors.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256N source: Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp
Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: Service.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Threading.Tasks.Extensions.dll.0.dr
Source: Binary string: C:\xcode\envar test\envar release3\Contrib\EnVar\Release Unicode\EnVar.pdbEnvironmentSystem\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment3System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironmentNULLSystem\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment6System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment033NULL40165056461116063415160path646System\CurrentControlSet\Control\Session Manager\EnvironmentEnvironment06HKCUHKLMHKLM134NULL134160 source: EnVar.dll.0.dr
Source: Binary string: C:\Users\Jafar\source\repos\EllipticCurve\EllipticCurve\obj\Release\EllipticCurve.pdb~y source: EllipticCurve.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcProtoCompiler\obj\Release\TagReaderGRPC.pdb source: Service.exe, 00000021.00000002.3601894777.0000019D3B2F2000.00000002.00000001.01000000.00000017.sdmp, TagReaderGRPC.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\arm\e_sqlite3.pdb source: e_sqlite3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netfx\System.Memory.pdb source: Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmp
Source: Binary string: c:\dev\sqlite\core\sqlite3.pdb source: sqlite3.dll0.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdbSHA256w#NtW source: SocketIO.Serializer.Core.dll.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, SQLitePCLRaw.batteries_v2.dll.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Service.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Logger\obj\Release\Logger.pdb source: Service.exe, 00000021.00000002.3599331221.0000019D22A92000.00000002.00000001.01000000.00000013.sdmp, Logger.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdb source: Service.exe, 00000021.00000002.3604346724.0000019D3BB52000.00000002.00000001.01000000.00000022.sdmp
Source: Binary string: C:\Program Files (x86)\Jenkins\workspace\pcProxAPI-sdk-release-bot\pcProxAPI\runtime\win\x64\Release\USBWejAPI.pdb source: pcProxAPI.dll0.0.dr
Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256CM source: Service.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Service\obj\Release\Service.pdb source: Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr
Source: Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdbSHA256 source: Service.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.dr
Source: Binary string: /_/csharp/src/Google.Protobuf/obj/Release/net45/Google.Protobuf.pdb source: Service.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmp
Source: Binary string: /home/runner/work/RestSharp/RestSharp/src/RestSharp/obj/Release/net471/RestSharp.pdb source: Service.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Fido\obj\Release\Fido.pdb source: Service.exe, 00000021.00000002.3604129531.0000019D3BAF2000.00000002.00000001.01000000.00000020.sdmp, Fido.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdb source: Service.exe, 00000021.00000002.3604923669.0000019D3C2A2000.00000002.00000001.01000000.00000026.sdmp, BioKey.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x86\e_sqlite3.pdb source: e_sqlite3.dll1.0.dr
Source: Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb source: websocket-sharp.dll.0.dr
Source: Binary string: devcon.pdb source: devcon.exe, 00000028.00000000.1876422070.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000000.1878914711.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000002.1880845418.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000000.1881554737.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000002.1922841753.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr
Source: Binary string: /home/vsts/work/1/s/src/SocketIO.Serializer.Core/obj/Release/netstandard2.0/SocketIO.Serializer.Core.pdb source: SocketIO.Serializer.Core.dll.0.dr
Source: Binary string: /_/src/Grpc.Core.Api/obj/Release/net462/Grpc.Core.Api.pdb source: Service.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmp
Source: Binary string: devcon.pdbGCTL source: devcon.exe, 00000028.00000000.1876422070.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000000.1878914711.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002A.00000002.1880845418.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000000.1881554737.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe, 0000002C.00000002.1922841753.00007FF694618000.00000002.00000001.01000000.0000000B.sdmp, devcon.exe.0.dr
Source: Binary string: C:\projects\websocket-sharp\websocket-sharp\obj\Release\net45\websocket-sharp.pdb* source: websocket-sharp.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\AccesskeyCli\obj\Release\AccesskeyCli.pdb source: AccesskeyCli.exe.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Encryption\obj\Release\Encryption.pdb source: Service.exe, 00000021.00000002.3601851877.0000019D3B2E2000.00000002.00000001.01000000.00000016.sdmp, Encryption.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\GrpcClients\obj\Release\GrpcClients.pdbAF[F MF_CorDllMainmscoree.dll source: GrpcClients.dll.0.dr
Source: Binary string: C:\Users\eric\dev\cb\bld\bin\e_sqlite3\win\v142\plain\x64\e_sqlite3.pdb source: Service.exe, 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmp, e_sqlite3.dll0.0.dr
Source: Binary string: C:\xcode\envar test\envar release3\Contrib\EnVar\Release Unicode\EnVar.pdb source: EnVar.dll.0.dr
Source: Binary string: /_/src/DeviceId/obj/Release/net40/DeviceId.pdb source: Service.exe, 00000021.00000002.3602128842.0000019D3B382000.00000002.00000001.01000000.0000001A.sdmp, DeviceId.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdb source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Encodings.Web/Release/net462/System.Text.Encodings.Web.pdb source: System.Text.Encodings.Web.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\WindowsDriverDevelopment\virtual_hid_fido\driver\umdf2\AccessKey\x64\Release\AccessKeyFidoVhid.pdb source: devcon.exe, 0000002C.00000003.1919797893.000001F54C460000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1897657026.000001BA8BF0A000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000002F.00000003.1900629553.000001BA8BFA9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000032.00000003.1917580068.00000255722D8000.00000004.00000020.00020000.00000000.sdmp, WUDFHost.exe, 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmp, SETD2F6.tmp.44.dr, AccessKeyFidoVhid.dll.0.dr, SETDB43.tmp.50.dr
Source: Binary string: C:\Users\Amini\Downloads\WpfToggleSwitchs\WpfToggleSwitch\CSharp\CSharpControls.Wpf\obj\Release\CSharpControls.Wpf.pdb source: CSharpControls.Wpf.dll.0.dr
Source: Binary string: E:\A\_work\39\s\corefx\bin/obj/AnyOS.AnyCPU.Release/System.ValueTuple/net47\System.ValueTuple.pdb source: Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr
Source: Binary string: /_/artifacts/obj/System.Text.Json/Release/net462/System.Text.Json.pdbSHA256 source: Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.dr
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\Suprema\obj\Release\Suprema.pdbqI source: Service.exe, 00000021.00000002.3604346724.0000019D3BB52000.00000002.00000001.01000000.00000022.sdmp
Source: Binary string: C:\Users\Public\Documents\Work\accesskey\src\BioKey\obj\Release\BioKey.pdbo source: Service.exe, 00000021.00000002.3604923669.0000019D3C2A2000.00000002.00000001.01000000.00000026.sdmp, BioKey.dll.0.dr

Data Obfuscation

barindex
Source: CBOR.dll.0.dr, PropertyMap.cs.Net Code: TypeToObject
Source: BioKey.dll.0.drStatic PE information: 0xC929BB55 [Fri Dec 11 23:35:49 2076 UTC]
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140023A88 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0000000140023A88
Source: nsExec.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xc1ae
Source: uninstall.exe.0.drStatic PE information: real checksum: 0x1f4c237 should be: 0x2fdc9
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x67cd
Source: EnVar.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xe868
Source: BioKey.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x159d8
Source: CSharpControls.Wpf.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1746d
Source: InstallOptions.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x8314
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_00000001400055DB push rcx; iretd 3_2_00000001400055DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\CBOR.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\EllipticCurve.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x86.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\DB.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\URIUtility.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Buffers.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\x64\sqlite3.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Encodings.Web.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\x86\sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x86\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\64\pcProxAPI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\AccessKeyFidoVhid.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\WebKeyLocalServiceDotNetx64.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\GrpcClients.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.SystemTextJson.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\websocket-sharp.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\32\pcProxAPI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dllJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeFile created: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\SETD2F6.tmpJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeFile created: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\SETDB43.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\InstallOptions.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x64.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\EnVar.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Numerics.Vectors.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFScanner.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\FontAwesome.WPF.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-arm\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFMatcher.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\CommandLine.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIOClient.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Microsoft.Bcl.AsyncInterfaces.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\WpfAnimatedGif.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\CSharpControls.Wpf.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\Numbers.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x64\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\SETD4DA.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\SETDB43.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\UMDF\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\SETD4DA.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\NSSMJump to behavior
Source: C:\Windows\System32\drvinst.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WUDFRd
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IDmelonJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IDmelon\Accesskey.lnkJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IDmelon\Uninstall Accesskey.lnkJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IDmelon\Accesskey Website.lnkJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000A2E0 _snwprintf_s,PathQuoteSpacesW,GetModuleFileNameW,GetModuleFileNameW,PathQuoteSpacesW,TlsAlloc,GetStdHandle,StartServiceCtrlDispatcherW,GetLastError,3_2_000000014000A2E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\setx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\setx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WUDFHost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WUDFHost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeMemory allocated: 19D226C0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeMemory allocated: 19D3AC00000 memory reserve | memory write watch
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF588B9FA str word ptr [rax-75h]33_2_00007FFDF588B9FA
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: OpenServiceW,GetServiceDisplayNameW,GetServiceKeyNameW,GetLastError,GetLastError,EnumServicesStatusExW,GetLastError,GetProcessHeap,HeapAlloc,EnumServicesStatusExW,GetLastError,GetProcessHeap,HeapFree,GetLastError,_snwprintf_s,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_000000014000EE50
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: EnumServicesStatusExW,GetLastError,GetLastError,GetProcessHeap,HeapAlloc,EnumServicesStatusExW,GetLastError,_snwprintf_s,GetProcessHeap,HeapFree,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_0000000140011A80
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF6946115E8 GetLastError,SetupDiGetDeviceRegistryPropertyW,40_2_00007FF6946115E8
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeThread delayed: delay time: 268435455
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeWindow / User API: threadDelayed 1366
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeWindow / User API: threadDelayed 4571
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeWindow / User API: threadDelayed 3947
Source: C:\Windows\System32\WUDFHost.exeWindow / User API: threadDelayed 553
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CBOR.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\EllipticCurve.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x86.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\DB.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\URIUtility.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\drivers\UMDF\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Buffers.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\x64\sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Encodings.Web.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\x86\sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x86\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\64\pcProxAPI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Driver\AccessKeyFidoVhid.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\WebKeyLocalServiceDotNetx64.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\GrpcClients.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.SystemTextJson.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\websocket-sharp.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\32\pcProxAPI.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dllJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\AccessKeyFidoVhid.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\SETD2F6.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\drivers\UMDF\SETDB43.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\InstallOptions.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x64.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\EnVar.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Numerics.Vectors.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFScanner.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\FontAwesome.WPF.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-arm\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFMatcher.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CommandLine.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIOClient.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Microsoft.Bcl.AsyncInterfaces.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\WpfAnimatedGif.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\CSharpControls.Wpf.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\Numbers.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\runtimes\win-x64\native\e_sqlite3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Core.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeDropped PE file which has not been started: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\SETD4DA.tmpJump to dropped file
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-14909
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeAPI coverage: 4.3 %
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeAPI coverage: 7.3 %
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe TID: 1524Thread sleep time: -16602069666338586s >= -30000s
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe TID: 1524Thread sleep time: -268435455s >= -30000s
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe TID: 2132Thread sleep count: 1366 > 30
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe TID: 2132Thread sleep count: 4571 > 30
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe TID: 1524Thread sleep count: 3947 > 30
Source: C:\Windows\System32\WUDFHost.exe TID: 7520Thread sleep count: 44 > 30
Source: C:\Windows\System32\WUDFHost.exe TID: 7524Thread sleep count: 553 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WUDFHost.exeLast function: Thread delayed
Source: C:\Windows\System32\WUDFHost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_004068D4 FindFirstFileW,FindClose,0_2_004068D4
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00405C83 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C83
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF6946169C0 GetWindowsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,40_2_00007FF6946169C0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF59235E0 GetSystemInfo,33_2_00007FFDF59235E0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeThread delayed: delay time: 268435455
Source: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeBinary or memory string: qeMuI
Source: dsregcmd.exe, 00000023.00000003.1867281988.0000026B5F3E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: Service.exe, 00000021.00000002.3602321373.0000019D3B43A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Grpc.Core.dll.0.drBinary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeAPI call chain: ExitProcess graph end nodegraph_0-3399
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeAPI call chain: ExitProcess graph end nodegraph_3-14911
Source: C:\Windows\System32\drivers\WUDFRd.sysSystem information queried: ModuleInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140018800 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000140018800
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE13201450 SleepEx,CreateNamedPipeW,swprintf,OutputDebugStringA,swprintf,OutputDebugStringA,ConnectNamedPipe,GetLastError,swprintf,OutputDebugStringA,WriteFile,SleepEx,ReadFile,FindCloseChangeNotification,ReleaseMutex,WaitForSingleObject,WriteFile,PeekNamedPipe,CloseHandle,ReleaseMutex,54_2_00007FFE13201450
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140023A88 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0000000140023A88
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140002530 GetUserDefaultLangID,FormatMessageW,FormatMessageW,GetProcessHeap,HeapAlloc,_snwprintf_s,3_2_0000000140002530
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess token adjusted: Debug
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140018800 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000140018800
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140023D20 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000140023D20
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140020180 SetUnhandledExceptionFilter,3_2_0000000140020180
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014001B6C4 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000000014001B6C4
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF59444B0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00007FFDF59444B0
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeCode function: 33_2_00007FFDF593F728 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_00007FFDF593F728
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF694617130 SetUnhandledExceptionFilter,40_2_00007FF694617130
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF694616F14 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_00007FF694616F14
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE132046C8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,54_2_00007FFE132046C8
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE13204110 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,54_2_00007FFE13204110
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeMemory allocated: page read and write | page guard
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000A180 GetProcessHeap,HeapAlloc,GetCommandLineW,_snwprintf_s,ShellExecuteExW,GetProcessHeap,HeapFree,3_2_000000014000A180
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\SysWOW64\setx.exe setx /M IDmelonMode access-keyJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_STARTJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe "C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Description "IDmelon Accesskey reader service which is responsible for reading Accesskey IDs"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdoutCreationDisposition 4Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeProcess created: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe" Jump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeProcess created: C:\Windows\System32\dsregcmd.exe "C:\Windows\System32\dsregcmd.exe" /status
Source: unknownProcess created: C:\Windows\System32\WUDFHost.exe "c:\windows\system32\wudfhost.exe" -hostguid:{193a1820-d9ac-4997-8c55-be817523f6aa} -ioeventportname:\umdfcommunicationports\wudf\hostprocess-3ba73f07-7082-44ba-ac25-62d6a3756b80 -systemeventportname:\umdfcommunicationports\wudf\hostprocess-0c2aa50f-a6b5-49c5-8b4d-5aa353434dea -iocanceleventportname:\umdfcommunicationports\wudf\hostprocess-d4f7a26f-e897-4801-9374-f1c601e77e78 -nonstatechangingeventportname:\umdfcommunicationports\wudf\hostprocess-ec48fbad-1509-4711-bef9-62c3b1e095c0 -lifetimeid:a4533485-4f57-41b2-936a-ec5cac55ccfb -devicegroupid:wudfdefaultdevicepool -hostarg:0
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_000000014000A050 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,3_2_000000014000A050
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: GetLocaleInfoA,3_2_00000001400245E8
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeCode function: 40_2_00007FF6946115E8 GetLastError,SetupDiGetDeviceRegistryPropertyW,40_2_00007FF6946115E8
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Service.exe VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Logger.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\log4net.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Fido.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\DB.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.RuntimeInformation\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.InteropServices.RuntimeInformation.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dll VolumeInformation
Source: C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exeQueries volume information: C:\Program Files (x86)\IDmelon\Accesskey\Driver\wudf.cat VolumeInformation
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{91c75525-544b-8a4b-be9a-be815d4f29fa}\wudf.cat VolumeInformation
Source: C:\Windows\System32\WUDFHost.exeCode function: 54_2_00007FFE13201450 SleepEx,CreateNamedPipeW,swprintf,OutputDebugStringA,swprintf,OutputDebugStringA,ConnectNamedPipe,GetLastError,swprintf,OutputDebugStringA,WriteFile,SleepEx,ReadFile,FindCloseChangeNotification,ReleaseMutex,WaitForSingleObject,WriteFile,PeekNamedPipe,CloseHandle,ReleaseMutex,54_2_00007FFE13201450
Source: C:\Program Files (x86)\IDmelon\Accesskey\nssm.exeCode function: 3_2_0000000140008480 GetSystemTime,CreateFileW,GetFileInformationByHandle,SystemTimeToFileTime,CloseHandle,SystemTimeToFileTime,CompareFileTime,GetLastError,SystemTimeToFileTime,FileTimeToSystemTime,CopyFileW,Sleep,SetFilePointer,SetEndOfFile,CloseHandle,MoveFileW,GetLastError,3_2_0000000140008480
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeCode function: 0_2_00403552 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403552
Source: C:\Program Files (x86)\IDmelon\Accesskey\Service.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
2
LSASS Driver
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
1
DLL Side-Loading
2
LSASS Driver
1
Deobfuscate/Decode Files or Information
LSASS Memory1
System Service Discovery
Remote Desktop Protocol1
Clipboard Data
2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts12
Service Execution
33
Windows Service
1
DLL Side-Loading
21
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
Software Packing
NTDS37
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script33
Windows Service
1
Timestomp
LSA Secrets2
Query Registry
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
Process Injection
1
DLL Side-Loading
Cached Domain Credentials31
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
Registry Run Keys / Startup Folder
1
File Deletion
DCSync41
Virtualization/Sandbox Evasion
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job32
Masquerading
Proc Filesystem1
Process Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt41
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow1
Application Window Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd12
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1477394 Sample: SecuriteInfo.com.PUA.Tool.I... Startdate: 21/07/2024 Architecture: WINDOWS Score: 52 75 skm.idmelon.com 2->75 77 k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com 2->77 83 Multi AV Scanner detection for submitted file 2->83 85 .NET source code contains potential unpacker 2->85 8 SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe 9 158 2->8         started        11 svchost.exe 2->11         started        13 nssm.exe 2 2->13         started        15 3 other processes 2->15 signatures3 process4 file5 67 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->67 dropped 69 C:\Users\user\AppData\Local\...\System.dll, PE32 8->69 dropped 71 C:\Users\user\AppData\...\InstallOptions.dll, PE32 8->71 dropped 73 63 other files (none is malicious) 8->73 dropped 17 devcon.exe 8->17         started        20 nssm.exe 1 8->20         started        22 nssm.exe 1 8->22         started        35 24 other processes 8->35 24 drvinst.exe 11->24         started        26 drvinst.exe 11->26         started        28 drvinst.exe 11->28         started        30 Service.exe 13->30         started        33 conhost.exe 13->33         started        process6 dnsIp7 55 C:\Users\user\AppData\Local\...\SETD2F6.tmp, PE32+ 17->55 dropped 57 C:\Users\...\AccessKeyFidoVhid.dll (copy), PE32+ 17->57 dropped 37 conhost.exe 17->37         started        39 conhost.exe 20->39         started        41 conhost.exe 22->41         started        59 C:\Windows\System32\...\SETD4DA.tmp, PE32+ 24->59 dropped 61 C:\Windows\...\AccessKeyFidoVhid.dll (copy), PE32+ 24->61 dropped 63 C:\Windows\System32\drivers\...\SETDB43.tmp, PE32+ 26->63 dropped 65 C:\Windows\...\AccessKeyFidoVhid.dll (copy), PE32+ 26->65 dropped 79 8.8.8.8 GOOGLEUS United States 30->79 81 k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com 34.214.245.150, 443, 49732 AMAZON-02US United States 30->81 43 conhost.exe 30->43         started        45 dsregcmd.exe 30->45         started        47 conhost.exe 35->47         started        49 conhost.exe 35->49         started        51 conhost.exe 35->51         started        53 21 other processes 35->53 file8 process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe16%ReversingLabs
SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe7%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exe0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\BioKey.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFMatcher.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\BioMini.UFScanner.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\CBOR.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\CSharpControls.Wpf.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\CommandLine.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\DB.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\DeviceId.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Driver\AccessKeyFidoVhid.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\EllipticCurve.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Encryption.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Fido.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\FontAwesome.WPF.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Google.Protobuf.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.Api.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Grpc.Core.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\GrpcClients.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\IDmelonVirtualHidAPI.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Logger.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Microsoft.Bcl.AsyncInterfaces.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Newtonsoft.Json.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Numbers.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\RestSharp.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SQLite-net.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.batteries_v2.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.core.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SQLitePCLRaw.provider.dynamic_cdecl.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\ServerApi.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Service.exe0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Core.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.Core.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SocketIO.Serializer.SystemTextJson.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\SocketIOClient.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\Suprema.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Buffers.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Memory.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Numerics.Vectors.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Runtime.CompilerServices.Unsafe.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Encodings.Web.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Text.Json.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.Threading.Tasks.Extensions.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\System.ValueTuple.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\TagReaderGRPC.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\URIUtility.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\WebKeyLocalServiceDotNetx64.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\WpfAnimatedGif.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\32\pcProxAPI.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\pcprox\lib\pcproxapi\64\pcProxAPI.dll0%ReversingLabs
C:\Program Files (x86)\IDmelon\Accesskey\grpc_csharp_ext.x64.dll0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com0%VirustotalBrowse
skm.idmelon.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://mozilla.org/MPL/2.0/.0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://www.sqlite.org/copyright.html.0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://james.newtonking.com/projects/json0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://www.newtonsoft.com/jsonschema0%URL Reputationsafe
https://www.nuget.org/packages/Newtonsoft.Json.Bson0%URL Reputationsafe
https://skm.idmelon.com0%VirustotalBrowse
https://github.com/dotnet/runtime80%VirustotalBrowse
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f80%VirustotalBrowse
https://skm.idmelon.com/apis/access-key-cli/v181%VirustotalBrowse
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate0%VirustotalBrowse
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f80%Avira URL Cloudsafe
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate0%Avira URL Cloudsafe
https://github.com/dotnet/runtime80%Avira URL Cloudsafe
https://skm.idmelon.com/apis/access-key-cli/v180%Avira URL Cloudsafe
https://skm.idmelon.com0%Avira URL Cloudsafe
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%Avira URL Cloudsafe
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%VirustotalBrowse
https://idmp.idmelon.com/v20%Avira URL Cloudsafe
https://idmp.idmelon.com/v20%VirustotalBrowse
https://github.com/restsharp/RestSharp.git0%Avira URL Cloudsafe
https://idmp.idmelon.com/v2/Received0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf0%Avira URL Cloudsafe
https://skm.idmelon.com/apis/access-key0%Avira URL Cloudsafe
https://github.com/dotnet/runtime0%Avira URL Cloudsafe
https://github.com/protocolbuffers/protobuf.git0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf0%VirustotalBrowse
https://github.com/restsharp/RestSharp.git0%VirustotalBrowse
https://aka.ms/dotnet-warnings/0%Avira URL Cloudsafe
https://idmp.idmelon.com/v2/Received0%VirustotalBrowse
https://idmp.idmelon.com0%Avira URL Cloudsafe
https://aka.ms/dotnet-warnings/0%VirustotalBrowse
http://idmelon.com9Failed0%Avira URL Cloudsafe
https://github.com/protocolbuffers/protobuf.git0%VirustotalBrowse
https://aka.ms/serializationformat-binary-obsolete0%Avira URL Cloudsafe
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate/?redirectUrl=idmelonpt://login0%Avira URL Cloudsafe
https://github.com/dotnet/runtime0%VirustotalBrowse
https://sectigo.com/CPS0D0%Avira URL Cloudsafe
https://aka.ms/binaryformatter0%Avira URL Cloudsafe
https://aka.ms/serializationformat-binary-obsolete0%VirustotalBrowse
http://schemas.fontawesome.io/icons/0%Avira URL Cloudsafe
https://idmp.idmelon.com0%VirustotalBrowse
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e395880%Avira URL Cloudsafe
https://sectigo.com/CPS0D0%VirustotalBrowse
http://wpfanimatedgif.codeplex.com0%Avira URL Cloudsafe
https://github.com/netty/netty/issues/6520.s0%Avira URL Cloudsafe
https://github.com/JamesNK/Newtonsoft.Json0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e395880%VirustotalBrowse
https://github.com/doghappy/socket.io-client-csharp&0%Avira URL Cloudsafe
https://aka.ms/binaryformatter0%VirustotalBrowse
https://www.idmelon.com/0%Avira URL Cloudsafe
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate/?redirectUrl=idmelonpt://login0%VirustotalBrowse
https://github.com/doghappy/socket.io-client-csharp&0%VirustotalBrowse
https://github.com/netty/netty/issues/6520.s0%VirustotalBrowse
http://schemas.fontawesome.io/icons/0%VirustotalBrowse
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39580%Avira URL Cloudsafe
https://github.com/grpc/grpc.git60%Avira URL Cloudsafe
http://nssm.cc/0%Avira URL Cloudsafe
https://authnapi.idmelon.com0%Avira URL Cloudsafe
http://wpfanimatedgif.codeplex.com1%VirustotalBrowse
https://github.com/grpc/grpc.git60%VirustotalBrowse
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f0%Avira URL Cloudsafe
https://github.com/dotnet/roslyn/issues/46646~0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f0%VirustotalBrowse
https://github.com/JamesNK/Newtonsoft.Json0%VirustotalBrowse
https://github.com/ericsink/SQLitePCL.rawX0%Avira URL Cloudsafe
https://github.com/netty/netty/issues/6520.0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39580%VirustotalBrowse
https://authnapi.idmelon.com0%VirustotalBrowse
https://github.com/dotnet/runtime/issues/73124.0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf80%Avira URL Cloudsafe
https://github.com/ericsink/SQLitePCL.rawX0%VirustotalBrowse
https://www.idmelon.com/0%VirustotalBrowse
https://github.com/grpc/grpc.git0%Avira URL Cloudsafe
https://github.com/dotnet/roslyn/issues/46646~0%VirustotalBrowse
https://github.com/netty/netty/issues/6520.0%VirustotalBrowse
http://nssm.cc/0%VirustotalBrowse
https://github.com/dotnet/runtime/issues/73124.0%VirustotalBrowse
https://skm.idmelon.com/apis/access-key-cli/v1/apps0%Avira URL Cloudsafe
https://www.idmelon.com/downloads/pairing_tool/version.json0%Avira URL Cloudsafe
http://idmelon.comoThe0%Avira URL Cloudsafe
http://idmelon.com0%Avira URL Cloudsafe
https://github.com/grpc/grpc.git0%VirustotalBrowse
https://test.authnapi.idmelon.com/apis/access-key-cli/v10%Avira URL Cloudsafe
https://github.com/ericsink/SQLitePCL.rawH0%Avira URL Cloudsafe
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf80%VirustotalBrowse
https://github.com/dotnet/roslyn/issues/466460%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com
34.214.245.150
truefalseunknown
skm.idmelon.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://skm.idmelon.com/apis/access-key-cli/v1/appsfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f8Service.exe, 00000021.00000002.3602766191.0000019D3B562000.00000002.00000001.01000000.0000001D.sdmp, Service.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.dr, System.Runtime.CompilerServices.Unsafe.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/runtime8Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://skm.idmelon.comService.exe, 00000021.00000002.3599633247.0000019D22C43000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://skm.idmelon.com/apis/access-key-cli/v18Service.exe, 00000021.00000002.3599633247.0000019D22FC8000.00000004.00000800.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticateAccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLogService.exe, 00000021.00000002.3601954060.0000019D3B312000.00000002.00000001.01000000.00000018.sdmp, log4net.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://idmp.idmelon.com/v2Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000021.00000002.3599633247.0000019D22C01000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/restsharp/RestSharp.gitService.exe, 00000021.00000002.3602187574.0000019D3B3C2000.00000002.00000001.01000000.0000001B.sdmp, RestSharp.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbfService.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://idmp.idmelon.com/v2/ReceivedService.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://skm.idmelon.com/apis/access-keyService.exe, 00000021.00000002.3599633247.0000019D22FC8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/protocolbuffers/protobuf.gitService.exe, 00000021.00000002.3604634725.0000019D3BBE2000.00000002.00000001.01000000.00000024.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://mozilla.org/MPL/2.0/.Service.exe, 00000021.00000002.3603461570.0000019D3B8FC000.00000004.00000020.00020000.00000000.sdmp, Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Service.exe, 00000021.00000002.3601327320.0000019D32C23000.00000004.00000800.00020000.00000000.sdmp, Grpc.Core.dll.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/dotnet/runtimeService.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Encodings.Web.dll.0.dr, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-warnings/System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://idmp.idmelon.comAccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://idmelon.com9FailedService.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
https://aka.ms/serializationformat-binary-obsoleteService.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://authnapi.idmelon.com/auth/adminiStrator/delegatedAuthenticate/?redirectUrl=idmelonpt://loginAccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0DpcProxAPI.dll0.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/binaryformatterService.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://schemas.fontawesome.io/icons/AccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e39588Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameService.exe, 00000021.00000002.3599633247.0000019D22C43000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://wpfanimatedgif.codeplex.comAccesskeyCli.exe.0.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/netty/netty/issues/6520.sService.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.sqlite.org/copyright.html.sqlite3.dll0.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/JamesNK/Newtonsoft.JsonService.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/doghappy/socket.io-client-csharp&SocketIO.Serializer.Core.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
https://www.idmelon.com/AccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/corefx/tree/32b491939fbd125f304031c35038b1e14b4e3958Service.exe, 00000021.00000002.3604231776.0000019D3BB22000.00000002.00000001.01000000.00000021.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/grpc/grpc.git6Service.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
http://schemas.xmlsoap.org/soap/encoding/Service.exe, 00000021.00000002.3599633247.0000019D22CA5000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://nssm.cc/nssm.exe, nssm.exe, 00000003.00000000.1816759065.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000005.00000002.1821554597.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000007.00000002.1824056715.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000009.00000002.1826504358.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000B.00000000.1827718062.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000D.00000000.1830187905.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000000F.00000002.1835388792.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000011.00000000.1835854085.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000013.00000000.1838414436.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000015.00000002.1842863095.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000017.00000002.1845034170.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000019.00000000.1846041093.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001B.00000002.1849679192.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001D.00000000.1850811410.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000001F.00000000.1852024276.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000024.00000002.1871928036.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000026.00000000.1873191186.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 00000038.00000000.1933180702.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000003A.00000002.1937478499.0000000140065000.00000002.00000001.01000000.00000007.sdmp, nssm.exe, 0000003C.00000000.1938257275.0000000140065000.00000002.00000001.01000000.00000007.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://authnapi.idmelon.comAccesskeyCli.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4fService.exe, 00000021.00000002.3602684343.0000019D3B512000.00000002.00000001.01000000.0000001C.sdmp, System.Buffers.dll.0.dr, System.Threading.Tasks.Extensions.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/roslyn/issues/46646~Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/ericsink/SQLitePCL.rawXService.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, SQLitePCLRaw.core.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/netty/netty/issues/6520.Service.exe, 00000021.00000002.3618132699.00007FFDF623D000.00000002.00000001.01000000.0000000C.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/runtime/issues/73124.Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exefalse
  • URL Reputation: safe
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8Service.exe, 00000021.00000002.3605243399.0000019D3C332000.00000002.00000001.01000000.0000002A.sdmp, System.ValueTuple.dll.0.dr, System.Numerics.Vectors.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/grpc/grpc.gitService.exe, 00000021.00000002.3604421784.0000019D3BB62000.00000002.00000001.01000000.00000023.sdmp, Grpc.Core.dll.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.idmelon.com/downloads/pairing_tool/version.jsonService.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://idmelon.comoTheService.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://idmelon.comService.exe, 00000021.00000002.3599633247.0000019D22EA4000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://james.newtonking.com/projects/jsonService.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpfalse
  • URL Reputation: safe
unknown
https://test.authnapi.idmelon.com/apis/access-key-cli/v1AccesskeyCli.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/ericsink/SQLitePCL.rawHService.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/roslyn/issues/46646Service.exe, 00000021.00000002.3603075194.0000019D3B692000.00000002.00000001.01000000.0000001F.sdmp, System.Text.Json.dll.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/praeclarum/sqlite-net.git7Service.exe, 00000021.00000002.3605079178.0000019D3C2D2000.00000002.00000001.01000000.00000028.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.idmelon.com/downloads/pairing_tool/setup.exe?v=Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tpcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
https://www.catcert.net/verarrelGrpc.Core.dll.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/grpc/grpc-dotnet.gitService.exe, 00000021.00000002.3602077345.0000019D3B362000.00000002.00000001.01000000.00000019.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#pcProxAPI.dll0.0.drfalse
  • URL Reputation: safe
unknown
http://schemas.xmlsoap.org/wsdl/Service.exe, 00000021.00000002.3599633247.0000019D22CFB000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/doghappy/socket.io-client-csharpSocketIO.Serializer.Core.dll.0.drfalse
  • Avira URL Cloud: safe
unknown
https://www.newtonsoft.com/jsonschemaService.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpfalse
  • URL Reputation: safe
unknown
https://skm.idmelon.com/apis/access-key-cli/v1Service.exe, 00000021.00000002.3601786369.0000019D3B2D2000.00000002.00000001.01000000.00000015.sdmp, Service.exe, 00000021.00000002.3599633247.0000019D22C01000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000021.00000000.1852944375.0000019D22292000.00000002.00000001.01000000.00000008.sdmp, Service.exe.0.dr, AccesskeyCli.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.sectigo.com0ApcProxAPI.dll0.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/ericsink/SQLitePCL.rawService.exe, 00000021.00000002.3605184889.0000019D3C312000.00000002.00000001.01000000.00000029.sdmp, Service.exe, 00000021.00000002.3605002329.0000019D3C2C2000.00000002.00000001.01000000.00000027.sdmp, Service.exe, 00000021.00000002.3605293993.0000019D3C352000.00000002.00000001.01000000.0000002B.sdmp, SQLitePCLRaw.core.dll.0.dr, SQLitePCLRaw.batteries_v2.dll.0.drfalse
  • Avira URL Cloud: safe
unknown
https://www.nuget.org/packages/Newtonsoft.Json.BsonService.exe, 00000021.00000002.3602810988.0000019D3B5D2000.00000002.00000001.01000000.0000001E.sdmpfalse
  • URL Reputation: safe
unknown
https://www.idmelon.com/pairing-tool/AccesskeyCli.exe.0.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/praeclarum/sqlite-net.gitService.exe, 00000021.00000002.3605079178.0000019D3C2D2000.00000002.00000001.01000000.00000028.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.idmelon.comSecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000002.2061205840.000000000062F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, 00000000.00000003.2060679922.000000000062D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
8.8.8.8
unknownUnited States
15169GOOGLEUSfalse
34.214.245.150
k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.comUnited States
16509AMAZON-02USfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1477394
Start date and time:2024-07-21 06:34:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 13m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:68
Number of new started drivers analysed:2
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
Detection:MAL
Classification:mal52.evad.winEXE@101/120@1/2
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 95%
  • Number of executed functions: 88
  • Number of non-executed functions: 214
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
TimeTypeDescription
00:35:24API Interceptor10289384x Sleep call for process: Service.exe modified
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.comSecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
  • 54.213.11.204
SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
  • 54.70.179.63
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
AMAZON-02USfile.exeGet hashmaliciousBabadedaBrowse
  • 143.204.215.122
file.exeGet hashmaliciousBabadedaBrowse
  • 143.204.215.18
arm7.elfGet hashmaliciousMiraiBrowse
  • 130.177.187.248
arm5.elfGet hashmaliciousMiraiBrowse
  • 54.171.230.55
https://www.svb.com/learning-central/go/contactGet hashmaliciousUnknownBrowse
  • 18.245.46.101
file.exeGet hashmaliciousBabadedaBrowse
  • 143.204.215.115
file.exeGet hashmaliciousBabadedaBrowse
  • 143.204.215.18
file.exeGet hashmaliciousBabadedaBrowse
  • 143.204.215.115
https://xv-dna-idx-com.resmi-v1.biz.id/Get hashmaliciousUnknownBrowse
  • 18.239.18.5
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
3b5074b1b5d032e5620f69f9f700ff0eMx0UGSI897.exeGet hashmaliciousDCRatBrowse
  • 34.214.245.150
https://xv-dna-idx-com.resmi-v1.biz.id/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
https://help-metaprotectextension.gitbook.io/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
https://bet3659981.com/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
http://madive-bunde-thinkkjhgf.pages.dev/help/contact/728719822901550/Get hashmaliciousHTMLPhisherBrowse
  • 34.214.245.150
http://www.829347219502.com/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
https://helps-org---metamskk.gitbook.io/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
https://vishalyadav30301.github.io/Instagram-login-pageGet hashmaliciousHTMLPhisherBrowse
  • 34.214.245.150
http://help--chomre-metaamsk.gitbook.io/Get hashmaliciousUnknownBrowse
  • 34.214.245.150
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
Category:dropped
Size (bytes):41
Entropy (8bit):4.045980358012783
Encrypted:false
SSDEEP:3:TdRPZCALEZWp3aV:TfZdLZZe
MD5:C1D68091F5550E6D1E8EFD8A74BBAEDD
SHA1:ADE9C2C175686A3A077E496C286EC1361401137F
SHA-256:F4D11E83230D4B84579A1E456A71C020ECA8C8F221B23196AE1B37D8BF3E6B4F
SHA-512:F97D2ACD20028EA2BF1D4F73F555316F1C6D6A69A2CDFADD486254ED76872C96172EA38A2CDAE7B2A0E18E04576205E8FA25DBD2E523A6A3A67076428B6EA4F6
Malicious:false
Preview:.sxdflgkjhngljkhnasdfoplkhngoljwehnfrop
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:MS Windows 95 Internet shortcut text (URL=<http://www.idmelon.com>), ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):48
Entropy (8bit):4.532268229617389
Encrypted:false
SSDEEP:3:HRAbABGQYm/0S4aQLdVv:HRYFVm/r4aezv
MD5:4382924CD029D894827F113225475D20
SHA1:8A962CFB320B887119C03BF4B0A8BB456661632F
SHA-256:41074075E517313974A00A633A82522B481F8AE4B867AF10271985D07995BADE
SHA-512:3B1FD0ECE3554DFA0C3CE82E4B2A6184E4F3982B17DE67EF63B4E670FB288A31E3B3D1ADEA2ADF16726D3C4F914B3D2F46F33C9BE676681634A358B813AB01BA
Malicious:false
Preview:[InternetShortcut]..URL=http://www.idmelon.com..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):228392
Entropy (8bit):5.3227611841816005
Encrypted:false
SSDEEP:1536:jPETvxZODI/y64HbnYLYLBPsM8mb8QsnGU3bsOlI/AZ5lfr/30Qh2RApO+T3QvNa:IvxAR77ELmb8QMGUrsOlEQh2n83QVa
MD5:5C68F548BED2D865DAEEFB1708493351
SHA1:B99B5482BF003EFC9729D3F291E1700A1C268741
SHA-256:809CEAFD55FE53B235DB101586BF5CB5A4CCBC4815175CF0F89C2F228F5EB442
SHA-512:FC7B6A6E46C4FCF7DC55800DF3610B7900CF9FF4EDD7EBCAA696B64BC2DA291669ABF67292890E4555B225261D8CF488037E85E8096F5ECBF77571258B1B7A6A
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ........@.. ..............................E.....`.................................7...O.......L............j..(...............8............................................ ............... ..H............text........ ...................... ..`.rsrc...L...........................@..@.reloc...............h..............@..B................k.......H........z...............a...x...........................................~....*..(....*Vs....(....t.........*..( ...*..{....*"..}....*..( ...*..{....*"..}....*..( ...*..( ...*.r...p.....*6(.....(....&*....0..........r...p(!.......9.......o"....>.......(....9....(....(#.....o$......(%....3.s....%...(....o&...o'...&+4.o$......(%....3.....s....o....+.r...pr"..p...((...&.W.rF..p.()...(*....D..,&...o"....1....i.Y.(....,....i.Y.(....*.-.(#.... . ..(+.....(....*.........m........0..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):2158
Entropy (8bit):5.001906641704252
Encrypted:false
SSDEEP:48:327Yg+mOwg1Sg+CBOg1gg+w3mgDSag+FIsg+w3w:Kkf6YKwDTwg
MD5:0CC816CC5B23BFDF1B3201CFF674DBD1
SHA1:2651C52CAE238FFD27D1D8374EBBE7D7974462AF
SHA-256:FA516EFA039B73FF56E559789A38E74BCC164F65F7B7C56C6FC364D5EAF56A55
SHA-512:A51FE6749E38D2F8D779DB9A075B3A92B98403CD912551347CFC0010A09EDDC46F14E449595508AD1C42373BAE75D8ACD3FC8831CF359D90D9B762797D350E19
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Numerics.Vectors" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.1.4.0" newVersion="4.1.4.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neu
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):28672
Entropy (8bit):4.949607387291885
Encrypted:false
SSDEEP:384:C3HwUZ3sK1F2v1I23ou3wHQp9t66S1DFlrMdOREjeJxxICzZhK/vNX3Y2zI0vUIa:C3sK1/W93wwbO3kcE0d9NN
MD5:18D8F8729A887B835D49D296FE579A85
SHA1:9ED4A1BF1AD5075BFC71746E55979A6444F766AB
SHA-256:21FC933D379AD710F889BC07E921420539E3C96F4FC99BA5AC7175956059485A
SHA-512:A26026885940C246A0C49B56401E2DFEAB7CAED6717C8714CFA840505B8BFB30D1AE84B23E34B86C1A73DABF3C82BE40BCB454770FBE757DCE0D0D6710551B77
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.)..........." ..0..h............... ........... ....................................`.................................G...O.......h...............................8............................................ ............... ..H............text....f... ...h.................. ..`.rsrc...h............j..............@..@.reloc...............n..............@..B................{.......H.......(A...D...........................................................0............s....}......s....}......s....}......s....}......s....}.....(.....s....}.....{......$...%...})....{.....}'....-..{.....}&....{.....}(...+..{.....}&....{.....}(....(....-.r...ps....z..}......}.....s....}.....s....}.....s....}.....s....}....*....0............s....}......s....}......s....}......s....}......s....}.....(......}.....{......$...%...})....{.....}'....-..{.....}&....{.....}(...+..{...
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1439
Entropy (8bit):5.043688272837476
Encrypted:false
SSDEEP:24:JduPF7NruH2/+mVV+TkH2/17zVUrPH2/+CVVXBOH2/17zVQ7uH2/X9y:327Yg+mOwg1Sg+CBOg1SagXw
MD5:92908A348BDC4D9C1F69A8C951BF2137
SHA1:A4ECC68E91EDCF1FB1DA52C4A56CA627D6D71366
SHA-256:4A18461C471A3BFF1139472062BEC545680EB63CAA28588E75BCC54882737B3C
SHA-512:1E27B3AA7A6E284EC92F93A17BC0DD7CD65C8225C224A37BD15366D3B1AF6C2C43BCC76EFE1F49B34599B9AEA83345CBDE4141030E447F4FD310407B1F6A7714
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Numerics.Vectors" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.1.4.0" newVersion="4.1.4.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neu
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):24576
Entropy (8bit):3.2308666869663676
Encrypted:false
SSDEEP:384:kBTJPM/MtwWRGfo6QQFuiwuXAhOKbjo7U:GPwWQfo64l07U
MD5:AB04E46306767BD337068AA8D06FD030
SHA1:A414059F2233666740D04663925F05A9D62FE38F
SHA-256:CA821422D66B5F8F828A33F7FA63D2E3DCF37FFF349486699AF60C9BE3A9A78C
SHA-512:0B8BA392975292FF3739BA8906E3A655C4F096C6AC8A64B025348383BBBD926626734494120226F9D7051C9841EDC5C89934663DCE18B3E3A73FBA4D63A33710
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...dm.d.........." ..0..0... ......"J... ...`....... ....................................@..................................I..O....`..8............................................................................ ............... ..H............text...(*... ...0.................. ..`.rsrc...8....`.......@..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):57344
Entropy (8bit):4.657614516436592
Encrypted:false
SSDEEP:768:gQg4Qrw97g3TGIsPJKop0TDQBIxRSX56GxVgeT:QnkqkOoIDI1Vp
MD5:EA82AE4604A655B2FCDA992EC6214930
SHA1:1CD5636CF38085B28394DC99A1B9AC361B0E8DE5
SHA-256:7F435BD4091FB4544F996DA9C31940F2D1A86388382045D95EA9FBB6DC49F7E4
SHA-512:F94337618B2BBE802981DF10094AE9FF925BDC3F9F9AB55F7E05F931730B228F503B7BF232E1E897A565BEA18FFA1D02CEF9C38C0762CFC086AC26106802D250
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bm.d.........." ..0...... ........... ........... ....................... ......sZ....@.................................<...O.......8............................................................................ ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):192512
Entropy (8bit):5.922763836627469
Encrypted:false
SSDEEP:3072:xdkYH1ptN/+HyzN7HFcix3Y18912gMyCN0W7wPzozc+j+oYQ0kFz8RN:vdQOHFluq8GCcn
MD5:8DEF7E1FC741E9D8CBCE2E8F4D4E11B4
SHA1:85BA62180D7ED3BAA15BD2E4DFDDB3091FF8675E
SHA-256:442ADD0037FF9593C3737F5C77BF77B198AFD5DD3A8DA0714F3C50D990EA733C
SHA-512:199AC50D872069BF915CA15C3EDB55DCAFE5465DB2319DB755572A6C66CC71695AF008EF075B2E3CD8B13F862C0341756F0A488730E3F0E3B0D52BA0A08E22D6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N.a.........." ..0.................. ... ....... .......................`......,M....@.................................P...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H............6...........................................................0..4........-.r...ps!...zs"........i..(....,.r...ps#...z.o$...*.0..:........-.r)..ps!...z....+...(.......X... ..../..+..X...o%...2..*...0..!........-.r...ps!...z../.r1..p..(&...rA..p('...s#...z...i1'r1..p..(&...rc..p..i...(&...((...s#...z../.r...p..(&...rA..p('...s#...z...i1'r...p..(&...rc..p..i...(&...((...s#...z..i.Y./M..E...%.r...p.%...(&....%.r...p.%...i.Y...(&....%.r...p.%...(&....()...s#...zs".....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):30720
Entropy (8bit):5.748915622125059
Encrypted:false
SSDEEP:768:fmUjegUxTULjdDGaP5zAzU48RZWupurud70IRRY4GNRzglX6TL6:m2RDGaP5zAzULKupurud70IvY4GNRzgb
MD5:48BAF45D80E6625E61088522D673F4DE
SHA1:B87C4B3C272EE344AC6A3CFE0F47A8D8FEE49715
SHA-256:B6AD6A470BA086174871F88F33C9B8F45406E99765E56809DAB0806A2C1A17BF
SHA-512:E48662A726558CDB9628C153F53D84F6ECDD71509C50D07076149298BE2F04E8193461DF683768E925A73C6703B265CDC7EA05D81B0E00F9F5F96B6E7C349571
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...I..a.........." ..0..p............... ........... ....................................`.................................\...O...................................$................................................ ............... ..H............text....n... ...p.................. ..`.rsrc................r..............@..@.reloc...............v..............@..B........................H........+..D2...........]..(/..........................................>. 4......(....*2......o....*:........o....*.0..,........o....r...p $...........%...%....o....t....*&...o....*..(....*...u...............q............*..0..2........(......,&.o.....o ...-..o.....(!...,..*..(....*.*...0..N.......~"........#........s#........#........s#........#...... @#........#...... @#........s$..........c ....(%...s&........ .... .... ....(%...s&..........c ....(%...s&........ .... ....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):552
Entropy (8bit):5.06340490227939
Encrypted:false
SSDEEP:12:HW0M+dHJn4FS+MbFEmczXX6FIPqapEyyIcGRN6zqpUF06J3puellQEmsZwnv:HW0MKHz+UbmXqFIPGHINNULxpueQbsq
MD5:561E19225AECC736A141C75ACDF39E96
SHA1:8EB13CD4FC8F25C6076FD16B32A1D24415057176
SHA-256:AA53894994BE24945B4578A5DC29F552787C0F00A70D816014C456DDD3E0EB08
SHA-512:DEC25F23C2F9298FD905E4A984D57E3C3D934352471109CB97D6CA393049C5A44F172E1862C82B326E0C885192EA993C5FEB64F83F1A1335D6EE284ADD09304E
Malicious:false
Preview:.<log4net>...<appender name="file" type="log4net.Appender.RollingFileAppender">....<file value="C:\ProgramData\IDmelon\Accesskey\clientLog.log" />....<appendToFile value="true" />....<rollingStyle value="Size" />....<maxSizeRollBackups value="5" />....<maximumFileSize value="10MB" />....<staticLogFileName value="true" />....<layout type="log4net.Layout.PatternLayout">.....<conversionPattern value="%date %level - %message%newline" />....</layout>...</appender>...<root>....<level value="ALL" />....<appender-ref ref="file" />...</root>..</log4net>
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):225280
Entropy (8bit):6.201066097308408
Encrypted:false
SSDEEP:6144:sG/zAnUPpKO6acJ8Ha+VbR9HGzIuIliUtf:syzAUPMeaIDGcfi
MD5:2F345B6D207489E52DB3F85C2E4E617D
SHA1:D0CD77AA88B8ED0AE5F07A8132EACA857DEA7795
SHA-256:2135B40FA819E58CF1942453E4409BFDEA2BE631077A354B878DE8402BE7E026
SHA-512:24AD3B3620E5E093EA57C1BEC486379853D625DBF962210B2DEB823115A45F9EC4083B6D4BB69610A9DAE4B6076284C11E3663430DB4EA739224E6DE93D88E8D
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0..f............... ........... ...............................d....`.................................b...O.......................................T............................................ ............... ..H............text....e... ...f.................. ..`.rsrc................h..............@..@.reloc...............n..............@..B........................H.......dJ...9............................................................{....*..{/...*V.(0.....}......}/...*...0..A........u........4.,/(1....{.....{....o2...,.(3....{/....{/...o4...*.*.*. a.(. )UU.Z(1....{....o5...X )UU.Z(3....{/...o6...X*...0..b........r...p......%..{.......%q!....!...-.&.+...!...o7....%..{/......%q"...."...-.&.+..."...o7....(8...*..{9...*..{:...*V.(0.....}9.....}:...*.0..A........u#.......4.,/(1....{9....{9...o2...,.(3....{:....{:...o4...*.*.*. ..% )UU.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):18432
Entropy (8bit):5.299901416152227
Encrypted:false
SSDEEP:384:1E44E69TJN6eOuJ0wOs6tx/nQv50DNmfVS6rM/c9:h6dbdwxM0DI9S6rM/c9
MD5:A03CAA1272CEF60DC2B0064FAC645DF9
SHA1:0658FA611454F9A9502DD1B5D37AC588E715B8A8
SHA-256:B976CA18F96DD9BCCF14B33F9832517B966FA2E57CF601BD75C7E8F6DBD175E6
SHA-512:CFA1EE365F4C37C8BC22A748F7EB8D038C9A72EF07FD8A6DC11E1AFA907A58B3E0D268FA4DA49A38C99BD1FCA0DBB12D4656752A92691DDCF3C6EAE1B85091B1
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8..........." ..0..@..........._... ...`....... ....................................`.................................?_..O....`..H............................^..8............................................ ............... ..H............text....?... ...@.................. ..`.rsrc...H....`.......B..............@..@.reloc...............F..............@..B................s_......H.......(....0...........................................................~....{....*.0...........(....o....(....r...p(....}.....(......{.....s....}.....{....o...+&.{....o...+&.{....o...+&.{....o...+&.{....o...+&.{.....o...+&.{.....o...+&.{.....o...+&.{.....o...+&.{.....o...+&*.s.........*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(....*..{....*"..}....*..{....*"..}....*..{....*"..}.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):693
Entropy (8bit):5.1233623193005275
Encrypted:false
SSDEEP:12:MMHdGzNFF7ap+5Xl+Tkf/2/1ZFUSFip+5XlXBorf/2/1ZFUSFicYo4xT:JduPF7NV+TkH2/17zVVXBOH2/17z9y
MD5:75A1EDD6FC9985FBD0D5824D40B58B35
SHA1:C4F6C27B5F34254288A7369B5D28F835F6ECABE8
SHA-256:55DA44B00F8B5B2F9D1AE0C7741E1A55DEFA08BC3033AA22E0D47848D5AA4D4A
SHA-512:8CCFDFC6C769439CD2F741F3C34CEA4A5550DA89D5EB5532EF167E52CD3AACAB8C32E0F41C007A11F93AE967C1A66D4834670CF2FFF6B3E10ED825A414744FF0
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):311
Entropy (8bit):4.791338764275588
Encrypted:false
SSDEEP:6:HW0MvN7dDv/+qpcLrSu0AOMJyNQKmuellozEmsDyEpWKAO:HW0MvFdrHpUF06J3puellQEmsZpNv
MD5:6A3D6D149385B00DE23C87B4B1BFD4F4
SHA1:D4ACA7ABA9ADB086F4FB66888EC1B799CC3F8829
SHA-256:94F3425B94B3ADAB9CC851D1236D44ACAC3D4528BDAA8400FE492F2804A5B096
SHA-512:DA66005E9BD319C6296D1A13014BD409A3F98150B7F627B120FF78B8D13BE8BB157B9C40C5AD0EDD6CCEEA1C38851B4F3A46A061E1713669B2FB61426DB586B3
Malicious:false
Preview:.<log4net>...<appender name="console" type="log4net.Appender.ConsoleAppender">....<layout type="log4net.Layout.PatternLayout">.....<conversionPattern value="%date %level - %message%newline" />....</layout>...</appender>...<root>....<level value="ALL" />....<appender-ref ref="console" />...</root>..</log4net>
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):22528
Entropy (8bit):5.675149624141371
Encrypted:false
SSDEEP:384:QYCdkWmMEJAEUGz0PylRukCA+OYD0vRbqslxEmwlYu2:tCdkWmMQiylQHA+KvRbqslxEmeY5
MD5:AF01286DFD69ABEB06AB1537E374628C
SHA1:10D16C22B588AFE22FF330176200515D0192CE63
SHA-256:3793DCB2D3C25D22577E9B8836FD11C5870BE01B068F2DBF04BEF4F32E6C83E7
SHA-512:29CDD5647D751B459EABBFB60D6F8D404497FE2C8845DD6994A0D1F279CB63E0B4E4CD116C652266AD0BEC90056CCE5D1090C7CF659EBDBDD019C091D9828609
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....)..........." ..0..N..........Rm... ........... ....................................@..................................l..O...................................<l..T............................................ ............... ..H............text...XM... ...N.................. ..`.rsrc................P..............@..@.reloc...............V..............@..B................2m......H......../..0<...................k........................................(....*:.(......}....*..{....*"..}....*..{....*..(.....(....(.....(....s....}....*>.(......o.....*..(....-.r...ps....z.(.....(....o!...*&..o.....*Z.r...p(....sX...o....*Z.r...p(....sX...o....*Z.r...p(,...sX...o....*N.r...p..sb...o....*.0..$.......r...p.o.....,...(........s^...o....*.~....*.~....*.(&...sI...s6........(&...($...s6........*v.(.....s....}.....s....}....*&..}.....*>.{......o.....*.0..........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (console) x86-64, for MS Windows
Category:dropped
Size (bytes):83456
Entropy (8bit):4.915846781735663
Encrypted:false
SSDEEP:1536:q1Hclj1z7qfAHwFj9f5G9RN5CJp+T8Atgwd7Fc5VzGwFMqO7W0:q182fAHwwouT8TOpcLG2M3W
MD5:6EA4F64D02AE236A6B60E5E665079A89
SHA1:DB974A620B2D766E8D0E7FEED4F95C8D5B01F4AB
SHA-256:40AC07FEC5D9204CBB87D52BCE95AAEC67D37233BC3FFD9E9BAF02D0B55AB912
SHA-512:EFC8520CCF8B712479AF23ADC4587FCAF9F8AC6E565F1073C2F97AEF45F7382FCA49E8E1E3A87B98BD66DD69D2CF8C46EE9EFB4B1DBB40DC2747145891BBB411
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........F...'...'...'...L...'...L...'...L...'...L...'...'...'...L...'...L...'...L...'..Rich.'..........PE..d....p..........."......f...........n.........@..........................................`.......... ......................................t...........p...............................T...........................................(................................text....e.......f.................. ..`.rdata... ......."...j..............@..@.data...............................@....pdata..............................@..@.rsrc...p...........................@..@.reloc...............D..............@..B................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:DOS batch file, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):61
Entropy (8bit):4.460399887206969
Encrypted:false
SSDEEP:3:mKDDFAR+SZxvBAKeBeJ+dDDFBRyn:hmRBp2e+PBAn
MD5:BC77DB060E792626050D496B5263979B
SHA1:AC4DC60491EDBFCC9419971618DF44C97E4B2E73
SHA-256:0F87882948A3F4F775CFAF5B2375CBFB9842C4FB85E0660320ED28513CCAB3BF
SHA-512:728DA3F09EA11494F6D80EF964B27D716031F3D7C12F99EA322D36E40DE5AF0293635900190FB810BA50B3B8F19B06DE675260D88FECF36B55B85941B29E2B32
Malicious:false
Preview:@echo off..set args1=%1..devcon.exe disable %args1% && exit..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:DOS batch file, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):60
Entropy (8bit):4.426990803617332
Encrypted:false
SSDEEP:3:mKDDFAR+SZxvBAKeALEHOvdDDFBRyn:hmRBp2+LEHOvPBAn
MD5:7BF5E5460E19DA15BC50E4CB525FFE47
SHA1:253F0562AE28E3E2B3C48EB0FFF58572BEDABC7C
SHA-256:B968760E9B5E613B8D3E7C746F45256D204E71CA2D577EC19911BDF251555D89
SHA-512:5AEB53187279B6621CDEF0A27099FC6960C190F9B7D376AD386E26C398DC7E11C968125A2818AA976BE7A5D7865A6EEFE3C232BE0EA18578FEBE98E8F3D3F905
Malicious:false
Preview:@echo off..set args1=%1..devcon.exe enable %args1% && exit..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):81
Entropy (8bit):4.346542017363296
Encrypted:false
SSDEEP:3:jb6+SZxvWA4SSiheMLVLzAQDn:36BpWRiJLVoQD
MD5:DE964C03675D7068BE42F3F269A40EB9
SHA1:5F49AD4D74AB33FBB571A44A75079FF41A7356D5
SHA-256:EFA52F366577471E8E304663EA30756D0302166059B5CDB95612D68550EB7238
SHA-512:34EB3F7377F795B2CD79C89C0D1C2E20080FFE16E302F6B3E5B1F62E98725467C17800C6D52E05F952141ABDB7D3910DB30E7C1984CF0E8DCC73DA073326C576
Malicious:false
Preview:echo on..set args1=%1..set args2=%2..devcon.exe install %args1% %args2%..echo off
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:DOS batch file, Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF line terminators
Category:dropped
Size (bytes):401
Entropy (8bit):5.091399972357828
Encrypted:false
SSDEEP:6:SmR94BgqrJzkmwPIct0yl/mmFN3tfRGiTy6EGrgyAyxAyI2RTiDhMB5ZBR:J74tdk5jtnrC0yyGyDR+A5J
MD5:5992CF74AF8F737C1BD71D549D1C1065
SHA1:6B38B8077C0D103ABA384C72BC1AEBFB2035D958
SHA-256:BF41D1895CD280B1AEF7F41BA20F53C6D1EFF1FF9B83F8AB6E03299C5C367DF3
SHA-512:F1BF08405256C7818CD027D87F0BB5634B4930139CD0B35DED33640F74EDB0E6D7BEEF714330B5873F1F0A3F585D06A3938E2D7651A26D9F36263C8E24D18191
Malicious:false
Preview:.@echo off..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && %~s0 %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..devcon.exe status root\IDmelonHid && exit
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):58
Entropy (8bit):4.195849477991226
Encrypted:false
SSDEEP:3:jb6+SZxvBAKeXt9PgDn:36Bp2hgD
MD5:1B4BAD54EB85ADB7C4350B331FBA9030
SHA1:DFB39F684097EF2615ECDFBBEA07C61027085FFF
SHA-256:DC525C3758A61AD80DC434023D0A53111BC2F54A1572E169BC5BEBD749CC9A9D
SHA-512:D35E50A69907319525E92FA2B017B7F732E9FEA62B468F374804B488B5242451137480DC1755C02126EA302E95F4DAB6BBE6534B51E375AD6ECE2892C175B05B
Malicious:false
Preview:echo on..set args1=%1..devcon.exe remove %args1%..echo off
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:data
Category:dropped
Size (bytes):11622
Entropy (8bit):7.262321244095951
Encrypted:false
SSDEEP:192:1fMl5zkpJC4eRe4fh8uEwFQbdxUNQlO8X01k9z3AXL9Wa38i:1Xp7Aeo8uExUKlO8R9zGpWa3z
MD5:F99106D82F0FF3A7CEDEF078919DD359
SHA1:C4281154C3B52B32467AB042B460333623033F3B
SHA-256:51FA1FC1D6CBA95C28E0AA3D622DFEBF925548ACB5440CC3CD865ED1DDBCDC9F
SHA-512:8F8DB7AC371C52F7C9622AADE894027B509D5EBD7FB75ED1C8813A7B1A01634EFCD25CEC0B8842E9FCC175550C39F3509A11D036F1247DF0E8E2F4B79E8790FA
Malicious:false
Preview:0.-b..*.H........-S0.-O...1.0...`.H.e......0..k..+.....7.....\0..X0...+.....7........ppwO..<.X.7+..230920084942Z0...+.....7.....0...0.... ..x...h.......+C..T...D.n..f.-1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... ..x...h.......+C..T...D.n..f.-0.....G.i..I7....K3U...1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0.... 2...F.[n.P.6.O.h...3in..=...?..@1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 2...F.[n.P.6.O.h...3in..=...?..@0....:........B~......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):25088
Entropy (8bit):5.301585636569163
Encrypted:false
SSDEEP:768:T/jmOxf+QZMuSOR8jfftu+lp3S/KG06EQ0v:TCOrLS/rk+lpMKG06EPv
MD5:009DACE4EAA81F59E619B6AEF6684B48
SHA1:8EED9304CC7DD14DD9B614B0EBB8464458170F10
SHA-256:9059288BAE4FC8715CA67C98EEB0BECE76BA0CE196189B0FEF7EBE2E4D797CC4
SHA-512:4E914F75C239E305319A75CFF358BB74F1D45694D66D6684AC59DD3B8515C13216E7AF74C6C7156F069666554E5796AF1DF0702A0BF847DD16694B28284630FC
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....hY..........." ..0..Z...........y... ........... ....................................`.................................Vy..O....................................x..8............................................ ............... ..H............text....Z... ...Z.................. ..`.rsrc................\..............@..@.reloc...............`..............@..B.................y......H........A...7............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*.0..T........(......(......(......(.......(..................s&...(.......(.......(.......(....*.0...........o#....j(....-..o#....(.....(....(....(....,..*.o$....j(....-..o$....(.....(....(....(....,..*.o$....(.....o#....(.....(.....o#...(....(.....(....(....(.....(....(h
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):10240
Entropy (8bit):4.906632271878699
Encrypted:false
SSDEEP:192:GXh1+9FT278xgs9XoUPUx2rH2oq3PAU9hj3p991lRSzJEgB:iL+9FT2oxga9LrH2oY93pjRS9VB
MD5:CC88D9CD36AFDB321CA58395A009B170
SHA1:6D1FD46157840493DEA1DB8F7996DE606CD5B404
SHA-256:62FA56823E248D1562EF54B14909A24C177F5A680EA661A2DBD01632D86C367D
SHA-512:63D1C7F408EC8790E81114A3A36AAD0EC977CB2A544BBB34D56E677F3F29CE313358A3C8AE24EFB86601EF4CA18D410C3C20310E7E47060D976FCE51175A5EE6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m.+..........." ..0.. ..........*>... ...@....... ....................................`..................................=..O....@.......................`......4=..8............................................ ............... ..H............text...0.... ... .................. ..`.rsrc........@......."..............@..@.reloc.......`.......&..............@..B.................>......H........(..(.............................................................(....*..{....*.0..O........{....,..{.....o.....+..{.....o.....r...p.{....{....(.....{....{....(....(....*..0............}.....(......}.....{....(....,...{....(....(....}....+Ks....%(....o....%.s....o....% ....s....o....%.o......(.....{.....( ...}......{....s!...}....*...}.....(......}.......(....("...}....*...0...........{....-.r...ps#...zs$..... ....o%.... ....o&.....o'.....{....~....o(....s).......s*.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):28672
Entropy (8bit):5.644125419442534
Encrypted:false
SSDEEP:768:zh/uRqYAXHKZ0DATRtMuVLco/6zeAWhk6xrMNcojEC9R9:zh/VY4YPMuVz/WeQsrMNcojZ7
MD5:A9A0AA1A1D625C3919C79372EF288235
SHA1:87028CD0D275BEDB1771B47FB4BAAF7AE6061BF5
SHA-256:5F5C8A67FF04D3075DA7F5BC863D5D101E27EDE9336D2797179E2C83F1B000F1
SHA-512:9728105C6356269E61AF1058898B6BD918C09A5E6956AF5073543CD4669B44E42F8FF41932C5F71CE9B8A49383FB01E9CFD619911E55828293757A888E053922
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....B..........." ..0..h.............. ........... ....................................`.....................................O.......X...............................8............................................ ............... ..H............text....f... ...h.................. ..`.rsrc...X............j..............@..@.reloc...............n..............@..B.......................H........B..(C...........................................................0..Y........(....,...'...*.o.....[.'.....o.....],.r...ps....z..+....[...o......(.......X...o....2..*....0..M.........i.'........i(......i.Zs.........+.......r...p...'...o....&..X....i2..o....*....0............Y...'.........(.....*..0..$.........i..i...*..+..........*..X....i2..*.0..G.......s......'.....o....s.........+.......r...p...'...o....&..X....i2..o....*..0..*.........'......Y.+.... ...._...c%....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1192
Entropy (8bit):5.059106104983516
Encrypted:false
SSDEEP:24:JduPF7NV+TkH2/17zVUrPH2/+CVVXBOH2/17zVQ7uH2/X9y:327Gwg1Sg+CBOg1SagXw
MD5:332BE3E21BF51019D30F3682034BA4CD
SHA1:B89362ACEAC875258EB616551F97C6BD022A9200
SHA-256:E2CBECB050A6F0296811552F52E238A5A24EFC7F31B156AFBAEF0B90D8F25534
SHA-512:0A91ACF7620C99AE8896F0A2A9120B7081440234A68532054331F4E8CE16A12BC7FE07C12895A37625C6D0C3BDE7D97DBF003273BE906E581E487A402EBD98C0
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f1
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):209408
Entropy (8bit):7.118411209816897
Encrypted:false
SSDEEP:6144:Z8P7/P97ilHDqO01ktQOzB4YjDnX08RYA3fP5S:Z8PpilHD+kQA4uk8RYA3f
MD5:2ACE85429EEE9E8320C82D878E5562B4
SHA1:77ED8B89210930D1DE2495BA363519B696D0B6E2
SHA-256:63D50DBE094BBCE5D7BF8AF08C0D919CFA5E057CA05AE7B27704A8477C8B348F
SHA-512:7CE3467D1469ACDB544F4F42864D94C5AE0ADA252C5F096329E16D4B571FC1800BD572E52CFE902EE5D4B91D59A1A4182B07F40B7A4DFE54E338CA46684AF989
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....nX...........!.....(...........G... ........@.. ....................................@.................................`G..K....`...............................F............................................... ............... ..H............text....'... ...(.................. ..`.rsrc........`.......*..............@..@.reloc...............0..............@..B.................G......H........C..............D1......LC......................................F.~....o.........*..J.~..........o....*..0..E........u....-.*.t.......(....u....-.*..(............~....o...........o....*....0..T.......r...ps....re..ps.........r...p.....(.........(.................s....s....(.........*.0..G.............o....u....%-.&s......o....(...+(...+..,..#........o....+G.o....#........s....o...........o..........#.......?#.......?s....o....s.....s....%#........s....o....% h...ls...
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):461600
Entropy (8bit):6.121892709817012
Encrypted:false
SSDEEP:6144:r4/m8Ea0LJqGVByY/ISDYLh0JPYqe9XMKr0g3pkUtdJAtQLxisgFafDcabBv805E:M+VLJqGVBlASKXMKJLBL0k/
MD5:54AEB9BDBCAA96811DB6D02A620D2229
SHA1:795AB7B578D8DEEE64BFA1AECB50391ABD25B5D7
SHA-256:B628AEE109C1FD016F955C2FE3549EDD5195D86B57A213189A6210C396D00756
SHA-512:D16DE313B944975ECE181D49959EC33806771EB4B6926279628454746E7BD1B1AA8D7243CFC027102518CC679BA980918259789C814D522441578DBFBC5B4F34
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ............" ..0.............^.... ........... .......................@.......N....`.....................................O....................... )... ......4...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................?.......H............Z............................................................(E...*..(E...*..(E...*:.(E.....}....*..{....*:.(E.....}....*..{....*..{....*"..}....*V.(E.....}......}....*..{....*..{....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*....0../...........1.......(F...*...X...+...%.X........X...2.*..0..%...........i.Y.+.................X...Y...2.*..s....*F.(...+(H...(....*:.(I.....}....*.~....*2.|....(J...**.(.......*2.|....(K...*..{....*2.|....(L.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):68896
Entropy (8bit):6.319426362612074
Encrypted:false
SSDEEP:1536:MuuEI8RKXkCKysZ4rGzxViOZWBG+foVswKlOyDYGQeywKeP70xSc:hf5OrGzxUomgVswJyDYGQe/P
MD5:68528BFB3CF84503766EFB6A3921B7A0
SHA1:37FA9BFC4A2031383AC2A1A774EAE21CB2C2A55B
SHA-256:90132B0E9AE73337CC3FD5958DD5380D1742ED4E51EE9B5452EE0D54156879FD
SHA-512:9FF86B04F86CE643BF49E90B928072FC1E44ADA2CBAFF9F446166529F935B23C329D429FCF3B593E9BE62953011D3D2E29CCD15D234AC34E3E621D16168DA510
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...o4.d.........." ..0.................. ........... .......................@............`.....................................O....................... )... ..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......LE..H.............................................................(&...*^.(&......I...%...}....*:.(&.....}....*:.(&.....}....*:.(&.....}....*:.(&.....}....*..{....*V.(&.....}......}....*..{....*..{....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*:...('...(....*..((.....r...p(...+}......r...p(...+}......}....*..{....*..{....*..{....*...}......}......} ......}!......}"...*...}......}......} ......}!.....}"...*..{"...*..0..(........{....u......-..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):485656
Entropy (8bit):6.61009099792126
Encrypted:false
SSDEEP:6144:VrJLcdXl5xFcQyCmnMENW1H/M8f9Z5mNplX4XmRrcMFADwYCuMsligT/Q5MSg:VrJLcd15XafWN/vZ4NLqmRrctb65MB
MD5:6155B91228D88A0CFFF0E8F32942E772
SHA1:B855C00124FF8048DD278F3ADA5A3392576AA5D6
SHA-256:AA99E6AD71C01997C154BE1F0F6E5402266F787422CF67D66C5D59F63D26131F
SHA-512:4E6A0C07C09845072EBE16AA7087B572358800E6FF1691B2A2E6F56C60EBDDB29EB9CDD4412DC78A8B9738E2D14B76B6C72373DBC7CD444B972E6320A818A728
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-.n..........." ..0..8..........BV... ...`....... ....................................`..................................U..O....`...............@...)...........U..T............................................ ............... ..H............text...H6... ...8.................. ..`.rsrc........`.......:..............@..@.reloc...............>..............@..B................$V......H.......t... ?...........K.......T........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*......(....*v...o......o ....o!.....("...*.0..V.........r...p(...+}$.....r...p(...+}%.....}&......r...p(...+}'......rC..p(...+}(......})...*..{$...*..{%...*..{&...*..{'...*..{(...*..{)...*...0...........q........})....*6.s*....o+...*..0..)........s*......o,...~-...~....~/...~0....s1...*....0../........s*......o2....s3...~-...~....~/...~
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):12288
Entropy (8bit):4.9894399990535785
Encrypted:false
SSDEEP:192:6SNau5KGFgn97spCUyTEOehDXh5sy0x0cI:DFTgNfQOe1Xh5sym0T
MD5:E9A35F8D6FC71C5DE125CC864FB66148
SHA1:5E786CD645D8C2114A10E455E1BFD510A5DD8BE5
SHA-256:DBE71AFF3E3B31669FFDAF6CE1ACD433014B818D9AFCD87843E0EA44CD5B894A
SHA-512:324D78FBE5131FB62A5166B2D7FA328B70B8480E7E4A8C5133A9A497BE490056BF971E83A318D3D3556573C371ECA47CF9F12788B6D3A523ECA5066B5B1FF0B3
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....H..........." ..0..(..........nF... ...`....... ....................................`..................................F..O....`..............................tE..8............................................ ............... ..H............text...t&... ...(.................. ..`.rsrc........`.......*..............@..@.reloc..............................@..B................MF......H........*..X..............................................................(......(......(.......(.......(.......(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*....0..p........-..*.u....,........+..*.(......(....(....,B.(......(....(....,..(......(....3..(......(....3..(......(......*.*.0..m....... C... )UU.Z(.....(....o....X )UU.Z(.....(....o....X )UU.Z.(....o....X )UU.Z.(....o....X )UU.Z.(.......(....X*R..........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1430
Entropy (8bit):5.037022201639899
Encrypted:false
SSDEEP:24:JduPF7NUrPH2/+CVQ7uH2/XV0PH2/+w3VV+TkH2/17zVVXBOH2/17z9y:3276g+CSagXsg+w3Owg1BOg1w
MD5:FDC82C11296CA77D3A27DE9A030C06AD
SHA1:B36EFA9C90C46386C8B745D4E865F9A6E40C75DB
SHA-256:8E9E9EB64BF5F7BDAA2D18A19B8E5936640B8F14F3F6B89CDAD3B31A6E2D04D1
SHA-512:60B143C7AC6B21ECB49CED9E826E320A65E95896568A82A5EC78D63A1B6A111C54952E68D9E7A81FAE064F4899D9DF3B354EDF78BE47B567BDDE58057FA2AB39
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Buffers" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.3.0" newVersion="4.0.3.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutr
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):12288
Entropy (8bit):4.6365058468804055
Encrypted:false
SSDEEP:192:SQZuc9daUvdNX3j7vGPYbbegoTnZOZOKzLgrDtd:SQcunfGPYbbegoTnZuWZd
MD5:6BD94B959873B15EE070DB03C910E727
SHA1:9255B0627EDA36B16DCFF2360BA3E79BA07BCC81
SHA-256:94C31663DE6A9F509B9C259FC02FF709FE999EDD8708C98FA63D4F99BF09E696
SHA-512:8156EFFAE8DD6B4DA5CA2F857F42D0FEC5AA97475A4CB2C0918B69A9E1454B144307CACF011F8F9CE05D422466E90D5CB3DE99215BD75FB4A7C0CFD26DB08A0F
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....X............" ..0..(..........BF... ...`....... ....................................`..................................E..O....`..............................8E..8............................................ ............... ..H............text...H&... ...(.................. ..`.rsrc........`.......*..............@..@.reloc..............................@..B................#F......H........(..0............................................................r...p.....*R.{....-.r...p*rM..p*R.{....-.r...p*r...p*R.{....-.r...p*r1..p*R.{....-.r_..p*r...p*R.{....-.r...p*r...p*:.(......}....*.0............@(...+(...+....,*.(....-..(....+..(....& ....(.....(....&..r?..p(.....(....rk..p(....r...p(......(.....s....}......(.....s....}.....{.... ....o....-..{....o....r...p(.......]......r>..p.o....(....(.......>.....{.....o.......r...p.o....(....(.............{.... ..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1192
Entropy (8bit):5.059106104983516
Encrypted:false
SSDEEP:24:JduPF7NV+TkH2/17zVUrPH2/+CVVXBOH2/17zVQ7uH2/X9y:327Gwg1Sg+CBOg1SagXw
MD5:332BE3E21BF51019D30F3682034BA4CD
SHA1:B89362ACEAC875258EB616551F97C6BD022A9200
SHA-256:E2CBECB050A6F0296811552F52E238A5A24EFC7F31B156AFBAEF0B90D8F25534
SHA-512:0A91ACF7620C99AE8896F0A2A9120B7081440234A68532054331F4E8CE16A12BC7FE07C12895A37625C6D0C3BDE7D97DBF003273BE906E581E487A402EBD98C0
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f1
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):90112
Entropy (8bit):5.942626437949717
Encrypted:false
SSDEEP:1536:l/yCHmCh+SXU3b88bGkc07ylVupbY1jht9lEwkfCKcxFQ:JX9kr86Gkc02lVupbyjvdg
MD5:5F0FD20617D7DBF8D5EDDBA30DE47769
SHA1:BA5BD4241D3BBA553A89AB8DF75314B70D1820C1
SHA-256:DDA4728FC38441449EDB924FC35C94808999DA0AD4B1FC07D6FFA1732FDA8418
SHA-512:A9A46D24F8E7F1E447E9741D8D9E4D4A564784F57CE53CA175DA6E21ADD5A860C1535B27248E7402FBB05DCE2C0668964F78C2EB66EABD5FC7B04BF6B2FDE52D
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0..X...........w... ........... ....................................`..................................w..O....................................v..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................w......H....... .................................................................{....*"..}....*>..(......(....*"..s....*..{....*"..}....*......(....*..0..?.......s........}.......(.....,%.{....,...o...........s....(...+(....*"..s....**....s....*R.o.....o......s....*..{....*"..}....*..{!...*"..}!...*..{"...*"..}"...*..{#...*"..}#...*..{$...*"..}$...*..{%...*"..}%...*..{&...*"..}&...*..{'...*"..}'...*..{(...*"..}(...*..{)...*"..})...*...0..................r...p.s....("...*....0......
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1192
Entropy (8bit):5.059106104983516
Encrypted:false
SSDEEP:24:JduPF7NV+TkH2/17zVUrPH2/+CVVXBOH2/17zVQ7uH2/X9y:327Gwg1Sg+CBOg1SagXw
MD5:332BE3E21BF51019D30F3682034BA4CD
SHA1:B89362ACEAC875258EB616551F97C6BD022A9200
SHA-256:E2CBECB050A6F0296811552F52E238A5A24EFC7F31B156AFBAEF0B90D8F25534
SHA-512:0A91ACF7620C99AE8896F0A2A9120B7081440234A68532054331F4E8CE16A12BC7FE07C12895A37625C6D0C3BDE7D97DBF003273BE906E581E487A402EBD98C0
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f1
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):26752
Entropy (8bit):6.512503595653532
Encrypted:false
SSDEEP:768:DulwnBhYlTVv2wK5idcgF4of1n6K9zUYJ:ywHYFtKYdcg/f1nXzUYJ
MD5:970B6E6478AE3AB699F277D77DE0CD19
SHA1:5475CB28998D419B4714343FFA9511FF46322AC2
SHA-256:5DC372A10F345B1F00EC6A8FA1A2CE569F7E5D63E4F1F8631BE367E46BFA34F4
SHA-512:F3AD2088C5D3FCB770C6D8212650EED95507E107A34F9468CA9DB99DEFD8838443A95E0B59A5A6CB65A18EBBC529110C5348513A321B44223F537096C6D7D6E0
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$:............" ..0..4...........S... ...`....... ....................................`..................................S..O....`...............@...(...........R..T............................................ ............... ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............>..............@..B.................S......H........'..P*..................,R........................................(....*..(....*^.(.......1...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....*..(....*..(....*..(....*..(....*:.(......}....*..{....*:.(......}....*..{....*:.(......}....*..{....*..(....*:.(......}....*..{....*^.(.......2...%...}....*:.(......}....*..{....*z.(......}.......2...%...}....*V.(......}......}....*..{....*..{....*:.(......}....*..{....*..{....*"..}....*..{....*"..}....*..{
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):711952
Entropy (8bit):5.967185619483575
Encrypted:false
SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):294912
Entropy (8bit):5.96623908194718
Encrypted:false
SSDEEP:6144:pjRrliK3x0YVUQAMiqzodDwRhSE/Z+j1DnJj1FVtZ//x:JRrliK3x0YVlAMiqzo/JZH
MD5:39D370F850D234CF73DA822A7F2121BD
SHA1:379960EF969DEF2B0A563C829BE3F413B52F49F5
SHA-256:CF57674E763AD6F47F330AD21B2B663616AF053D6C5072540DD99879261FC6D3
SHA-512:17F15A4C972DFE83DF07D321295C7C312D38569FE2DB19B45DF84C11890133B3542924343BB5B2838ADB2CEE1FEA47B3D214B6EA4C5801DF02B30C947F7E9CF6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.........." ..0..v..........n.... ........... ..............................S.....@.....................................O.......$............................................................................ ............... ..H............text...\t... ...v.................. ..`.rsrc...$............x..............@..@.reloc...............~..............@..B................P.......H.......dK..8?...........................................................~.......Y.*.0..l.........Y.X........+W.-....Y~.....+D..3....Y~.....+4...3....Y~.....+#...Y.(....(....~9.....2..+...s.......X...1..*r.(......}......}......}....*..{....o.....{....o.....{....s....*2.{....o....*6.{......_...*2.{....._...*f.{......_-..{....o....*.*..(....-..*.(....-..{.....o.....2..*..(....{.....o..........*..(....-..{....o....*.{....o....o....*..{......_-..{....o....-..{....._-..*.*.*2.{...
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):184320
Entropy (8bit):6.186528718822514
Encrypted:false
SSDEEP:3072:Zn1z0eAv+f6FuseJFf3+Ptl6n6dYQ7g8QqWF2OYiBbcfJS/zC3lR6O/c:Z1z0bv+f68LRol6n6diqyt8R6
MD5:98A13F2791C25C39C65268A55EBC219C
SHA1:9843E3FE2BDB0D42509F5B1DDF02A71A6683FC82
SHA-256:199E6A74E46AE881AD238656169CEAA390E2C2CE8038494BAAC236C117838D9F
SHA-512:3F74016B5FB2636F102DF8347D283FCDD831AD0884A133623CFB1147D1E47E795F772162A401ADEEB3BC1787FA022EF6302C50580BC2405A4C6C7DAA407CEEE7
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....j..........." ..0.............6.... ........... .......................@......d.....`.....................................O............................ ..........T............................................ ............... ..H............text...<.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H...........d...................|.........................................(2...*^.(2..........%...}....*:.(2.....}....*:.(2.....}....*:.(2.....}....*....0..a.........(.....o....oe....o\....o....o~..... ...%..oR....%..o!....(........o........(......(......(....*....0..S.........(.....o....oe....o\....o....o~..... ...%..oR....%..o!....(........o........(....*..0..y.......s.......}9.....}:..... ...%..{9...oR....%..{:...o!...........s3...(...+(...+..o6...,"r...p........s7...(...+
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):101376
Entropy (8bit):5.985092012305013
Encrypted:false
SSDEEP:1536:oTQ+q+zYQKdQVHYMqMuuy6I2SbEt3/ilufBNaxJtfIlic7h8rp2:CVuX2SbEt3YC7ErBp2
MD5:E9B6CAF8D7A3351D36BF3C16FCCD5BB6
SHA1:5E06692D09AC842E3A87972D0827F655C06643E1
SHA-256:1B40EEE85207AC6424BBE3E6ADECB8F2028D840AC7492CDD4C3C5D65D30591BE
SHA-512:C8955986F37A716430AB3F905B0629B86488569DBF9CD112C408CBA9277E62A3ACC44E72910F4FD6C3973BFF2858E1C9174CB81A034CB1D874FC9E125D62C19D
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q ..........." ..0................. ........... ....................................`.....................................O...................................x................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......H...0.............................................................{....*"..}....*>..(......(....*"..s....*..{....*"..}....*......(....*..0..?.......s........}}......(.....,%.{}...,...o...........s....(...+(....*"..s....**....s....*R.o.....o......s....*..{....*"..}....*..{!...*"..}!...*..{"...*"..}"...*..{#...*"..}#...*..{$...*"..}$...*..{%...*"..}%...*..{&...*"..}&...*..{'...*"..}'...*..{(...*"..}(...*..{)...*"..})...*rs................. ...( ...*..0..................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):11264
Entropy (8bit):5.165095041426296
Encrypted:false
SSDEEP:192:MGLhQCwvA9yV+FOdJNFOYBH8aZ2L13pS9mWgcbcTVDggAA8b:phKpVrHHBH8aZqmgDTFggAAK
MD5:FC99E1AECA222C1980C3042AC2E72C08
SHA1:D94BBD5C3CB1324AA1B66E984E8DE2F3BEBC9939
SHA-256:7AA16C8D1D924C877B5CFF9E84ECB633FA5E654B19A24F98CA2933319D193D15
SHA-512:A86C1CCCDDD421F8D9A5EB9D89DE2B0D35736A98360B34EADA658C8C55A05FA941049CF1B735CC3721FAA81859E2B4C386F1892A58EC6BA7509F3418B0F0E801
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-.=..........." ..0.."...........A... ...`....... ....................................`..................................A..O....`..`............................@..T............................................ ............... ..H............text...."... ...".................. ..`.rsrc...`....`.......$..............@..@.reloc...............*..............@..B.................A......H........'.......................@.......................................(....*..0...............(....o........(....s....*...0............(.......(....s....(....*6r...p..(....*.0.._.......s!.....s....}.....{....r...p.r'..p(....o.........."...s....(....%~....(....,..{....o....s....z*..0..#.......(......-...(....*..3...(....*s....z...(....%~....(....,.r=..p.r'..p(....s....z*..0..#.......(......-..(....&*..3..(....&*s....z..0..7..........~....%-.&~..........s....%.....(.........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):50688
Entropy (8bit):5.811409220314285
Encrypted:false
SSDEEP:768:jmOGveifSTtyXEQ3nPGLb4PFvSMJCD2j+SIfHq1wJd9P581IADm/Dskqd:FLTtyXEQ3+bO6U+dlrPi14LsX
MD5:E4823410682299E5A17619043C789EFB
SHA1:410D31CA04AF5264F265DF10DE499416225A0962
SHA-256:C33995427EDD44FA641CF702DF8B63CC82CB7054DD984DC8277D15EE7C958874
SHA-512:5DDF9C356CB813BCA2097184CB16172A6B3D70CFB17CD11216CD1268550C2C897BC0C42A6675720E334EBF150EBB3725185380BB5822D9B4D953B00EC0B21583
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,b............" ..0.................. ........... ....................... ............`.....................................O.......0...............................T............................................ ............... ..H............text........ ...................... ..`.rsrc...0...........................@..@.reloc..............................@..B........................H.......@@..<...........|.................................................(....*..(....*..(....*.......*Z~....,.*.oB...&......*.......*b~....-.r...ps....z~....*.(#...o8...*.0..........(#......o9.....(....Q*6.(.....(%...*.0..........(#........o:.....(....Q*R.(.......(....('...*:(#......o?...*N.(.....(.....()...*2(#....o;...*2(#....o<...*..o....*..o....*2(#....o=...*2(#....o>...*6(#.....o....*...0..........s"......}"....{"...-...+....#...s.......(1...*6(#.....o....*6..(....(3..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):64512
Entropy (8bit):5.579635492627126
Encrypted:false
SSDEEP:1536:Kjb2NmqeZsE64aEKbMsZG0EN3ovewf8unWE7LJ/ZE/i1:KjbUmqWL3MjWkV8I
MD5:C8A7C821CC06720B082CC301C902675F
SHA1:DF4F540B334EF6701F0C995CE1CFD10F2AF3A52E
SHA-256:6C5A7905456018EB99C214644A25F2A93542E52AA0083A18F76FFEFF408D33FC
SHA-512:6158C3F24AF9499A12FCB8D323E945E23D37C811DD7F5D668F98C189D359BDBAF4CB954A6C5C27B8675C0EACF23EC3BF9F51C9A90065903A5BFA0B88C1A26699
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w............" ..0.............".... ... ....... .......................`.......#....`.....................................O.... .......................@..........T............................................ ............... ..H............text...(.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......pG...................... .......................................6.......(....*.~....*F~J......o.......*N........s....o...+*..0............(........~......o2...*.0............(........~K.....o....*.0..%.........(..........(........~L.......o....*....0..H.........(..........(........~M....o.............(....(.........{........o....*2~$....o....*2~#....o....*2~H....oz...*6~I.....o~...*:~J......o....*2~%....o....*2~&....o....*>.(.......o....*...0..N........,........s.....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF line terminators
Category:dropped
Size (bytes):401
Entropy (8bit):5.064495148978155
Encrypted:false
SSDEEP:6:F8694BgqrJzkmwPIct0yl/mmFN3tfRGiTy6EGrgyAyxAyI2R842uRn:F794tdk5jtnrC0yyGyD5Rn
MD5:E870918430EAF37D07C8A8564B87468E
SHA1:18BD9AF36B48432352AFFCEE343CF052D9E5249D
SHA-256:5ADFAACE20B0A450F32B416A370A4773132145074DC5AF68A4BEB24CF4DA24AA
SHA-512:B79E189866059E16F9D822F9326CDAD0191E80DF9B33F533F46CC2BB6350D4C1E45D17FE9765468546E6488F7514D6E2F39184E975A714AAC0CC589BD98C2FDA
Malicious:false
Preview:.echo on..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && %~s0 %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..sc start "AccesskeyService"..echo off..exit
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF line terminators
Category:dropped
Size (bytes):408
Entropy (8bit):5.0917913131282635
Encrypted:false
SSDEEP:6:F8694BgqrJzkmwPIct0yl/mmFN3tfRGiTy6EGrgyAyxAyI2Re9SE7c2uRn:F794tdk5jtnrC0yyGyD0o0WRn
MD5:818D01EAC4231B35964F077D5A2DD233
SHA1:DB2B8DF50700CD3A1262572DAF097A90FCD55859
SHA-256:D00C5EBDAF9D4455B3B62EB882D31A12001D89EF483447A52433300975CA7DA1
SHA-512:FC961A202807BBD213BDC31549BF693611FC514D371CF386F4D8C6598517A40460212E7EDA299EC108ED1AF8D49F31BBFA79B8B685BAF88895ED2D6113D541EE
Malicious:false
Preview:.echo on..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && %~s0 %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..sc start "IDmelonTagreaderService"..echo off..exit
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF line terminators
Category:dropped
Size (bytes):400
Entropy (8bit):5.067904955709468
Encrypted:false
SSDEEP:6:F8694BgqrJzkmwPIct0yl/mmFN3tfRGiTy6EGrgyAyxAyI2RdFW42uRn:F794tdk5jtnrC0yyGyDTHRn
MD5:AD612C9DDB6599506A9E675D6FCC4016
SHA1:70B92B9CBC37BF58BA585AFBFBF341A6E49CEB56
SHA-256:68D268C9ABB712BEE74ABC06FA3C025324241FE1A8B73122B5C1A0D0E82C066B
SHA-512:DC424F1E4F59F74985DC62A652F7DB0574D2111DCF64A741EED2FA10C973B19B5C8AE25B87DC1DD4200B6E19000EF38DCA335627AE7F9DBCF5359FFC75BFF980
Malicious:false
Preview:.echo on..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && %~s0 %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..sc stop "AccesskeyService"..echo off..exit
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF line terminators
Category:dropped
Size (bytes):407
Entropy (8bit):5.095958406848568
Encrypted:false
SSDEEP:6:F8694BgqrJzkmwPIct0yl/mmFN3tfRGiTy6EGrgyAyxAyI2RdZE7c2uRn:F794tdk5jtnrC0yyGyDTZ0WRn
MD5:83999CB2B340534A72785D49A5185718
SHA1:757E5D2833539108DD8EA3E03E81AD4165DD89C0
SHA-256:FF7D44C5CF92026F63DF56CE6825B6E69EE14ABA6AE229E06C4AE03DCF1810AB
SHA-512:A6A33396E7A28C6197072B8B797326A05C4217AD3AC27424F3963BD9EAF8065AA083D58C9BC8BD73F28FEC5A56F1A528A5211D2B39AAEE82F75F40CE1902ACC2
Malicious:false
Preview:.echo on..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && %~s0 %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..sc stop "IDmelonTagreaderService"..echo off..exit
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):36864
Entropy (8bit):5.446927521203983
Encrypted:false
SSDEEP:768:sOAnaMx/sBpZ4LBGhj0Q/Zi4ugn8AZyQ33W076pLS:xAnDUBpZ8G/mAH
MD5:C8B5C818EDA361C70D6F6B0168021787
SHA1:A613691900EB3355712F44522B2C9EC16FAB0208
SHA-256:E1776E33CB542C5ACF3272012D7D10A9A0825FDF4A61156A849922A1C2B2BFDD
SHA-512:DC32B1F9189F559A8F3CE0EEA557E2AE98EB4C986E7C7ACDF96FC47BFA2C28B72CD877EAB1058F40A1B8DBF971B78AB0F2E70103AFCDCF12B5FF5C3071575AF9
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....!..........." ..0.............:.... ........... ....................................`....................................O.......x...........................D...8............................................ ............... ..H............text...@.... ...................... ..`.rsrc...x...........................@..@.reloc..............................@..B........................H........H..d]............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(....*....0..f.......r...p(....%(....o....o....o....s....o....o......8...%..:.o.......o......8...%..<.o.........&r5..p....*..........[[.......0..[.......rE..p.r[..ps....(....(...+~Z...%-.&~Y.........s....%.Z...(...+(...+t7......&("...o#.......*.........EK......Br...pr...p(....*^s$...(%.....(&...o'...*....0..1.......~(..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1673
Entropy (8bit):5.020737883232971
Encrypted:false
SSDEEP:24:JduPF7NILhpPH2/i/QVQ7uH2/XVV+TkH2/17zVUrPH2/+CVVXBOH2/17zVEPH2/2:327ugDSagXOwg1Sg+CBOg1gg+w3w
MD5:6B3FDF65DF4A30692CE9EF25E9B06E4F
SHA1:DFBFABA0E0F9AAE107EA8C4AC21B6342F7A825DC
SHA-256:CD5E255267B12593722E107DA6205EA0C3BEE8242BB742B87979E0546CFBF162
SHA-512:80AF3C7633A724D57E1AB2EF75762A271CD7AFD9E31E1C3C591B89EBB2413944FFB04D23D9CF5AF8318CBD8A979E1F202E53FB59B7FBC14EF8BFE2FBA0AA0380
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Text.Json" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-7.0.0.3" newVersion="7.0.0.3" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" cultur
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):165928
Entropy (8bit):4.8862081336233
Encrypted:false
SSDEEP:768:P1PybS2XfSy8S0jS9tRNCsB48pwZHgyQLiqMphHY+BHAKqQK+pODKE9uLUKgKNJU:P16ZI+C30UHfwi5H0upOOyLDQvNX+L
MD5:9E99F6F2DC43830D3959E55EDDDDB422
SHA1:98421E8A9C1338AD98D8115C8F7E85CFC7F778CE
SHA-256:D4F6EDE434577D4D47DB52EDE20762343968AA55B126DE34899E0CB8D95DE897
SHA-512:B7E898CA1BE2356C3F2C26327D0857E95ECBB51C2688EF34CFF2760AEA7FDDF4F04BD1498A8955327BA15825B47A27C34239B6E0D6E7A85EA743D017532652DF
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Zu............"...0.................. ........@.. ....................................`.................................u...O...................v..(...............8............................................ ............... ..H............text........ ...................... ..`.rsrc..............................@..@.reloc...............t..............@..B........................H.......hb..p............................................................0..)........{.........(....t......|......(...+...3.*....0..)........{.........(....t......|......(...+...3.*....0..)........{.........(....t......|......(...+...3.*....0..)........{.........(....t......|......(...+...3.*.~....{....*2~.....}....*J~....-.s.........*....0..V........(.....s....}....(L...-.r...ps....z.{.....(L...s[...o............s....(....~....o....*.~....{.....{I...o.....{H...o|...*r~....{.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):2158
Entropy (8bit):5.001906641704252
Encrypted:false
SSDEEP:48:327Yg+mSg+Cgg+w3Owg1BOg1sg+w3mgDSag+FIw:KkTJweJywDN
MD5:08F1F6BE83F37D15AE0712D06BE2A2BD
SHA1:5406180DD412ED1F1156FB9D2D3F8DCA46FCADC8
SHA-256:A76DD9BC94DC1898DBA458FD6723D6D13FA5BF6C1C1A7DC427176FDA9452C255
SHA-512:924919364B3D452ABD3B3C28E12AEE6269F3B00022BD28D6C937BDA0442276876C1D9529E275772C28EE7147A6FFA037DFC94CEAB24C0F3EA5790A98ED30035D
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Numerics.Vectors" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.1.4.0" newVersion="4.1.4.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.ValueTuple" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.3.0" newVersion="4.0.3.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):6144
Entropy (8bit):4.274825677811034
Encrypted:false
SSDEEP:96:ysIyrk8HlIxX8cr22F+04xXzLjsUCj5CWCwLp:ybuSXXr2G8Lg5CC
MD5:972CF7A2ABA153424A0662839E3392C2
SHA1:1C578A512D07B4EC6DB9FBA6764052A9F0F6E1BE
SHA-256:6471168C0B27CE265A51C17E49D45411FAB1CFEB9232AC8121C72E473A9F5AE5
SHA-512:C8ECDBF4B445A92368F4495638B6A92CA221119FD720719317F0BE2C38A3B959560C7275873FD44D7FE561ECB9577B0685CD08E466ED3B4668A7C095ADD2F4C9
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...C_............" ..0..............-... ...@....... ..............................Z.....`..................................-..O....@..<....................`.......,..T............................................ ............... ..H............text........ ...................... ..`.rsrc...<....@......................@..@.reloc.......`......................@..B.................-......H.......P ......................D,......................................BSJB............v4.0.30319......l.......#~..........#Strings....`.......#US.d.......#GUID...t.......#Blob...........W..........3..............................................................g...........................<.....&.................?.....\...............................(.............................5.........y...5...........................5....... ...V.....V....... ...V.....V.....V.....V.6...V.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):7168
Entropy (8bit):4.852842646024464
Encrypted:false
SSDEEP:96:hOzpHU8Qv77EBsSfSMe3qDdxst4jJEjrluuCTI6y4:k+tXjSfrQ7tGJqr0H1
MD5:A97869B96E79428CD4DE4FF68033004C
SHA1:C4AA6C116BAD95CEE3AE55634F314271280CDCF7
SHA-256:A3C7E1BE985467BBB6877A2B943CCA4CF51D0AD95AC77832180AA0C32DC02AB5
SHA-512:77E76F6982302408944BD1508342AEB0B0BBA78745B2884D1EE3958025CB64A370CD3861348FAD40DA13F9B8E66B94AB6113247F8C0B5B52E4697854BC5E98C5
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Y..........." ..0..............3... ...@....... ...............................L....`..................................2..O....@.......................`.......1..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................2......H........!......................H1........................................(....*:.(......}....*..~....%-.&~..........s....%.....(...+*..~....%-.&~..........s....%.....(...+o....*...0..O........~....%-.&~..........s....%.....(...+~....%-.&~..........s....%.....(...+(...+*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(....*.s.........*..(....**.o.......**.o.......**.o.......*..o....*.BSJB............v4.0.30319......l... ...#~......|...#Strings............#US.........#GUI
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):16384
Entropy (8bit):5.368820720638889
Encrypted:false
SSDEEP:384:nwTZplrcrd+qyGDbDDDDbDUl081IgEeOpNdueeu2eUA:w1HqQlqeWdue4A
MD5:21EBD70AA77DAEEB17A2CBF67C692303
SHA1:E07B57C359ADDFF75A05A27A89A156AB04B84F4E
SHA-256:03DDC08CDF50F6459342190B5C420AA34593B30A8BEF6BDB151F9A0B6DA99178
SHA-512:8C87605AD79AE623D0AC727F5F87FBA8EF2DB37818E8906C281B689B22DA55A122932BE427E76AE463D18FFBDEC5695BD761B6AD1DE48EE047CEA0AB8EA24D8F
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@..........." ..0..6...........U... ...`....... ..............................0.....`.................................\U..O....`.. ...........................LT..T............................................ ............... ..H............text....5... ...6.................. ..`.rsrc... ....`.......8..............@..@.reloc...............>..............@..B.................U......H.......8....%...................S........................................(....*:.(......}....*J.(.....s....}....*..{....*...0...........(........*.(....&.(.....3..(....r...p(....,..*.(....&.(......3..(....-..*.(....&.(.....3..(....r...p(....,..*.(....&.(......(.....o.....(....&*.0..I........(.....o.....o.....r...po......o.....r...po......(....o.....Yo.....o....*V.(......}......(....*..{....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):78336
Entropy (8bit):5.871892034938933
Encrypted:false
SSDEEP:1536:lumQyiDPHmQ9WunI5z+rMhBgowTY3Hwmj1q2jwkrM9a:gm3umQbIiMhBrws3QI1qRkrP
MD5:4B7D9B4D9125563AA9559AE6514B4531
SHA1:49040376A040DD128EACD561850990883F02A2CC
SHA-256:83EDC51BFE335F8744604E60DD7B761EE8197DFC79B3FACB754ACB71998A1690
SHA-512:3313BACD146A5566DFD70563FAFD2356AEE40094922B823AF2EDFD58EDA1E1715B637F89ED339068CD567416B3DD9B9A87F68FA38DEA7AA2558EC1F4D6D758C1
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...cU............" ..0..*..........jH... ...`....... ....................................`..................................H..O....`..............................8G..T............................................ ............... ..H............text...p(... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............0..............@..B................LH......H.......x...@....................F........................................(....*:.(......}....*..(....*.r...p.....r+..p.....rU..p.....ro..p.....r...p.....*"..(....*&...(....*6..s....(4...*6..s....(6...*:..s.....(6...*....0..k........s....}.......s....}.......s....}&......s....}(....(......%-.&r...ps....z(8.....%-.&r...ps....z}.....(\...*..{....*..{.....(....,...}......(....,..o....r...p( ...,...o....(<...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*..{....*"..}
Process:C:\Program Files (x86)\IDmelon\Accesskey\Service.exe
File Type:SQLite 3.x database, last written using SQLite version 3033000, file counter 5, database pages 10, cookie 0x5, schema 4, UTF-8, version-valid-for 5
Category:dropped
Size (bytes):40960
Entropy (8bit):0.2878717232896105
Encrypted:false
SSDEEP:24:TLsnOLXGt+MwZvp6XGT+MxgrXGt+MeiMXGZJU5dXGtz9leeee:TRLXKM9p6XSFgrXKKiMXOIdXKz
MD5:512E0C244AC04D27B26F4269F8071065
SHA1:C2F421D27D62B378D245AC19789A85FF2695D838
SHA-256:6D08531FFF511C9F2EF043DA2486AE777ECA77E1A8F81994751ACBD6FE22BFAB
SHA-512:D77D4C1EC123EA2B4B1AC71F3101BA6FE292F1890ABB657C6382BA5D50E0D743EE1F8C41F6E69125CEC34DBDAF21F39F1BBFE1F2D1419E7A2F556A88A7629F02
Malicious:false
Preview:SQLite format 3......@ ..........................................................................G.......o..s.....P.0...5...o..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\IDmelon\Accesskey\Service.exe
File Type:SQLite Rollback Journal
Category:modified
Size (bytes):4616
Entropy (8bit):1.5716632048498833
Encrypted:false
SSDEEP:24:7+tVRPqL0G6XGT+MxgrXGt+MeiMXGZJU5dXGtz9z:7M3qH6XSFgrXKKiMXOIdXKzd
MD5:A19B18F253C10F0F2E64A9C089A88350
SHA1:3FE8C3A29BF3A1107D01C9ED7D802438B2601A78
SHA-256:61E71C16C63E52F6B87DAA2F391D9B0315F04F99344EA67C0BA4B26E5E70A9F3
SHA-512:F24B519A20C4DAA8FFC0F57E0F1F85CBC80A9ACFC45B2B3C1A307077F50147892A4224A110470AD463CE70B53493305B5758EB9E5ADC4CE047B85B72681E1C89
Malicious:false
Preview:.... .c........X....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ ..........................................................................G.......5..s.....P.0...5..........................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):12800
Entropy (8bit):5.35006186027745
Encrypted:false
SSDEEP:384:HbLoKXGYTOw7+GwJ5pm83AYsoOLHG/dH6W:HbLpG9WooHGFHB
MD5:ACDD4380035D977ABA2FA558A351FC2D
SHA1:7B67E12F024C3E159A01C4C812ABB2EBD87EDF6D
SHA-256:BE75B10A04E02FCCBE9DA405262A56EEFE53310FE0E6C309B1E6CC71C9E249D0
SHA-512:70E70D7883534854AC440A4DE1EBB3ECA3DFD3ADB76D1E0FA1A8DE2C10DFB3FAE88AFD17E45F5233B1A2B0BD19A5AD46897E949459BC7AE57310AA52CBD4B0DC
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s............" ..0..*...........I... ...`....... ....................................`.................................II..O....`...............................H..8............................................ ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............0..............@..B................}I......H........(... ........................................................... ....*..(.....s....}.....{.....}W....(....*b.(.....s....}.....(....*R.(......}.....(....*F.{....o....o....*.0..b.........i...i..{....-..(....,....}Q......}R....*.{.....{....{W...o.......{..........o....}R......}Q....*...0............i...i.!.......+.........i....X......i2..{....-..(....,....}.......}.....*.{.....{....{W...o.....{.....o.......{............o....}.......}.....*....0.......... .....".........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):1415
Entropy (8bit):5.0365606453501925
Encrypted:false
SSDEEP:24:JduPF7NruH2/+YVV+TkH2/17zVVXBOH2/17zVUrPH2/+CV0PH2/+Q9y:327Yg+YOwg1BOg1Sg+Csg+Qw
MD5:74A1E9E2C09E9A02425E15E3734C3AB7
SHA1:BDA59ACB1E4BE2214B795AE54C4845EC62FF60FA
SHA-256:6AFD5C4F0AF961344237D01CC076B22DAD492757A83E888B04518E37962AE5A5
SHA-512:535B7BD67267DA6C4D6C864FBD73150277466091E738376E1D09DE68DC480DEC654AE7856D05D18E4096D3C9222E4024CDE430EE80E7D29AB7201F7BCB2E1BE8
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Numerics.Vectors" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.1.3.0" newVersion="4.1.3.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" cultur
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):20856
Entropy (8bit):6.425485073687783
Encrypted:false
SSDEEP:384:/rMdp9yXOfPfAxR5zwWvYW8a2cyHRN7vCvlbLg:/rMcXP6N6e
MD5:ECDFE8EDE869D2CCC6BF99981EA96400
SHA1:2F410A0396BC148ED533AD49B6415FB58DD4D641
SHA-256:ACCCCFBE45D9F08FFEED9916E37B33E98C65BE012CFFF6E7FA7B67210CE1FEFB
SHA-512:5FC7FEE5C25CB2EEE19737068968E00A00961C257271B420F594E5A0DA0559502D04EE6BA2D8D2AAD77F3769622F6743A5EE8DAE23F8F993F33FB09ED8DB2741
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^.........." ..0..$..........BC... ...`....... ....................................@..................................B..O....`..@...............x#...........A............................................... ............... ..H............text...H#... ...$.................. ..`.rsrc...@....`.......&..............@..@.reloc...............,..............@..B................$C......H........'...............?..X...8A......................................j~....%-.&(....s....%.....*..*...0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*.~....*2r...p.(....*B.....(.........*R.....(...+%-.&(!...*^.....("....(...+&~....*.s$...*"..s%...*..(&...*.*....0......................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):142240
Entropy (8bit):6.142019016866883
Encrypted:false
SSDEEP:3072:nUGrszKKLB8a9DvrJeeesIf3amN32AW/rcyw/s:OB8l3/aK32qU
MD5:F09441A1EE47FB3E6571A3A448E05BAF
SHA1:3C5C5DF5F8F8DB3F0A35C5ED8D357313A54E3CDE
SHA-256:BF3FB84664F4097F1A8A9BC71A51DCF8CF1A905D4080A4D290DA1730866E856F
SHA-512:0199AE0633BCCFEAEFBB5AED20832A4379C7AD73461D41A9DA3D6DC044093CC319670E67C4EFBF830308CBD9A48FB40D4A6C7E472DCC42EB745C6BA813E8E7C6
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6wb.........." ..0.................. ... ....... .......................`.......>....@.................................`...O.... ..@................'...@......(................................................ ............... ..H............text........ ...................... ..`.rsrc...@.... ......................@..@.reloc.......@......................@..B........................H........,................................................................('...*>..}......}....*..{....*..{....*..{.....{....3..{.....{....((...*.*..0...........%.u....,..........(....*.*z.{....%-.&.+.o)....{....(a...*..(....zN........o*...s+...*.(....z.s,...*..(....zF(U....(O...s-...*.(....z.(V...s-...*.(....z.s....*.(....z.s/...*..(....zN........o*...s0...*.(....zrr...p(\....c.K...(O...s1...*.(....zBr...p(Y...s1...*.(....z.s2...*.(....z.(X...s3...*.(!...z.(_...s3...*.(#...z
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):115856
Entropy (8bit):5.631610124521223
Encrypted:false
SSDEEP:1536:nPOw0SUUKw+GbgjMV+fCY1UiiGZ6qetMXIAMZ2zstK/hV+sUwS:nWw0SUUKBM8aOUiiGw7qa9tK/bJS
MD5:AAA2CBF14E06E9D3586D8A4ED455DB33
SHA1:3D216458740AD5CB05BC5F7C3491CDE44A1E5DF0
SHA-256:1D3EF8698281E7CF7371D1554AFEF5872B39F96C26DA772210A33DA041BA1183
SHA-512:0B14A039CA67982794A2BB69974EF04A7FBEE3686D7364F8F4DB70EA6259D29640CBB83D5B544D92FA1D3676C7619CD580FF45671A2BB4753ED8B383597C6DA8
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?.Z.........." ..0..v............... ........... ..............................DF....@.................................f...O........................>.......................................................... ............... ..H............text....u... ...v.................. ..`.rsrc................x..............@..@.reloc..............................@..B........................H........Q..|?..........$... ...D.........................................(....*&.l(....k*&.l(....k*..l.l(....k*..l.l(....k*&.l(....k*&.l(....k*&.l(....k*j~....%-.&(....s....%.....*..*.0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*.~....*2r...p.(....*2rG..p.(....*2r...p.(....*2r...p.(.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):16768
Entropy (8bit):6.361391591273708
Encrypted:false
SSDEEP:192:LGLxTyHvc4ROgcxAdWXYWJeaPtWsI9A9GaHnhWgN7aJeWw0fnCsqnajt:LgGLROZAdWXYW8aPcyHRN7WEqn1lx
MD5:DA04A75DDC22118ED24E0B53E474805A
SHA1:2D68C648A6A6371B6046E6C3AF09128230E0AD32
SHA-256:66409F670315AFE8610F17A4D3A1EE52D72B6A46C544CEC97544E8385F90AD74
SHA-512:26AF01CA25E921465F477A0E1499EDC9E0AC26C23908E5E9B97D3AFD60F3308BFBF2C8CA89EA21878454CD88A1CDDD2F2F0172A6E1E87EF33C56CD7A8D16E9C8
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^...........!................^2... ...@....@.. ...............................y....@..................................2..S....@...................#...`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@2......H........#..@...................P ......................................{.v.`)!.t..@.62C<.=...h....X..}.`v.r...g.e...yXa.dat.mwQ.XdJ...M..`..J...$|.j.6W.U.3.r.A.h.....9Q..|..,<g..gy..6V9o%..Gd.r.0...........q....*..0..............q....*...0..............q....*...0.................*.0....................*..0....................*..0............q.........*....0............q.........*....0............*..0................*..0...............*...0...............*...0..........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):78976
Entropy (8bit):6.105061710610473
Encrypted:false
SSDEEP:1536:4OO7OOOc2yIDmBkKQh3rt7jUGyRG/mz4CRLf8ocVW4t72bfQZHzp:fyMmXQh3rNjUFG/mk8f8owW4s0ZHF
MD5:C77AE3414D78C1F082C65415FAE69661
SHA1:3B35461D86A774535AC226CA9706FB50332DE20A
SHA-256:C792BFE3F43C894E20339252D159A96A20CCC6E13322B2D382570FF97939E501
SHA-512:08941BA8BE5031CC4E363A916525437C62B409576C91C10FC72795FAA10BC989F0D1797B576802E208DFE4305A4447C0299E2755BA92F97F531DE1F56FD5865A
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....u............" ..0.................. ... ....... .......................`......<.....`.....................................O.... ...................(...@..........T............................................ ............... ..H............text...0.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........m......................H.........................................('...*..('...*..('...*^.('......8...%...}....*:.('.....}....*:.('.....}....*:.('.....}....*^.('......9...%...}....*:.('.....}....*:.('.....}....*..0..E........ ...._.b..._X ....Y..e pp.._.d.X ....X.`.....X((.....R...((.....d.R*....0..K........ ...._.b..._X ....Y..e pp.._.d.X ....X.`.....X().... ...._.S...().....d.S*..0..&.........+....(*...G...Z.(......X....(+...2.*...0............(+.....1...(+....Z.:..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):582320
Entropy (8bit):5.99177382417674
Encrypted:false
SSDEEP:12288:Bo+rY8ZyAVNXL1VPGSEiWqJHsiEg2A9fLF:BhxXXrPGS6A7h
MD5:B7083FFD5D2BBBE83C6B439196838D78
SHA1:17B58D7F1CFFE4C1DD8E8246E127C949F4066D85
SHA-256:D14DBC34F6824757E6F6AE758B05F76C447F96F8D75BE3C4B8286FCC5A388B30
SHA-512:6C82D0F3B8E65DB99AA6F3973A6CB69CC9D02EFD3C3CC55AF03F01D5318360054E004EA4BCB53A2A7CF5DC1C0D77DC9183B479654CF88BBAC7B263FC68C61B16
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ........... ....................... ......+.....`.................................i...O........................(..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........S..............`O...w............................................(J...*..(J...*..(J...*..(J...*^.(J..........%...}....*:.(J.....}....*:.(J.....}....*:.(J.....}....*..(J...*:.(J.....}....*.0..E........ ...._.b..._X ....Y..e pp.._.d.X ....X.`.....X(K.....R...(K.....d.R*....0..K........ ...._.b..._X ....Y..e pp.._.d.X ....X.`.....X(L.... ...._.S...(L.....d.S*..0..&.........+....(M...G...Z.(......X....(N...2.*...0............(N.....1...(N....Z.....(...+.+...(N....Z......
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):25984
Entropy (8bit):6.291520154015514
Encrypted:false
SSDEEP:384:1R973o62/KqcAnb05J3w0I5eUGef8s72XBWdvVW2JW8aJcyHRN7WEimpplex:1RZ4nNxnYTb6Blha
MD5:E1E9D7D46E5CD9525C5927DC98D9ECC7
SHA1:2242627282F9E07E37B274EA36FAC2D3CD9C9110
SHA-256:4F81FFD0DC7204DB75AFC35EA4291769B07C440592F28894260EEA76626A23C6
SHA-512:DA7AB8C0100E7D074F0E680B28D241940733860DFBDC5B8C78428B76E807F27E44D1C5EC95EE80C0B5098E8C5D5DA4D48BCE86800164F9734A05035220C3FF11
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^.........." ..0..8...........V... ...`....... ....................................@..................................V..O....`...............B...#..........PU............................................... ............... ..H............text....6... ...8.................. ..`.rsrc........`.......:..............@..@.reloc...............@..............@..B.................V......H........0...$...................T........................................(....*..(....z..(....z2.(....s....*2.(....s....*:........o....*.~....*~.-..(......}......}......}....*~.-..(......}......}......}....*Z..}......}......}....*J.{....%-.&.*o....*^.u....,........(....*.*~.{.....{....3..{.....{......*.*&...(....*2...(.......*....0..'........{......,..u....%-.&..(...+(....*(....*n.{....,..(....s....*.q....*..0..a.........{....o0.....,;..{....o2...(......;...3.~.......s......
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):25232
Entropy (8bit):6.672539084038871
Encrypted:false
SSDEEP:384:VyPa16oAL4D+wW9IWmDIW4IWYDMFm0GftpBjMIraQHRN7VlmTpF0:VWs6oqDjADKeDYViG+LN
MD5:23EE4302E85013A1EB4324C414D561D5
SHA1:D1664731719E85AAD7A2273685D77FEB0204EC98
SHA-256:E905D102585B22C6DF04F219AF5CBDBFA7BC165979E9788B62DF6DCC165E10F4
SHA-512:6B223CE7F580A40A8864A762E3D5CCCF1D34A554847787551E8A5D4D05D7F7A5F116F2DE8A1C793F327A64D23570228C6E3648A541DD52F93D58F8F243591E32
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?.Z.........." ..0.............b2... ...@....... ...............................H....@..................................2..O....@...............$...>...`......x1............................................... ............... ..H............text...h.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B................B2......H........!..T....................0......................................j~....%-.&(....s....%.....*..*...0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*.~....*2r...p.(....*2r[..p.(....*B.....(.........*.BSJB............v4.0.30319......l...4...#~..........#Strings....t.......#US.@.......
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):58880
Entropy (8bit):5.651114038528575
Encrypted:false
SSDEEP:1536:cDO9PdVWTawODut3SZHVlC1i9ZUNOJufiacJ:qznO9ZHVA14Z6b+
MD5:EFD5FCE9CDF53D5C85E525785303ACB5
SHA1:2A19F03B1581C92BBA9779B52942110E993CB2B1
SHA-256:124F009C133115826657F247B197A29E77358B2D2B2F88E00320A566E5DD92B6
SHA-512:3B6086BF1E4F2E1A0A1A01DDEEEB28245E9CFE9064A570EBEFC385BC410E2ADAC6547F47B56DD990C9B8CE558CD92EAFA31DB7EEB71E6480A6945F61A5EB9247
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m.(..........." ..0.................. ........... .......................@............`.....................................O............................ ..........8............................................ ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......Di...............................................................(....*^.(.......1...%...}....*:.(......}....*.~....*...0...........$.2...%.r...p.%.r{..p.%.r...p.%.ro..p.%.r...p.%.rc..p.%.r...p.%.rW..p.%.r...p.%..rK..p.%..r...p.%..r?..p.%..r...p.%..r3..p.%..r...p.%..r'..p.%..r...p.%..r...p.%..r...p.%..r...p.%..r...p.%..r...p.%..r}..p.%..r...p.%..rq..p.%..r...p.%..re..p.%..r...p.%..rY..p.%..r...p.%..rM..p.%..r...p.%. rA..p.%.!r...p.%."r5..p.%.#r...p.(....(............
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):928
Entropy (8bit):4.995731281926125
Encrypted:false
SSDEEP:24:JduPF7NQ7uH2/XV0PH2/+w3VUrPH2/+C9y:3276agXsg+w3Sg+Cw
MD5:76B344530DD42F0FEFF3CA3260B4742D
SHA1:A80D8B82F4CD400BDB2967C50FD9531C3D2E33DD
SHA-256:670AFA345EB43C0E2AA042236AAA429796C8A70396360E5D091A50A066730019
SHA-512:EDA8FA1B9ACBF6FCA579B9263E8039429D8A81B2F3414A265E5755F2F5B10B6166EE74100B147399F5130C79883EB1CFCD5BC0DE6A0A5C1EC81322A897F8C49A
Malicious:false
Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Buffers" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.3.0" newVersion="4.0.3.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffcd2ddd51" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.0.1.2" newVersion="4.0.1.2" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):18432
Entropy (8bit):5.4382207566495016
Encrypted:false
SSDEEP:384:9xfl8lKmlSlm+ElBSSLqbKabycb787BlQHZrvyHRD09iDmA:9xfqT0788s8f874H4xtB
MD5:F77DEB0E6843989453DDFC19FFF5988D
SHA1:57B4A410356A5752BF54259A19399007C443D3F4
SHA-256:4CF1BE49C8CDB265603E446F755DFD1F2D79AE3398BA730A734B74A6C49EFE38
SHA-512:18D10AE9F2DF5AD9CC01EE7D8810014DD55FA904D9EB4FE119A4DECF67027DE2B6E3600A291C6A58999A8788F10EF6891285E71E89929D65767073DD257F34CC
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....y].........." ..0..>..........~\... ...`....... ..............................$'....@.................................,\..O....`..x............................................................................ ............... ..H............text....<... ...>.................. ..`.rsrc...x....`.......@..............@..@.reloc...............F..............@..B................`\......H........F.......................[...........................................2#.r...po....&...........Yo....o....&*.....2!..#o....&............Yo....o....&*v...........Yo....(....o....&*b...........Yo....o....&*.....2 ..?o....&...........Yo....o....&*.....2 ...........Yo....o....&..:o....&*..0...........-..*....3..,....o.....("...+....-..*.,....o.....("...+......o.....s.....8......o........ ...._ ....3E..X./?...Xo.... ...._ ....3) ...... ...._..bX...Xo.... ...._X....X.+... ..
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):111200
Entropy (8bit):6.1221789546919325
Encrypted:false
SSDEEP:3072:Vf5KanssKF6BsefWKqjBbbgPiQ5i5v7F4MsiDMxi0:qasspVfWKMFQM34Mn50
MD5:FFEEE6F46AAF9B189DDC7FC3B3357FC4
SHA1:BD087AB87968434BACBA247CEBA70478904EC4A3
SHA-256:01C2BA352545C2B28D4CA2AA7E6B042C52214B8312372D66FD4514C3FE6D133B
SHA-512:8B100634D04271C14B9C96C3F5C373B405FBCD41696C7FAA029438886122903BD93BDC88F4073580F381A3487A999242F831AB2D61F79005F9C33C160BE58754
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......vx..2...2...2...;a_.6...`q..0...W...1...,K_.0...`q..'...`q..5...`q..3...p..0...2.......p..?...p3.3...2.[.3...p..3...Rich2...........PE..d...B..d.........." .....P...8.......Y....................................................`.................................................,`.........../......4.......`(......@....s..T............................t...............p.. ............r..H............text....I.......J.................. ..`.nep.........`.......N.............. ..`.rdata..\....p.......T..............@..@.data........p.......N..............@....pdata..4............T..............@..@.rsrc..../.......0...X..............@..@.reloc..@...........................@..B................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):42496
Entropy (8bit):5.782944900930189
Encrypted:false
SSDEEP:768:H0Gl7W1UiZTo1ooEqTh0sq/s/MnBOyvUPrYZbkch:UqQpZTsooEah0sqU/by4UZzh
MD5:47D729B6841F1E0E510BBC7D74454B73
SHA1:BB7A519A2BF2DBFA8AEF238241D6DD5C62AEED77
SHA-256:B4C69BE213BA3DD40E6BC819B7BFC13AB03D06D5F3EFA0E4643B1B55E5A529F9
SHA-512:F5ECD0CCA56306273685C12CCB5AF8F540161E2CFFE3F639A2FA1F9DE29CFEBB2F6D8F8BA4AD43E02A721DA30DD8E3CC911E46E4237578E026A5BA8C059429AF
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.................. ........... ...............................F....@.................................J...O.......$...........................h...T............................................ ............... ..H............text........ ...................... ..`.rsrc...$...........................@..@.reloc..............................@..B................~.......H........H..Hq...........................................................{....*..{....*V.(......}......}....*...0..A........u........4.,/(.....{.....{....o....,.(.....{.....{....o....*.*.*. ...' )UU.Z(.....{....o....X )UU.Z(.....{....o....X*...0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*...0..2..........(....~.......o"...-.~.....s#...%.o$.....o%...&*...0..A..........(....~.......o"...,)..o&..., .o'...-.~.....o(
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (console) x86-64, for MS Windows
Category:dropped
Size (bytes):19082792
Entropy (8bit):7.993961306364174
Encrypted:true
SSDEEP:393216:V/m3pWBJH9dNrvymWTOha1OQK2GN2gLocDfDgMc6XCTLJWfRVyv43Gc:VK0LNrvy5ql12GIYocb0zQIL8fR5Gc
MD5:FC4E01D66E8A5D58C306CEB4D115E464
SHA1:83A3707C8E265702263B4C25E66D31785B5DA1DE
SHA-256:54A1096D6A9DEEC8503831B262610314410C6307F0B98ABC74EED747AA6589F1
SHA-512:F52FB92F69DC9EA53B83D2A6E9D50DD9A3083BFCEB6A5FFB36E68B38EF70D673D96E171B30B029E52E08F3ED61E8EA7158B9A53D4F762F182E1B562FB9FD5273
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]..G<.G<.G<..D..O<..D..<..D.M<.G<.F<.A.>.C<.A..o<.A..V<.A...V<..D.@<.G<.><.(..R<.(...F<.RichG<.........PE..d.....vf.........."....&......................@.............................@........#...`.....................................................P............@..d#....#.(....0..\...p...............................0...@............................................text...P........................... ..`.rdata..&,..........................@..@.data....3..........................@....pdata..d#...@...$..................@..@_RDATA.......p......................@..@.rsrc...............................@..@.reloc..\....0......................@..B........................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):495584
Entropy (8bit):6.7696106294027665
Encrypted:false
SSDEEP:12288:liTMfjH1WyHWOJ9cKAuBxjC5kQqM+Ocq1qxwQpIDzu:liTMfL1zH3cKdNkcpxdwzu
MD5:7E4FF135187E924AB5E9AF57F063257A
SHA1:76FC0D22948806794633AC83AC8DB950597129F7
SHA-256:62AE41A2314CEF52325CA8D0D0DE4EE20669A89BCC8AB69058FCE44307242033
SHA-512:8400924C40EC18B7CB2BACF022990B7F3A84843399519288696EBC865111C1D43A8D30E2A73ED258181BEA38B809F3D703E33B88CEE192CD184FD02410B944F2
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........2..FS..FS..FS...;..IS...;...S...;..US....i.GS..."..IS..."..SS..."..gS...;..OS..FS...S...!..GS...!..TS...!..GS...!Q.GS..FS9.GS...!..GS..RichFS..........................PE..L......a...........!.........~.......................................................Q....@A.............................)......d....................f...)... ...V......................................@............................................text............................... ..`.rdata........... ..................@..@.data...(...........................@....rsrc...............................@..@.reloc...V... ...X..................@..B................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:current ar archive
Category:dropped
Size (bytes):87450
Entropy (8bit):5.377844050731864
Encrypted:false
SSDEEP:1536:UYPgQYWWC/TKo5JQRMEMue6nTygxBI5ykPlq6Q2/K5npAenyxnw/OCTojlh26TgN:UYP4WOR+uO5zPAxp6xc8DEl7RPHg3AB
MD5:4BF8353FA573249AF8D2185D06886A2A
SHA1:B11BC033B5994693DA00511A1E328D84A483C8A5
SHA-256:7FB669CAC2000307EDB87E4FE5D4313050A189C13FAFC11E001AA6D46D5FA616
SHA-512:885F136EC3AC7FC086794AA8D1D8F005FFDE8F1DE75B3449FDBF8F3F51C0F36048FA84C4A22C121CAD29DB773A62DBE001335D5DDD426DA049E77189AF1E2625
Malicious:false
Preview:!<arch>./ -1 0 21502 `............0...h...,...,...................v...v...........R...R...........:...:...........................................j...j...0...0...................................V...V...................................n...n.................N...N.................T...T...p...p...................2...2.................x...x...........V...V...........8...8.......................l...l...........D...D........."..."...............................x...x...................8...8...............................^...^...D...D.........(...(.................~...~...........`...`..."...".................v...v...........\...\.........................0...0.................4...4...P...P.........................~...~...........T...T...............................................|...|...........^...^...........*...*...:...:..."...".................^...^...........D...D.........$...$.........................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):481248
Entropy (8bit):6.549528625401982
Encrypted:false
SSDEEP:12288:xTl7DNpxv0H9Qq54mhhdFnJLgw79+sqi6:xTl7DNLq5H/Qw7Ei6
MD5:D522C17E1620D9F3AFFE969C2E8ED089
SHA1:AD465E113E4CBEAC0747DBB1BE8630053325105C
SHA-256:0EA38137164E2BE0599B6AF01326720C41DDDCA0A2CF491441A5EE0C0B7BFC7C
SHA-512:4C2215D1E7ECC2C801BA58F7F5A2536B35148CD8384512D2BF23B6348DFB120578302F63DAA7ED49509CA1687F901A6101105CBE4171A824E7376895BDDAD7C0
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5.".q.L.q.L.q.L.*.H.z.L.*.O.v.L.*.I...L..m..p.L..H.~.L..O.x.L..I.S.L.*.M.x.L.q.M...L..H.p.L..I.c.L..L.p.L...p.L.q..p.L..N.p.L.Richq.L.........PE..d...3..a.........." .....J...........*.......................................`......9.....`A.............................................)..`...d....@..........06.......)...P.......k..T...........................@l..8............`...............................text... H.......J.................. ..`.rdata...~...`.......N..............@..@.data...............................@....pdata..06.......8..................@..@_RDATA.......0......................@..@.rsrc........@......................@..@.reloc.......P.......$..............@..B................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:current ar archive
Category:dropped
Size (bytes):80822
Entropy (8bit):5.371100192595072
Encrypted:false
SSDEEP:1536:CQ/x1S+l7EsJWZtKkK42URmqhXgotyTK0SSlEH9SmhgfkE1+7nvGsoKYuRqX/JCw:CQ/jW1Tfye0w9ckb4P1TxmjQ
MD5:19F5B596AAC79018239D44390816A1EA
SHA1:DC76E2DE0881DB72794DFFE02554BCA066B530FD
SHA-256:B83B1196E79A4B81DCF7DF21B7527F5DA646EC614BECEDA771D7C3B0EEAB22D9
SHA-512:6F81EB41AB03C75B7AB5A98A62EBF4CDA8DB060A11E0F34229D4B87FC1279D438F11B893896C501B2EE1759EDD89E659E1A0CC8291F5E536420811AD1B5A40A9
Malicious:false
Preview:!<arch>./ -1 0 19410 `........B...t.......|...|...........N...N...........$...$...................r...r...........L...L...........*...*...................J...J...........$...$...................`...`...........2...2...................d...d...........>...>...........~...~...........T...T...........0...0...................t...t...........F...F...................................f...f...........:...:...........................X...X...........B...B...........*...*...................z...z...P...P...........$...$...........h...h...........................&...&...................p...p...........T...T...........t...t...........R...R.........*...*.........................d...d...........4...4...........v...v...........R...R...........,...,.................d...d...............................................t...t...........R...R.........z...z...(...(...........p...p...........4...4...............................^...^...........D...D...
Process:C:\Program Files (x86)\IDmelon\Accesskey\Service.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):715
Entropy (8bit):5.900377503872211
Encrypted:false
SSDEEP:12:TMHd4Pro8iKdjV/xK5/2ICZNpqlG9wVKSANmGykRquWqSSYPxBYHNweWTLS:2d4jo8Pf/Q/2bZ/qmwVKSvG7eXB5nS
MD5:02BE68D6960A88D9624395552010229F
SHA1:8862F5DD62E21C145F8AFDF99F2D3C2593AF5CBB
SHA-256:5610612647CEA38F5FF70BE9FE88F2E8787B33D9BFF75EE93BF24E3DF006E78C
SHA-512:FEE065201842C533FDAF3EB5F85558D9C79CF40DF26DC7A4A2EB26E1C703F577F16F27E21F6C7DFC8CEC5AF9E1C9594EF75B6F3B0FCDA927B790849C523EC141
Malicious:false
Preview:<?xml version="1.0" encoding="utf-8"?>..<Config xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">.. <Mode>Card</Mode>.. <AppID>669c900e0431ff000837d547</AppID>.. <Token>eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjp7ImNyZWF0ZWRBdCI6MTcyMTUzNjUyNjg4MCwiX2lkIjoiNjY5YzkwMGUwNDMxZmYwMDA4MzdkNTQ3In0sImlwIjoiOC40Ni4xMjMuMzMiLCJ1c2VyQWdlbnQiOiJSZXN0U2hhcnAvMTEwLjIuMC4wIiwiaWF0IjoxNzIxNTM2NTI2fQ.lAFTXKb0Zv2nI1iLvPNnotIrLG7Meqmmz8NGQKY_sKg</Token>.. <ServerPublicKey>04e80ad41dd32e8b28bfd640e6d08e4bbea84d7f8bbb3e03797c3673e5f4b2f236faad80ab6cfa5169a1047ff1b558fcebaf87b8ef788dbb27b2c0fdde32b84623</ServerPublicKey>.. <PinPolicy>PinRequired</PinPolicy>..</Config>
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):12684056
Entropy (8bit):5.750572800376826
Encrypted:false
SSDEEP:98304:T90rvru1gfhuxb58gzjuq8/bx72QJg/+gqms:T9Mvru1+hux/uPTcQK/Zjs
MD5:865C7D285D665FE4D9FB672B111DD54D
SHA1:C3E83E7A8402F0DE75A49D5DCC71DD131E9B2CAB
SHA-256:4151229B6E31DAE91D459BE70655417DD18E6B0869C9A72FEF08A5BB28D980B8
SHA-512:9BE1CA48ABFBCFB0964B25613E62EF75A5603876E84DD317D5946A96E1FFC64E219366B4635582D4C455212580E6B94A5DE54E5FFF6523792ABFA2BCF0E18A1E
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6es.r...r...r....`..o....`..|....`.........v...IZ..x...IZ......IZ..Z...r...c....`..y...r........Z.......Z.......Z..s....Z..s....Z..s...Richr...........PE..d...~|.c.........." .........`8..............................................`............`.............................................#...x...x....0..Y....@..x....b...)...@.......n..8.......................(...0o..................x............................text............................... ..`.rdata...,.......,.................@..@.data........@...Z...&..............@....pdata...q...@...r..................@..@.idata..K$.......&.................@..@.tls....s...........................@....gfids..4...........................@..@.00cfg....... .......:..............@..@.rsrc...Y....0.......<..............@..@.reloc..V....@... ...B..............@..B........................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):9986840
Entropy (8bit):5.798952004538316
Encrypted:false
SSDEEP:98304:ht0TyUQmSCXRLO0KmlsunPzBVhgH01n/QoDD:hwQmSCB3Kmlsq1
MD5:5375B505F0463930EE8EA2254B477DEB
SHA1:B114BC70840FCFD7BB60ECACFFA1944F23A459FF
SHA-256:F6A6B19A8EA19E51CD4FB8E120A8B3DF609429193653618E56D24C5D9704E56C
SHA-512:2CE74BB9CAFB182E0052CEFBC5B40C0CEBC6DF31DF80DF59CD1BE9AFFAB53E274D75133327903FE3D8828F09225B20D48E3E2FC58BB58A4D17F542C5D6E7F7D4
Malicious:false
Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......|C..8"..8"..8"..WF..."..WF..."..WF..'".....;"...|..$"...|..O"...|..."..8"..4"..WF..3"..8"..."..|...#..|..#..|..9"..|..9"..|..9"..Rich8"..........................PE..L...p|.c...........!......z.........T+........z..........................................@.........................0........d..x.......Y............:...).............8..........................H...@............`...............................text.....z.......z................. ..`.rdata...H....z..J....z.............@..@.data....3... ......................@....idata..K....`.....................@..@.tls....$...........................@....gfids..............................@..@.00cfg............... ..............@..@.rsrc...Y............"..............@..@.reloc..............(..............@..B................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):270336
Entropy (8bit):5.596191661109029
Encrypted:false
SSDEEP:3072:h+8gmdoxSO7ZbQFroo7RVir/dtnK0sgdnogtHcU5qFG1RSGCkE9kKn7GCcaLoWn:c1N8LLI/PK0scnodG1RS1T93caL
MD5:46319A38CE5D09020D2AC56B67829C6C
SHA1:FFE64CA4D4BC9E1DAB1D195982D22121A6BAA058
SHA-256:1D45A6AFA38F0B10814063F2A42E6EFCE45752853667650E765844B8566B3332
SHA-512:0DE61771A92EE71470E51BCCF66D3A39C105AE23D60E73D8E4E7D44135DFF4C8D1DDDFF9BBB6BE72FF083D51C784E5CA829A6ADEFEE87FD901D2DE58DB0DDB03
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....O..........." ..0...... ........... ... ....... .......................`...........`.....................................O.... .......................@......|................................................ ............... ..H............text...(.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (console) x86-64, for MS Windows
Category:dropped
Size (bytes):373288
Entropy (8bit):5.612916865047601
Encrypted:false
SSDEEP:6144:dI6VyDGb+HiFr4kchE18dkuCj7jLwcYBQarDosNXUk:dIJDGb+Hiu9hE18dkxfdsNXV
MD5:17DE7869B1B721B3FFF9DBE111CAAFF8
SHA1:5CA75CBF7928732B5B022BC06146216CC7EEBC30
SHA-256:852F71F992F9C6FE89875F468AB7058FD9E0CF03FC13654E7E2F291BC403517F
SHA-512:A4C736EECDCC4DBED1D871B1E593B174A09001DFAB5D2FE1309918CCDF82DC25C09683799B35F6BF748E4A61466BC302A30A5FB62A350A6912C9112108501155
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........"1P.C_..C_..C_..;...C_..;...C_...$..C_..C^.YC_..;...C_......C_..;...C_.Rich.C_.........................PE..d...]..Y..........#......D...X................@.........................................................................................................|...P..."......(............................................................`.. ............................text...4B.......D.................. ..`.rdata.......`.......H..............@..@.data...dC......."..................@....pdata..."...P...$..................@..@.rsrc....|.......~..."..............@..@................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
Category:dropped
Size (bytes):1083392
Entropy (8bit):7.142876487136901
Encrypted:false
SSDEEP:24576:klnHRpXN2xxKmSckQwFwM3CHpzDTzRHzYNrCP74Y:k9cxxKJckQwdCJzDWNr4
MD5:FBB305C445AB83E83BF60BDBA8534173
SHA1:AB6E1A12C5EA3C14B7657395D09B3B7ED2546126
SHA-256:632CEB55168C31C79A9B25BEF41C197AE6978326EE17F80DEF74EB75F1BE474E
SHA-512:22024B6FE6241D8C6509A3094225302EF852CC39F85D168110D2C1C745B68CD957ED3B799CF22AB8038F13A0F8BFD964D9B0D529594AC83D7D938B9A830B0419
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g.&...u...u...u.n.tc..u.n.t...u.n.t...u...ui..u.v.t...u.v.t...u.v.t...uXw.t...uXw.t...uXw4u...uXw.t...uRich...u........................PE......f.:_.........."!................aH....................................................@A........................0~...".....(....P..........pO...........`...V..h...T............................................................................text............................... ..`.rdata..............................@..@.data...tJ.......>..................@....pdata..pO.......P..................@..@.rsrc........P......................@..@.reloc...V...`...X...0..............@..B........................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Category:dropped
Size (bytes):1570816
Entropy (8bit):6.521735562400957
Encrypted:false
SSDEEP:24576:HIDsTpsRAN6hgpHIUpR9kMjYfV2QDdMQzb704Zw6K33PM36ZM5NH2Rt:HIDsTpsqtpoUpRQNYJ6e3PM3ek
MD5:B429904F765F9EC975A15E8AB8CEB569
SHA1:45D073854924B924C50B27363D37531673CBCC81
SHA-256:F1C53F43819798C577EB9F4AC83BB3FAB38FA21AAF565DEFE8573B2FCA768230
SHA-512:76AA50E3B6FC4D2C8C3F468AB061F0809399F8C723B1359E291011EE288AC75EA8170D357F9BE20EF94D121140B7FF53BB05E29F96EBE041032357ED7334A279
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................................D............L..1......1......1......~......~......~.W....~......Rich...................PE..d...].:_.........." .........>...............................................P............`A........................................ ...."......(.... .......@...............0......X...T...............................0............................................text............................... ..`.rdata..*...........................@..@.data...Xj.......T..................@....pdata.......@......................@..@_RDATA..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
Category:dropped
Size (bytes):1184256
Entropy (8bit):6.73335357356
Encrypted:false
SSDEEP:24576:XZrSxkftqbYzaTG7p5SX6BrR/uNQHBfvELjdf960rsJGgbNG:XZryxKR9TANit8lsJ6
MD5:E02613D1A6211EB1BFC8D15431ACBD68
SHA1:44D61B27A03C4BAE38C69B9F5449F613913E88DA
SHA-256:03EF15557EC8B1DD8D8D1F5552EC96DF2E5EC27DE3A1ACFCB1C16D7A8A559AC9
SHA-512:9CF82D36C77A33A77DF24335FE967A58E41C9140002C686912B465F1B3A1AB29511888AB39D3974BD9CA0E4B08C2B0F9310E60DB8CA09A0E52B84F9BC0FFD3C9
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............z...z...z..y..z....o.z..~..z..{...z...{.~.z......z...~...z...y..z.H.~...z.H.z...z.H.....z.H.x...z.Rich..z.................PE..L...R.:_...........!.........l...............................................P............@A.........................*..."...M..(...................................."..T...........................p"..@............................................text............................... ..`.rdata..n...........................@..@.data....K...`...>...L..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
File Type:ASCII text, with very long lines (467), with CRLF line terminators
Category:dropped
Size (bytes):2317
Entropy (8bit):5.695897002288219
Encrypted:false
SSDEEP:48:1cHxpHXhVw3MmE0yx3MmELucsV/2dBCKR7I/WrSWrPEj7j6AxuEX:1KFQMmZCMmYucg2dBCQI/1KEj7jVxl
MD5:FC7B23C76DBE73425D476CD78BBB9E07
SHA1:F5C2190124DE808C89318B9652AB93CBE38E1C68
SHA-256:A0A0F64A373D1F7E79F5DC3A2A75EAC59E21142B471CA1351341181A58E55B43
SHA-512:809EAD24140E15B5763B652F8F0A9D9721A171A9B5EE71AC5216F6304051E429FBD0B1CAB9A9B34EDB810B8F83572555A6E07104BED818C847E6F6E86E29FDD5
Malicious:false
Preview:2024-07-21 00:35:22,998 INFO - [Main] IDmelon AccessKey service started.....2024-07-21 00:35:23,029 INFO - [Main] IDmelon AccessKey service v2.7.0.0..2024-07-21 00:35:23,061 INFO - [InitConfig] Requesting new Token and AppID..2024-07-21 00:35:23,061 INFO - [InitConfig] No Proxy is being used..2024-07-21 00:35:23,873 INFO - [InitRequest] [ServiceManager._InitRestRequest] {"uniqueId":"XRF4CT6SRPHEA160VN5TV766AYHCRVBQQ94JZAVP22H0AYXFCNZG","os":{"name":"Microsoft Windows 10 Pro","version":"19045"},"appversion":"2.7.0.0","PCName":"141700","userName":"SYSTEM","deviceId":null,"publicKey":"0475589d95854bd7f0e7992afc5a3a5af230cc6212dd161e84efced44b7b2986b06df027804fc54dc90b170db7e7837158361c6c8bb823d75c674e22ed644bd703"}..2024-07-21 00:35:23,951 INFO - [InitRequest] [ServiceManager._InitRestRequest] Reqeusting new accesstoken with params: {"uniqueId":"XRF4CT6SRPHEA160VN5TV766AYHCRVBQQ94JZAVP22H0AYXFCNZG","os":{"name":"Microsoft Windows 10 Pro","version":"19045"},"appversion":"2.7.0.0","PCName":
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
Category:dropped
Size (bytes):175053
Entropy (8bit):5.440434367296417
Encrypted:false
SSDEEP:1536:JfHLrLkSRoybCQUZsrs0DC1cu8pOwSPAcezB010n6BBteqmLAl:Jfr3k+o5buDC1culhjKB0+n6Xteqmkl
MD5:B70EC66793408BD53E85984AFB1243AA
SHA1:571CC2B6E2F1BAE181BAA46775A2BE15A88B9AA2
SHA-256:E2A31247F61646FEE58C3F2483E982EE838596D25FB6EBE8C674C6DCA83714EC
SHA-512:787157F29C1B578D271EF3D421AE73B50546D72B61A2B4FAFA6908644287E4853441E52A45F0DFCF91A3AA1448659BCD60D1065935F5BC6133E53D94A67B0218
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................j..........R5............@..........................@......7.....@.........................................................@-..(............................................................................................text....h.......j.................. ..`.rdata..d............n..............@..@.data...............................@....ndata...@...P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):226816
Entropy (8bit):5.805239882361139
Encrypted:false
SSDEEP:6144:aG6L6WIqe9bjj1OLNryn2aJJJnoQCSJgI:aG6L6WTeBjKsn2aJPoQ
MD5:E67544B112F568F13B17D72189FDA007
SHA1:B75B79C65330A77FE7AEA5EF6C319D7F3D1865D4
SHA-256:697F13F09CB2C425DDCFE1AA167D698F7AF5AEA48D03D5370143BC00E9BBFA2E
SHA-512:5A3381C0BE69DF8DC5A8C7C931B14919A189A8D03D2128D3848FBF73E3FD21631FE44ECCD9BAF97A15F646D0FCC5B3263B6EAC2F98D67557A07AD6FB4F91C402
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9!..........." ..0..j..........V.... ........... ...............................2....`.....................................O.......0...........................`...8............................................ ............... ..H............text...ti... ...j.................. ..`.rsrc...0............l..............@..@.reloc...............t..............@..B................6.......H.......0...............................................................J.("....~N...}....*&...(....*&...(....*:.(".....}....*R.("......s....}....*&...(....*..{....*2.{....o....*V.{....o....%-.&~#...*..{....*"..}....*&...(....*V.(".....}......}....*..{....*..{....*....0..#.........j-..*.s$.....(........,..o......*..................0..X.......s%.....o&...-..*..jo'......s(...... ....o)....o*....~......o+.....jo'........,..o......*......!.+L.......0.."........(......o*....o,....
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):1680384
Entropy (8bit):5.9158652584281235
Encrypted:false
SSDEEP:24576:bu0KzhOuLJpZi3M3FEacJpL99AdS/3cZM:KDzlDyMCawpaS/
MD5:E6663E129C949753773147061E5AC708
SHA1:301FF30F7A698FA67AF19CEB9063B09E8BA5163B
SHA-256:CDD6C407B61371280E49C9A2B34AF4EC06B0191993E6EDE8EFB9235990837977
SHA-512:00B4313247C367298E7CD529F5CEA1B9F8A74671477DE29A34474F2E132B0EE61EE629905C0788546ED53505983A59D6E1170F463869FE660E66F23CF691488C
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......y...=.f.=.f.=.f..w..>.f.=.g.C.f.4...&.f.4...6.f.4...f.f.4...<.f.#...<.f.4...<.f.Rich=.f.........................PE..d.....<W.........." ................................................................................................................0....#...p..(............p......................................................................8u...............................text...4........................... ..`.rdata..............................@..@.data...9Z.......B..................@....pdata.......p.......2..............@..@.idata..D....p.......2..............@...text....J............H..............@.. data....F ......."...N..............@..@.rsrc................p..............@..@.reloc.._........ ..................@..B........................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
Category:dropped
Size (bytes):826775
Entropy (8bit):6.520580307753605
Encrypted:false
SSDEEP:24576:QJCoOO8Mh2X8Vy0JHfv3kDpigeLKh2R6fFQVp:QL8MFVym/kDpitLKZy
MD5:16A1612789DC9063EBEA1CB55433B45B
SHA1:438FDE2939BBB9B5B437F64F21C316C17CE4A7F6
SHA-256:6DEAEC2F96C8A1C20698A93DDD468D5447B55AC426DC381EEF5D91B19953BB7B
SHA-512:D727CE8CD793C09A8688ACCB7A2EB5D8F84CC198B8E9D51C21E2DFB11D850F3AC64A58D07FF7FE9D1A2FDB613567E4790866C08A423176216FF310BF24A5A7E3
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...TM<W....*......!.....j.........................a.........................`.......#........ .........................................x.......................@/..................................................................................text...,i.......j..................`.P`.data................p..............@.`..rdata..............................@.`@.bss..................................`..edata...............f..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...x...........................@.0..reloc..@/.......0..................@.0B/4........... ......................@.@B/19.........0......................@..B/31..................j..............@..B/45.................................@..B/57.................................@.0B/70.....i.... ..........
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):10240
Entropy (8bit):5.408403475729264
Encrypted:false
SSDEEP:192:hjD5Bzu8mRd7ylc01dOF6Nr4mNiFHFEH3HGH8t+zaY6GVIb6:V9BXI4cqxCa+WFAzUeC6
MD5:4EE6C0578960BCB5DAD78947E0CBFFE9
SHA1:DD90488FFDE0B0DF76E0A5E8DCA8192C77619D8B
SHA-256:EB182D049BA19F697628E20228AF329780AAF62C3585A1E36B9FB988911FE697
SHA-512:0592166761C32AA804A26FB90191F636173B6E5144E4C10B100841FCB4D05CC30D8FFC3716E823D02DD3BCC73CFB9106639CF8AE2AEEBA409213F2F40DF5932C
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f.....................................................Rich....................PE..L...,N"`...........!................p'.......0...............................`............@.........................@2......l0..P............................P..\...P0...............................................0..L............................text............................... ..`.rdata..k....0......................@..@.data........@......."..............@....reloc.......P.......&..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):15872
Entropy (8bit):5.4709854684159085
Encrypted:false
SSDEEP:192:E6GQtZkTktEQUrJaZfuyCnSmUsv3sY7L7cW8Y6Q86QvoT311929WtshLAzgSrX8:E6Nt+4t7uJalUnGesY7Lt8nC3/Yosa
MD5:D1EEFB07ABC2577DFB92EB2E95A975E4
SHA1:0584C2B1807BC3BD10D4B60D2D23EEB0E6832CA2
SHA-256:89DD7D646278D8BFC41D5446BDC348B9A9AFAA832ABF02C1396272BB7AC7262A
SHA-512:EAFFD9940B1DF59E95E2ADB79B3B6415FFF5BF196EBEA5FE625A6C52E552A00B44D985A36A8DD9EB33EBA2425FFEA4244ED07A75D87284FF51EC9F9A5E1AC65E
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.px.q.+.q.+.q.+.q.+[q.+.~C+.q.+^R.+.q.+^R/+.q.+.w.+.q.+.Q.+.q.+Rich.q.+........PE..L....C.f...........!.........`.......+.......0............................................@..........................8......X1..................................X....................................................0..X............................text............................... ..`.rdata..G....0......."..............@..@.data...DL...@.......,..............@....rsrc................6..............@..@.reloc..x............8..............@..B........................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):12288
Entropy (8bit):5.805604762622714
Encrypted:false
SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
MD5:4ADD245D4BA34B04F213409BFE504C07
SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):1066
Entropy (8bit):3.697986458887617
Encrypted:false
SSDEEP:24:Q+sxv5SAD5ylSjqWCs7y6J9aQ9nO6k8lb2WvCxGKC96kDWlYpf:rsxwAQSjqQz9a78lbQV8
MD5:8F5F8C0B198B22805B684A52FA5BFBD3
SHA1:31AEFDE93E8EE12C564A83E5F05E55C384E39203
SHA-256:8CBFE04467E491138805F33B5FA1A0B3441052348EDCB7843DD8329DD263BB2E
SHA-512:DA3ABD8E8B2E34FA3989C504A8697017F49985B44FB305EC8C9C07A07647F98CFA5374CB14A3536D80B03852BC2A806106AC56ACC036690F7BF348181EE8050A
Malicious:false
Preview:..[.S.e.t.t.i.n.g.s.].....R.e.c.t.=.1.0.4.4.....N.u.m.F.i.e.l.d.s.=.3.....R.T.L.=.0.....N.e.x.t.B.u.t.t.o.n.T.e.x.t.=.&.F.i.n.i.s.h.....C.a.n.c.e.l.E.n.a.b.l.e.d.=.....S.t.a.t.e.=.0.....[.F.i.e.l.d. .1.].....T.y.p.e.=.b.i.t.m.a.p.....L.e.f.t.=.0.....R.i.g.h.t.=.1.0.9.....T.o.p.=.0.....B.o.t.t.o.m.=.1.9.3.....F.l.a.g.s.=.R.E.S.I.Z.E.T.O.F.I.T.....T.e.x.t.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.n.s.k.9.B.0.F...t.m.p.\.m.o.d.e.r.n.-.w.i.z.a.r.d...b.m.p.....H.W.N.D.=.9.1.7.6.3.2.....[.F.i.e.l.d. .2.].....T.y.p.e.=.l.a.b.e.l.....L.e.f.t.=.1.2.0.....R.i.g.h.t.=.3.1.5.....T.o.p.=.1.0.....T.e.x.t.=.C.o.m.p.l.e.t.i.n.g. .A.c.c.e.s.s.k.e.y. .S.e.t.u.p.....B.o.t.t.o.m.=.3.8.....H.W.N.D.=.8.5.3.0.5.0.....[.F.i.e.l.d. .3.].....T.y.p.e.=.l.a.b.e.l.....L.e.f.t.=.1.2.0.....R.i.g.h.t.=.3.1.5.....T.o.p.=.4.5.....B.o.t.t.o.m.=.1.8.5.....T.e.x.t.=.A.c.c.e.s.s.k.e.y. .h.a.s. .b.e.e.n. .i.n.s.t.a.l.l.e.d. .o.n. .y.o.u.r. .c.o.m.p.u.t.e.r...\.r.\.n.\.r.\.n.C.l.i.c.k. .F.i.n.i.s.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
Category:dropped
Size (bytes):26494
Entropy (8bit):1.9568109962493656
Encrypted:false
SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
Malicious:false
Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):7168
Entropy (8bit):5.2959870663251625
Encrypted:false
SSDEEP:96:JwzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuH0DQ:JTQHDb2vSuOc41ZfUNQZGdHM
MD5:B4579BC396ACE8CAFD9E825FF63FE244
SHA1:32A87ED28A510E3B3C06A451D1F3D0BA9FAF8D9C
SHA-256:01E72332362345C415A7EDCB366D6A1B52BE9AC6E946FB9DA49785C140BA1A4B
SHA-512:3A76E0E259A0CA12275FED922CE6E01BDFD9E33BA85973E80101B8025EF9243F5E32461A113BBCC6AA75E40894BB5D3A42D6B21045517B6B3CF12D76B4CFA36A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L...Q.d...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:data
Category:dropped
Size (bytes):11622
Entropy (8bit):7.262321244095951
Encrypted:false
SSDEEP:192:1fMl5zkpJC4eRe4fh8uEwFQbdxUNQlO8X01k9z3AXL9Wa38i:1Xp7Aeo8uExUKlO8R9zGpWa3z
MD5:F99106D82F0FF3A7CEDEF078919DD359
SHA1:C4281154C3B52B32467AB042B460333623033F3B
SHA-256:51FA1FC1D6CBA95C28E0AA3D622DFEBF925548ACB5440CC3CD865ED1DDBCDC9F
SHA-512:8F8DB7AC371C52F7C9622AADE894027B509D5EBD7FB75ED1C8813A7B1A01634EFCD25CEC0B8842E9FCC175550C39F3509A11D036F1247DF0E8E2F4B79E8790FA
Malicious:false
Preview:0.-b..*.H........-S0.-O...1.0...`.H.e......0..k..+.....7.....\0..X0...+.....7........ppwO..<.X.7+..230920084942Z0...+.....7.....0...0.... ..x...h.......+C..T...D.n..f.-1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... ..x...h.......+C..T...D.n..f.-0.....G.i..I7....K3U...1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0.... 2...F.[n.P.6.O.h...3in..=...?..@1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 2...F.[n.P.6.O.h...3in..=...?..@0....:........B~......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>.
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:data
Category:dropped
Size (bytes):11622
Entropy (8bit):7.262321244095951
Encrypted:false
SSDEEP:192:1fMl5zkpJC4eRe4fh8uEwFQbdxUNQlO8X01k9z3AXL9Wa38i:1Xp7Aeo8uExUKlO8R9zGpWa3z
MD5:F99106D82F0FF3A7CEDEF078919DD359
SHA1:C4281154C3B52B32467AB042B460333623033F3B
SHA-256:51FA1FC1D6CBA95C28E0AA3D622DFEBF925548ACB5440CC3CD865ED1DDBCDC9F
SHA-512:8F8DB7AC371C52F7C9622AADE894027B509D5EBD7FB75ED1C8813A7B1A01634EFCD25CEC0B8842E9FCC175550C39F3509A11D036F1247DF0E8E2F4B79E8790FA
Malicious:false
Preview:0.-b..*.H........-S0.-O...1.0...`.H.e......0..k..+.....7.....\0..X0...+.....7........ppwO..<.X.7+..230920084942Z0...+.....7.....0...0.... ..x...h.......+C..T...D.n..f.-1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... ..x...h.......+C..T...D.n..f.-0.....G.i..I7....K3U...1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0.... 2...F.[n.P.6.O.h...3in..=...?..@1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 2...F.[n.P.6.O.h...3in..=...?..@0....:........B~......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Jul 21 03:35:35 2024, mtime=Sun Jul 21 03:35:35 2024, atime=Sun Jul 21 03:35:35 2024, length=48, window=hide
Category:dropped
Size (bytes):1294
Entropy (8bit):4.599982412544224
Encrypted:false
SSDEEP:24:8mr3e2h0Exv0dOE4Z+ksGW9VoWdUAOlab+Nfd22WxWSd22WVVUUlnzHqyFm:8mBZqdOWVZjOla6Nfd8dMWiWyF
MD5:FCECCECD420ACE47079A6E01E993EA98
SHA1:13F99FF4BDFDF20666787AA8582FD75A0CBC3769
SHA-256:C7467B06A37556AF65F45C412733F651564361FBBD817781ABE2E89BC3BC32ED
SHA-512:BF85F407707F84E7405CD77A5CBABCF8002D576757F13295C021FB66149F3078050E0B481A97CEB4048D77637A43020CC1A0C9FC974EEC3F028EEF6B0303FCF0
Malicious:false
Preview:L..................F.... ......m'......m'......m'...0............................P.O. .:i.....+00.../C:\.....................1......Xi$..PROGRA~2.........O.I.Xi$....................V.....z...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1......Xi$..IDmelon.@.......Xi$.Xi$..........................z...I.D.m.e.l.o.n.....\.1......Xr$..ACCESS~1..D.......Xi$.Xr$...........................Sv.A.c.c.e.s.s.k.e.y.....x.2.0....Xr$ .ACCESS~1.URL..\.......Xr$.Xr$.....C....................B.e.A.c.c.e.s.s.k.e.y. .w.e.b.s.i.t.e...u.r.l.......m...............-.......l..............g.....C:\Program Files (x86)\IDmelon\Accesskey\Accesskey website.url..V.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.\.A.c.c.e.s.s.k.e.y. .w.e.b.s.i.t.e...u.r.l.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.........*................@Z|...K.J.........`.......X.......
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Jul 7 11:53:40 2024, mtime=Sun Jul 21 03:35:16 2024, atime=Sun Jul 7 11:53:40 2024, length=228392, window=hide
Category:dropped
Size (bytes):1269
Entropy (8bit):4.598817995773257
Encrypted:false
SSDEEP:24:8mRhh0Exv0dOE4Z+kw5WsK0WGcADlab+sxd22WxWGqgd22WVVUUlnzvqyFm:8mRhZqdO6FPDla6AdlgdMWiOyF
MD5:30AC5AFF99C01A92D4FC3532BEF390B5
SHA1:E6682409F302DF9CA5E8A82600C51E63B67301CB
SHA-256:A038C595D82CCA301EA06A7F633227E69808EADFAD3105FF140981C39F10114A
SHA-512:CBFD63857FABC5FDA4B924EF4048A0A029A186BA1C7635D792B54C2B7425AE9C82E791E332883CA05F807E9A93304DF10BA776B23228C315120D98C49DC7053E
Malicious:false
Preview:L..................F.... .......l.....b'.......l...(|...........................P.O. .:i.....+00.../C:\.....................1......Xi$..PROGRA~2.........O.I.Xi$....................V.....z...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1......Xi$..IDmelon.@.......Xi$.Xi$..........................z...I.D.m.e.l.o.n.....\.1......Xo$..ACCESS~1..D.......Xi$.Xo$...........................?..A.c.c.e.s.s.k.e.y.....n.2.(|...X.f .ACCESS~1.EXE..R.......X.f.Xi$..............................A.c.c.e.s.s.k.e.y.C.l.i...e.x.e.......h...............-.......g..............g.....C:\Program Files (x86)\IDmelon\Accesskey\AccesskeyCli.exe..Q.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.\.A.c.c.e.s.s.k.e.y.C.l.i...e.x.e.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.........*................@Z|...K.J.........`.......X.......141700...........hT..CrF.
Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Jul 21 03:35:35 2024, mtime=Sun Jul 21 03:35:35 2024, atime=Sun Jul 21 03:35:35 2024, length=175053, window=hide
Category:dropped
Size (bytes):1254
Entropy (8bit):4.640652829998599
Encrypted:false
SSDEEP:24:8mVh0Exv0dOE4Z+ksGWpSbHUAGlab+Bkd22WTvgd22WVVUUlnz7qyFm:8mVZqdO0GDGla6BkdSvgdMWi6yF
MD5:575EC00A1351248564EA80BBA7187A8C
SHA1:395650A78603C28FDBCB65957A34E7B88740F105
SHA-256:0042F4D22633CADC3ECA45DB10CFD9445532650A5CD1C7BDB5C206D4412BA47D
SHA-512:E1642E8E7C2567559FA3630794D8CE8174B9292A8D24DD308C003DB9ED5B6D1AAE2199207E06187AEC2BAFF4851AC690AFF4D8E3BE466D4D6FF4C86E85BF8C6B
Malicious:false
Preview:L..................F.... ....H.m'......m'......m'...............................P.O. .:i.....+00.../C:\.....................1......Xi$..PROGRA~2.........O.I.Xi$....................V.....z...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1......Xi$..IDmelon.@.......Xi$.Xi$..........................z...I.D.m.e.l.o.n.....\.1......Xr$..ACCESS~1..D.......Xi$.Xr$...........................Sv.A.c.c.e.s.s.k.e.y.....h.2.....Xr$ .UNINST~1.EXE..L.......Xr$.Xr$.....C....................E.q.u.n.i.n.s.t.a.l.l...e.x.e.......e...............-.......d..............g.....C:\Program Files (x86)\IDmelon\Accesskey\uninstall.exe..N.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.\.u.n.i.n.s.t.a.l.l...e.x.e.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.I.D.m.e.l.o.n.\.A.c.c.e.s.s.k.e.y.........*................@Z|...K.J.........`.......X.......141700...........hT..CrF.f4... ..T..b..
Process:C:\Windows\System32\drvinst.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
File Type:Generic INItialization configuration [BeginLog]
Category:dropped
Size (bytes):50904
Entropy (8bit):5.031514424084905
Encrypted:false
SSDEEP:768:Own95cdyYloiwQ+zf7DaLfgWpuaa1/9YdL1C:O+5cdyeoiwQ+z4Y8uhSzC
MD5:62C05FC75494C7258C677085DF4D73C6
SHA1:6907689DF565FDFA4F0F9CC8D0FA8FA321898BB1
SHA-256:3FF312F9C29408213CDA41DAF5E5DEB2C3F4907CA72B8D1463992BFFE4D79B10
SHA-512:0D1AC862EC423556DA8BD07BB79CB0182A7566A25188849F1C90F5CDCD09D76B731FAE403E4B7CE5F40CC9138C317BE484CB6B21C9C91A65B36FB28F8C339041
Malicious:false
Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
Process:C:\Windows\System32\drvinst.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Windows\System32\drvinst.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Windows\System32\drvinst.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Windows\System32\drvinst.exe
File Type:data
Category:dropped
Size (bytes):11622
Entropy (8bit):7.262321244095951
Encrypted:false
SSDEEP:192:1fMl5zkpJC4eRe4fh8uEwFQbdxUNQlO8X01k9z3AXL9Wa38i:1Xp7Aeo8uExUKlO8R9zGpWa3z
MD5:F99106D82F0FF3A7CEDEF078919DD359
SHA1:C4281154C3B52B32467AB042B460333623033F3B
SHA-256:51FA1FC1D6CBA95C28E0AA3D622DFEBF925548ACB5440CC3CD865ED1DDBCDC9F
SHA-512:8F8DB7AC371C52F7C9622AADE894027B509D5EBD7FB75ED1C8813A7B1A01634EFCD25CEC0B8842E9FCC175550C39F3509A11D036F1247DF0E8E2F4B79E8790FA
Malicious:false
Preview:0.-b..*.H........-S0.-O...1.0...`.H.e......0..k..+.....7.....\0..X0...+.....7........ppwO..<.X.7+..230920084942Z0...+.....7.....0...0.... ..x...h.......+C..T...D.n..f.-1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... ..x...h.......+C..T...D.n..f.-0.....G.i..I7....K3U...1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0.... 2...F.[n.P.6.O.h...3in..=...?..@1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 2...F.[n.P.6.O.h...3in..=...?..@0....:........B~......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>.
Process:C:\Windows\System32\drvinst.exe
File Type:Windows setup INFormation
Category:dropped
Size (bytes):4836
Entropy (8bit):3.7387330079455343
Encrypted:false
SSDEEP:48:rRxR/zoP0dlUlyFxloQPxWmxxvVARfmwCfi6gDVkf3iQLt97Hu6/OgTgy7dCrXL5:rh/z9YRfmwCfiTQR97O4p4v9lsqs0sI
MD5:8A71F48313969317868E08E1B8009DEF
SHA1:3AE7FDACC7BEF1ECCDBEE2427E97ED90EFE2CF04
SHA-256:09BB78FDE1F9681AACAA95880DB62B439DD6A25418D5E6BB44FB6EB90E66E12D
SHA-512:32480914934142D1FB808CABF9651AF6295228766C39AB22CE4E1BC4E50555F03415E798D5117139AFE1482F7FFE8DE5F1014D5A3A0AF2DB490039621210EA31
Malicious:false
Preview:..[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.I.N.D.O.W.S. .N.T.$.".....C.l.a.s.s.=.H.I.D.C.l.a.s.s.....C.l.a.s.s.G.u.i.d.=.{.7.4.5.a.1.7.a.0.-.7.4.d.3.-.1.1.d.0.-.b.6.f.e.-.0.0.a.0.c.9.0.f.5.7.d.a.}.....P.r.o.v.i.d.e.r.=.%.P.r.o.v.i.d.e.r.S.t.r.i.n.g.%.....D.r.i.v.e.r.V.e.r. .=. .0.4./.0.3./.2.0.2.3.,.2.1...4...5.3...4.8.8.....C.a.t.a.l.o.g.F.i.l.e.=.w.u.d.f...c.a.t.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .C.l.a.s.s. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........;.[.C.l.a.s.s.I.n.s.t.a.l.l.3.2.].....;.A.d.d.r.e.g.=.F.I.D.O.C.l.a.s.s.R.e.g.........;.[.F.I.D.O.C.l.a.s.s.R.e.g.].....;.H.K.R.,.,.,.0.,.%.C.l.a.s.s.N.a.m.e.%.....;.H.K.R.,.,.I.c.o.n.,.,.-.5.........;. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .D.e.v.i.c.e. .s.e.c.t.i.o.n. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.S.t.r.i.n.g.%.=.I.D.m.e.l.o.n.,. .N.T.a.m.d.6.4...6...3.........[.I.D.m.e.l.o.n...N.T.a.m.d.6.4...6...3.].....%.D.e.v.i.c.
Process:C:\Windows\System32\drvinst.exe
File Type:data
Category:dropped
Size (bytes):11622
Entropy (8bit):7.262321244095951
Encrypted:false
SSDEEP:192:1fMl5zkpJC4eRe4fh8uEwFQbdxUNQlO8X01k9z3AXL9Wa38i:1Xp7Aeo8uExUKlO8R9zGpWa3z
MD5:F99106D82F0FF3A7CEDEF078919DD359
SHA1:C4281154C3B52B32467AB042B460333623033F3B
SHA-256:51FA1FC1D6CBA95C28E0AA3D622DFEBF925548ACB5440CC3CD865ED1DDBCDC9F
SHA-512:8F8DB7AC371C52F7C9622AADE894027B509D5EBD7FB75ED1C8813A7B1A01634EFCD25CEC0B8842E9FCC175550C39F3509A11D036F1247DF0E8E2F4B79E8790FA
Malicious:false
Preview:0.-b..*.H........-S0.-O...1.0...`.H.e......0..k..+.....7.....\0..X0...+.....7........ppwO..<.X.7+..230920084942Z0...+.....7.....0...0.... ..x...h.......+C..T...D.n..f.-1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... ..x...h.......+C..T...D.n..f.-0.....G.i..I7....K3U...1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0.... 2...F.[n.P.6.O.h...3in..=...?..@1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>...F.i.l.e.......,a.c.c.e.s.s.k.e.y.f.i.d.o.v.h.i.d...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... 2...F.[n.P.6.O.h...3in..=...?..@0....:........B~......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0N..+.....7...1@0>.
Process:C:\Windows\System32\drvinst.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):4404
Entropy (8bit):5.389927050329088
Encrypted:false
SSDEEP:96:QO00eO00erMwUgWUg0B1kE3ZhpJp8ZpkRepk3hpTpbCpEpDk+psNVpsLb:QO00eO00erMwmkB1kAIrN43
MD5:AAC6A75645258D200ED5FBF42DEAE9ED
SHA1:E7430024CA6023B2F7AD22C855E6BFCBF46DFC83
SHA-256:D37899424B7B3B62FD41AA6BDF9F2EB65EEC0E8668F25599249FA98EA12EEFD1
SHA-512:BA99BCC009BE4393C8C995382DCE2181ED24A48E000DF55DD5C6363310D5708444790BDE401509AE692014F5B4CBD6196E7DA6F15A8AA426981D896978B01499
Malicious:false
Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
Process:C:\Windows\System32\drvinst.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
Process:C:\Windows\System32\drvinst.exe
File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):52944
Entropy (8bit):6.483483863603903
Encrypted:false
SSDEEP:1536:nXVCxosSAPn6cWynO6SUJhUZnY1PdBmz:XVzsZPnNWykLnYBm
MD5:42BB134409EB5B648998844608434CD7
SHA1:492284DD87E06372E6DDCA23D64C8B2FC771077B
SHA-256:0B502F92BF3B6B975D88EA60A2288134C18B3B28BC93A3482ED4C336B7DC674B
SHA-512:DAF807A2384A22425812DE390CCB33491874E206F5E9F6A9CCD16180D653A9F3DD2D659E1E668A32AAE5E974B800620CF9246355CF6FE02B0172E67BD62B010A
Malicious:false
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................[..............................F.....F.....F.7....F.....Rich...........................PE..d.....+d.........." ...".P...J.......@...................................................`A............................................X.......x........................8......D...0...8............................~..@............`...............................text...`O.......P.................. ..`.rdata...0...`...2...T..............@..@.data...P...........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D...........................@..B................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
Entropy (8bit):7.996926513434255
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
File size:32'784'232 bytes
MD5:c0d645827131ac1166dbe06d45511323
SHA1:1dfa4d4a7ad6817f3d774ecf1fea7b6730f6cbac
SHA256:3b0dc5d40dc74076656f303aa3652910d44ac2cf6492a4a405c6652a4e777714
SHA512:d7cd126057605d28f5dab766a667a5e6b4a18bb371922df3c60a2f56c3d5555869f1e9734fb703cda1fb73a1551807f968aff060c763024f7fdde695ea00895d
SSDEEP:786432:15db9hUqgrj2a4Zt4OeuJb394BkSCkhh6CN+v3cMB:15dbvUqYd4L4O/JbKBBBh/N+cMB
TLSH:267733C877519E36F9FCD3762A61204CFCA86ED37680F40E6405B357EA3F9A249C4A19
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................j.........
Icon Hash:183d47474b433d85
Entrypoint:0x403552
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x660843FB [Sat Mar 30 16:55:23 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f4639a0b3116c2cfc71144b88a929cfd
Signature Valid:false
Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
Signature Validation Error:A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file
Error Number:-2146762495
Not Before, Not After
  • 08/05/2024 20:43:05 15/06/2025 21:25:45
Subject Chain
  • CN=IDMELON TECHNOLOGIES INC., O=IDMELON TECHNOLOGIES INC., L=Vancouver, S=British Columbia, C=CA, OID.1.3.6.1.4.1.311.60.2.1.2=British Columbia, OID.1.3.6.1.4.1.311.60.2.1.3=CA, SERIALNUMBER=BC1233812, OID.2.5.4.15=Private Organization
Version:3
Thumbprint MD5:BFF7C718161D1B0634325495D4B5FD56
Thumbprint SHA-1:02C6A1A590289496DCA4D0C7997872B2081DF44F
Thumbprint SHA-256:5D1F98182AB7C9B075B727E829DBB46C0C7A69ECEC32C5C9C7230713EDA617BA
Serial:5D1D6B9CF96BC0FC88A26BE6
Instruction
sub esp, 000003F8h
push ebp
push esi
push edi
push 00000020h
pop edi
xor ebp, ebp
push 00008001h
mov dword ptr [esp+20h], ebp
mov dword ptr [esp+18h], 0040A2D8h
mov dword ptr [esp+14h], ebp
call dword ptr [004080A4h]
mov esi, dword ptr [004080A8h]
lea eax, dword ptr [esp+34h]
push eax
mov dword ptr [esp+4Ch], ebp
mov dword ptr [esp+0000014Ch], ebp
mov dword ptr [esp+00000150h], ebp
mov dword ptr [esp+38h], 0000011Ch
call esi
test eax, eax
jne 00007FE4CCC987EAh
lea eax, dword ptr [esp+34h]
mov dword ptr [esp+34h], 00000114h
push eax
call esi
mov ax, word ptr [esp+48h]
mov ecx, dword ptr [esp+62h]
sub ax, 00000053h
add ecx, FFFFFFD0h
neg ax
sbb eax, eax
mov byte ptr [esp+0000014Eh], 00000004h
not eax
and eax, ecx
mov word ptr [esp+00000148h], ax
cmp dword ptr [esp+38h], 0Ah
jnc 00007FE4CCC987B8h
and word ptr [esp+42h], 0000h
mov eax, dword ptr [esp+40h]
movzx ecx, byte ptr [esp+3Ch]
mov dword ptr [004347B8h], eax
xor eax, eax
mov ah, byte ptr [esp+38h]
movzx eax, ax
or eax, ecx
xor ecx, ecx
mov ch, byte ptr [esp+00000148h]
movzx ecx, cx
shl eax, 10h
or eax, ecx
movzx ecx, byte ptr [esp+0000004Eh]
Programming Language:
  • [EXP] VC++ 6.0 SP5 build 8804
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x86080xa0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x1afb8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x1f42d400x1228
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x68f80x6a00595406ea4e71ef6f8675a1bd30bcc8f9False0.6703272405660378data6.482222402519068IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x80000x14640x1600a995b118b38426885fc6ccaa984c8b7aFalse0.4314630681818182data4.969091535632612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xa0000x2a8180x6007a91ec9f1c18e608c3f3f503ba4191c1False0.5221354166666666data4.165541189894117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.ndata0x350000x140000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x490000x1afb80x1b000b2ca111a8128155706cf577de71e383fFalse0.1403175636574074data3.615451346061621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x492f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 8504 x 8504 px/mEnglishUnited States0.04499881698805158
RT_ICON0x59b200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 8504 x 8504 px/mEnglishUnited States0.08384506376948513
RT_ICON0x5dd480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 8504 x 8504 px/mEnglishUnited States0.11784232365145228
RT_ICON0x602f00x1c6bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9774570446735396
RT_ICON0x61f600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 8504 x 8504 px/mEnglishUnited States0.16674484052532834
RT_ICON0x630080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 8504 x 8504 px/mEnglishUnited States0.32092198581560283
RT_DIALOG0x634700x202dataEnglishUnited States0.4085603112840467
RT_DIALOG0x636780xf8dataEnglishUnited States0.6290322580645161
RT_DIALOG0x637700xa0dataEnglishUnited States0.60625
RT_DIALOG0x638100xeedataEnglishUnited States0.6302521008403361
RT_GROUP_ICON0x639000x5adataEnglishUnited States0.7777777777777778
RT_VERSION0x639600x224dataEnglishUnited States0.5145985401459854
RT_MANIFEST0x63b880x42eXML 1.0 document, ASCII text, with very long lines (1070), with no line terminatorsEnglishUnited States0.5130841121495328
DLLImport
ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Jul 21, 2024 06:35:25.468653917 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:25.468691111 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:25.468808889 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:25.482989073 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:25.483006954 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.404171944 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.404248953 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.408513069 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.408528090 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.408929110 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.463233948 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.509139061 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.552577019 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.682492971 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.694915056 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.694938898 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.971168041 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.971244097 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.971273899 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.971385002 CEST4434973234.214.245.150192.168.2.4
Jul 21, 2024 06:35:26.971431017 CEST49732443192.168.2.434.214.245.150
Jul 21, 2024 06:35:26.981785059 CEST49732443192.168.2.434.214.245.150
TimestampSource PortDest PortSource IPDest IP
Jul 21, 2024 06:35:25.255194902 CEST5582853192.168.2.41.1.1.1
Jul 21, 2024 06:35:25.458638906 CEST53558281.1.1.1192.168.2.4
TimestampSource IPDest IPChecksumCodeType
Jul 21, 2024 06:35:39.238286018 CEST192.168.2.48.8.8.8f7fdEcho
Jul 21, 2024 06:35:39.244776011 CEST8.8.8.8192.168.2.4fffdEcho Reply
Jul 21, 2024 06:35:43.245237112 CEST192.168.2.48.8.8.8f7fcEcho
Jul 21, 2024 06:35:43.252011061 CEST8.8.8.8192.168.2.4fffcEcho Reply
Jul 21, 2024 06:35:47.260957956 CEST192.168.2.48.8.8.8f7fbEcho
Jul 21, 2024 06:35:47.267374992 CEST8.8.8.8192.168.2.4fffbEcho Reply
Jul 21, 2024 06:35:51.276714087 CEST192.168.2.48.8.8.8f7faEcho
Jul 21, 2024 06:35:51.283415079 CEST8.8.8.8192.168.2.4fffaEcho Reply
Jul 21, 2024 06:35:55.292164087 CEST192.168.2.48.8.8.8f7f9Echo
Jul 21, 2024 06:35:55.298891068 CEST8.8.8.8192.168.2.4fff9Echo Reply
Jul 21, 2024 06:35:59.308401108 CEST192.168.2.48.8.8.8f7f8Echo
Jul 21, 2024 06:35:59.508060932 CEST8.8.8.8192.168.2.4fff8Echo Reply
Jul 21, 2024 06:36:03.329509020 CEST192.168.2.48.8.8.8f7f7Echo
Jul 21, 2024 06:36:03.337055922 CEST8.8.8.8192.168.2.4fff7Echo Reply
Jul 21, 2024 06:36:07.339082956 CEST192.168.2.48.8.8.8f7f6Echo
Jul 21, 2024 06:36:07.345227957 CEST8.8.8.8192.168.2.4fff6Echo Reply
Jul 21, 2024 06:36:11.353713036 CEST192.168.2.48.8.8.8f7f5Echo
Jul 21, 2024 06:36:11.360093117 CEST8.8.8.8192.168.2.4fff5Echo Reply
Jul 21, 2024 06:36:15.357193947 CEST192.168.2.48.8.8.8f7f4Echo
Jul 21, 2024 06:36:15.364824057 CEST8.8.8.8192.168.2.4fff4Echo Reply
Jul 21, 2024 06:36:19.370167017 CEST192.168.2.48.8.8.8f7f3Echo
Jul 21, 2024 06:36:19.377428055 CEST8.8.8.8192.168.2.4fff3Echo Reply
Jul 21, 2024 06:36:23.370456934 CEST192.168.2.48.8.8.8f7f2Echo
Jul 21, 2024 06:36:23.376945019 CEST8.8.8.8192.168.2.4fff2Echo Reply
Jul 21, 2024 06:36:27.370343924 CEST192.168.2.48.8.8.8f7f1Echo
Jul 21, 2024 06:36:27.376730919 CEST8.8.8.8192.168.2.4fff1Echo Reply
Jul 21, 2024 06:36:31.381580114 CEST192.168.2.48.8.8.8f7f0Echo
Jul 21, 2024 06:36:31.388252020 CEST8.8.8.8192.168.2.4fff0Echo Reply
Jul 21, 2024 06:36:35.381098032 CEST192.168.2.48.8.8.8f7efEcho
Jul 21, 2024 06:36:35.387454033 CEST8.8.8.8192.168.2.4ffefEcho Reply
Jul 21, 2024 06:36:39.395757914 CEST192.168.2.48.8.8.8f7eeEcho
Jul 21, 2024 06:36:39.402232885 CEST8.8.8.8192.168.2.4ffeeEcho Reply
Jul 21, 2024 06:36:39.514332056 CEST192.168.2.48.8.8.8f7edEcho
Jul 21, 2024 06:36:39.520581961 CEST8.8.8.8192.168.2.4ffedEcho Reply
Jul 21, 2024 06:36:41.808069944 CEST192.168.2.48.8.8.8f7ecEcho
Jul 21, 2024 06:36:41.816571951 CEST8.8.8.8192.168.2.4ffecEcho Reply
Jul 21, 2024 06:36:43.605217934 CEST192.168.2.48.8.8.8f7ebEcho
Jul 21, 2024 06:36:43.611576080 CEST8.8.8.8192.168.2.4ffebEcho Reply
Jul 21, 2024 06:36:46.434509039 CEST192.168.2.48.8.8.8f7eaEcho
Jul 21, 2024 06:36:46.441016912 CEST8.8.8.8192.168.2.4ffeaEcho Reply
Jul 21, 2024 06:36:49.495451927 CEST192.168.2.48.8.8.8f7e9Echo
Jul 21, 2024 06:36:49.501930952 CEST8.8.8.8192.168.2.4ffe9Echo Reply
Jul 21, 2024 06:36:50.139195919 CEST192.168.2.48.8.8.8f7e8Echo
Jul 21, 2024 06:36:50.145598888 CEST8.8.8.8192.168.2.4ffe8Echo Reply
Jul 21, 2024 06:36:54.149024010 CEST192.168.2.48.8.8.8f7e7Echo
Jul 21, 2024 06:36:54.155702114 CEST8.8.8.8192.168.2.4ffe7Echo Reply
Jul 21, 2024 06:36:55.511099100 CEST192.168.2.48.8.8.8f7e6Echo
Jul 21, 2024 06:36:55.517607927 CEST8.8.8.8192.168.2.4ffe6Echo Reply
Jul 21, 2024 06:36:59.519040108 CEST192.168.2.48.8.8.8f7e5Echo
Jul 21, 2024 06:36:59.526762009 CEST8.8.8.8192.168.2.4ffe5Echo Reply
Jul 21, 2024 06:37:01.573579073 CEST192.168.2.48.8.8.8f7e4Echo
Jul 21, 2024 06:37:01.579963923 CEST8.8.8.8192.168.2.4ffe4Echo Reply
Jul 21, 2024 06:37:05.576323032 CEST192.168.2.48.8.8.8f7e3Echo
Jul 21, 2024 06:37:05.583128929 CEST8.8.8.8192.168.2.4ffe3Echo Reply
Jul 21, 2024 06:37:06.342524052 CEST192.168.2.48.8.8.8f7e2Echo
Jul 21, 2024 06:37:06.349123001 CEST8.8.8.8192.168.2.4ffe2Echo Reply
Jul 21, 2024 06:37:07.074496031 CEST192.168.2.48.8.8.8f7e1Echo
Jul 21, 2024 06:37:07.080987930 CEST8.8.8.8192.168.2.4ffe1Echo Reply
Jul 21, 2024 06:37:11.082616091 CEST192.168.2.48.8.8.8f7e0Echo
Jul 21, 2024 06:37:11.089118004 CEST8.8.8.8192.168.2.4ffe0Echo Reply
Jul 21, 2024 06:37:11.854916096 CEST192.168.2.48.8.8.8f7dfEcho
Jul 21, 2024 06:37:11.861134052 CEST8.8.8.8192.168.2.4ffdfEcho Reply
Jul 21, 2024 06:37:14.918550014 CEST192.168.2.48.8.8.8f7deEcho
Jul 21, 2024 06:37:14.925329924 CEST8.8.8.8192.168.2.4ffdeEcho Reply
Jul 21, 2024 06:37:15.058505058 CEST192.168.2.48.8.8.8f7ddEcho
Jul 21, 2024 06:37:15.065285921 CEST8.8.8.8192.168.2.4ffddEcho Reply
Jul 21, 2024 06:37:15.154512882 CEST192.168.2.48.8.8.8f7dcEcho
Jul 21, 2024 06:37:15.161123037 CEST8.8.8.8192.168.2.4ffdcEcho Reply
Jul 21, 2024 06:37:17.090500116 CEST192.168.2.48.8.8.8f7dbEcho
Jul 21, 2024 06:37:17.097043991 CEST8.8.8.8192.168.2.4ffdbEcho Reply
Jul 21, 2024 06:37:21.090504885 CEST192.168.2.48.8.8.8f7daEcho
Jul 21, 2024 06:37:21.097064018 CEST8.8.8.8192.168.2.4ffdaEcho Reply
Jul 21, 2024 06:37:23.355067968 CEST192.168.2.48.8.8.8f7d9Echo
Jul 21, 2024 06:37:23.361496925 CEST8.8.8.8192.168.2.4ffd9Echo Reply
Jul 21, 2024 06:37:23.651870012 CEST192.168.2.48.8.8.8f7d8Echo
Jul 21, 2024 06:37:23.658175945 CEST8.8.8.8192.168.2.4ffd8Echo Reply
Jul 21, 2024 06:37:27.659151077 CEST192.168.2.48.8.8.8f7d7Echo
Jul 21, 2024 06:37:27.665544033 CEST8.8.8.8192.168.2.4ffd7Echo Reply
Jul 21, 2024 06:37:31.261543036 CEST192.168.2.48.8.8.8f7d6Echo
Jul 21, 2024 06:37:31.267900944 CEST8.8.8.8192.168.2.4ffd6Echo Reply
Jul 21, 2024 06:37:35.266547918 CEST192.168.2.48.8.8.8f7d5Echo
Jul 21, 2024 06:37:35.273160934 CEST8.8.8.8192.168.2.4ffd5Echo Reply
Jul 21, 2024 06:37:36.418545961 CEST192.168.2.48.8.8.8f7d4Echo
Jul 21, 2024 06:37:36.425097942 CEST8.8.8.8192.168.2.4ffd4Echo Reply
Jul 21, 2024 06:37:40.430550098 CEST192.168.2.48.8.8.8f7d3Echo
Jul 21, 2024 06:37:40.437068939 CEST8.8.8.8192.168.2.4ffd3Echo Reply
Jul 21, 2024 06:37:43.294548035 CEST192.168.2.48.8.8.8f7d2Echo
Jul 21, 2024 06:37:43.301178932 CEST8.8.8.8192.168.2.4ffd2Echo Reply
Jul 21, 2024 06:37:43.667490959 CEST192.168.2.48.8.8.8f7d1Echo
Jul 21, 2024 06:37:43.699852943 CEST8.8.8.8192.168.2.4ffd1Echo Reply
Jul 21, 2024 06:37:46.901658058 CEST192.168.2.48.8.8.8f7d0Echo
Jul 21, 2024 06:37:46.908037901 CEST8.8.8.8192.168.2.4ffd0Echo Reply
Jul 21, 2024 06:37:49.425477982 CEST192.168.2.48.8.8.8f7cfEcho
Jul 21, 2024 06:37:49.431981087 CEST8.8.8.8192.168.2.4ffcfEcho Reply
Jul 21, 2024 06:37:53.426018953 CEST192.168.2.48.8.8.8f7ceEcho
Jul 21, 2024 06:37:53.432614088 CEST8.8.8.8192.168.2.4ffceEcho Reply
Jul 21, 2024 06:37:56.276632071 CEST192.168.2.48.8.8.8f7cdEcho
Jul 21, 2024 06:37:56.283272028 CEST8.8.8.8192.168.2.4ffcdEcho Reply
Jul 21, 2024 06:37:56.794703007 CEST192.168.2.48.8.8.8f7ccEcho
Jul 21, 2024 06:37:56.801384926 CEST8.8.8.8192.168.2.4ffccEcho Reply
Jul 21, 2024 06:37:58.042417049 CEST192.168.2.48.8.8.8f7cbEcho
Jul 21, 2024 06:37:58.049446106 CEST8.8.8.8192.168.2.4ffcbEcho Reply
Jul 21, 2024 06:38:00.432837009 CEST192.168.2.48.8.8.8f7caEcho
Jul 21, 2024 06:38:00.439214945 CEST8.8.8.8192.168.2.4ffcaEcho Reply
Jul 21, 2024 06:38:04.440541983 CEST192.168.2.48.8.8.8f7c9Echo
Jul 21, 2024 06:38:04.447118044 CEST8.8.8.8192.168.2.4ffc9Echo Reply
Jul 21, 2024 06:38:08.245246887 CEST192.168.2.48.8.8.8f7c8Echo
Jul 21, 2024 06:38:08.252650976 CEST8.8.8.8192.168.2.4ffc8Echo Reply
Jul 21, 2024 06:38:12.245168924 CEST192.168.2.48.8.8.8f7c7Echo
Jul 21, 2024 06:38:12.251795053 CEST8.8.8.8192.168.2.4ffc7Echo Reply
Jul 21, 2024 06:38:16.260035038 CEST192.168.2.48.8.8.8f7c6Echo
Jul 21, 2024 06:38:16.267230034 CEST8.8.8.8192.168.2.4ffc6Echo Reply
Jul 21, 2024 06:38:20.112237930 CEST192.168.2.48.8.8.8f7c5Echo
Jul 21, 2024 06:38:20.118757963 CEST8.8.8.8192.168.2.4ffc5Echo Reply
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Jul 21, 2024 06:35:25.255194902 CEST192.168.2.41.1.1.10xc429Standard query (0)skm.idmelon.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Jul 21, 2024 06:35:25.458638906 CEST1.1.1.1192.168.2.40xc429No error (0)skm.idmelon.comk8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)false
Jul 21, 2024 06:35:25.458638906 CEST1.1.1.1192.168.2.40xc429No error (0)k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com34.214.245.150A (IP address)IN (0x0001)false
Jul 21, 2024 06:35:25.458638906 CEST1.1.1.1192.168.2.40xc429No error (0)k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com52.88.128.255A (IP address)IN (0x0001)false
Jul 21, 2024 06:35:25.458638906 CEST1.1.1.1192.168.2.40xc429No error (0)k8s-ingress-d93558caa8-947706621.us-west-2.elb.amazonaws.com52.35.62.19A (IP address)IN (0x0001)false
  • skm.idmelon.com
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.44973234.214.245.1504435064C:\Program Files (x86)\IDmelon\Accesskey\Service.exe
TimestampBytes transferredDirectionData
2024-07-21 04:35:26 UTC318OUTPOST /apis/access-key-cli/v1/apps HTTP/1.1
Accept: application/json, text/json, text/x-json, text/javascript, application/xml, text/xml
User-Agent: RestSharp/110.2.0.0
Content-Type: application/json
Host: skm.idmelon.com
Content-Length: 348
Expect: 100-continue
Accept-Encoding: gzip
Connection: Keep-Alive
2024-07-21 04:35:26 UTC25INHTTP/1.1 100 Continue
2024-07-21 04:35:26 UTC348OUTData Raw: 7b 22 75 6e 69 71 75 65 49 64 22 3a 22 58 52 46 34 43 54 36 53 52 50 48 45 41 31 36 30 56 4e 35 54 56 37 36 36 41 59 48 43 52 56 42 51 51 39 34 4a 5a 41 56 50 32 32 48 30 41 59 58 46 43 4e 5a 47 22 2c 22 6f 73 22 3a 7b 22 6e 61 6d 65 22 3a 22 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 39 30 34 35 22 7d 2c 22 61 70 70 76 65 72 73 69 6f 6e 22 3a 22 32 2e 37 2e 30 2e 30 22 2c 22 50 43 4e 61 6d 65 22 3a 22 31 34 31 37 30 30 22 2c 22 75 73 65 72 4e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 64 65 76 69 63 65 49 64 22 3a 6e 75 6c 6c 2c 22 70 75 62 6c 69 63 4b 65 79 22 3a 22 30 34 37 35 35 38 39 64 39 35 38 35 34 62 64 37 66 30 65 37 39 39 32 61 66 63 35 61 33 61 35 61 66 32 33 30 63 63 36
Data Ascii: {"uniqueId":"XRF4CT6SRPHEA160VN5TV766AYHCRVBQQ94JZAVP22H0AYXFCNZG","os":{"name":"Microsoft Windows 10 Pro","version":"19045"},"appversion":"2.7.0.0","PCName":"141700","userName":"SYSTEM","deviceId":null,"publicKey":"0475589d95854bd7f0e7992afc5a3a5af230cc6
2024-07-21 04:35:26 UTC1788INHTTP/1.1 200 OK
Date: Sun, 21 Jul 2024 04:35:26 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 496
Connection: close
Set-Cookie: AWSALB=Xs9D2OK848Xgenn3n8sK2KoBXbpVgqzDC5vuiHfEaLX8oCD7onX5l/2y14eZTwbLxG/MmPvEggDIMjAjcHHQcQc38pFdAk2JGtGwGfDRVEFa6u0L9Lz6jZP36s1p; Expires=Sun, 28 Jul 2024 04:35:26 GMT; Path=/
Set-Cookie: AWSALBCORS=Xs9D2OK848Xgenn3n8sK2KoBXbpVgqzDC5vuiHfEaLX8oCD7onX5l/2y14eZTwbLxG/MmPvEggDIMjAjcHHQcQc38pFdAk2JGtGwGfDRVEFa6u0L9Lz6jZP36s1p; Expires=Sun, 28 Jul 2024 04:35:26 GMT; Path=/; SameSite=None; Secure
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests
Cross-Origin-Opener-Policy: same-origin
Cross-Origin-Resource-Policy: same-origin
Origin-Agent-Cluster: ?1
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=15552000; includeSubDomains
X-Content-Type-Options: nosniff
X-DNS-Prefetch-Control: off
X-Download-Options: noopen
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: none
X-XSS-Protection: 0
ETag: W/"1f0-25PXIOn9fDbQ2YJMxD70CnVoy6Q"
{"appId":"669c900e0431ff000837d547","PCName":"141700","ip":"8.46.123.33","token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjp7ImNyZWF0ZWRBdCI6MTcyMTUzNjUyNjg4MCwiX2lkIjoiNjY5YzkwMGUwNDMxZmYwMDA4MzdkNTQ3In0sImlwIjoiOC40Ni4xMjMuMzMiLCJ1c2VyQWdlbnQiOiJSZXN0U2hhcnAvMTEwLjIuMC4wIiwiaWF0IjoxNzIxNTM2NTI2fQ.lAFTXKb0Zv2nI1iLvPNnotIrLG7Meqmmz8NGQKY_sKg","publicKey":"04e80ad41dd32e8b28bfd640e6d08e4bbea84d7f8bbb3e03797c3673e5f4b2f236faad80ab6cfa5169a1047ff1b558fcebaf87b8ef788dbb27b2c0fdde32b84623"}


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:00:35:11
Start date:21/07/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"
Imagebase:0x400000
File size:32'784'232 bytes
MD5 hash:C0D645827131AC1166DBE06D45511323
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:00:35:18
Start date:21/07/2024
Path:C:\Windows\SysWOW64\setx.exe
Wow64 process (32bit):true
Commandline:setx /M IDmelonMode access-key
Imagebase:0x400000
File size:46'592 bytes
MD5 hash:5B700BC00E451033B2F9EEF349A91D1C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:2
Start time:00:35:18
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:00:35:18
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyService "C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:00:35:18
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:00:35:18
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Application "C:\Program Files (x86)\IDmelon\Accesskey"\Service.exe
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:6
Start time:00:35:18
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:7
Start time:00:35:19
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:8
Start time:00:35:19
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:00:35:19
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:10
Start time:00:35:19
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:00:35:19
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\service_logs.log"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:12
Start time:00:35:19
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:00:35:19
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Description "Coordinates the communications for using IDmelon solution as a roaming authenticator"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:14
Start time:00:35:19
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:15
Start time:00:35:20
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStdoutCreationDisposition 4
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:16
Start time:00:35:20
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:17
Start time:00:35:20
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppStderrCreationDisposition 4
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:00:35:20
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:00:35:20
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateFiles 1
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:20
Start time:00:35:20
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:00:35:20
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateOnline 0
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:22
Start time:00:35:20
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:23
Start time:00:35:21
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateSeconds 14400
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:24
Start time:00:35:21
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:25
Start time:00:35:21
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService AppRotateBytes 5000000
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:26
Start time:00:35:21
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:27
Start time:00:35:21
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyService Start SERVICE_AUTO_START
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:28
Start time:00:35:21
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:29
Start time:00:35:21
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" restart AccesskeyService
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:30
Start time:00:35:21
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:31
Start time:00:35:21
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:false

Target ID:32
Start time:00:35:22
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:33
Start time:00:35:22
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\Service.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\Service.exe"
Imagebase:0x19d22290000
File size:165'928 bytes
MD5 hash:9E99F6F2DC43830D3959E55EDDDDB422
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 0%, ReversingLabs
Has exited:false

Target ID:34
Start time:00:35:22
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:false

Target ID:35
Start time:00:35:23
Start date:21/07/2024
Path:C:\Windows\System32\dsregcmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\dsregcmd.exe" /status
Imagebase:0x7ff634ad0000
File size:468'992 bytes
MD5 hash:866989AA656CF67780143376C12DF510
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:36
Start time:00:35:23
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" status AccesskeyService
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:37
Start time:00:35:23
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:38
Start time:00:35:24
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" start AccesskeyService
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:39
Start time:00:35:24
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:40
Start time:00:35:24
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccesskeyHid
Imagebase:0x7ff694610000
File size:83'456 bytes
MD5 hash:6EA4F64D02AE236A6B60E5E665079A89
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 0%, ReversingLabs
Has exited:true

Target ID:41
Start time:00:35:24
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:42
Start time:00:35:24
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" remove root\AccessKeyFidoVhid
Imagebase:0x7ff694610000
File size:83'456 bytes
MD5 hash:6EA4F64D02AE236A6B60E5E665079A89
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:43
Start time:00:35:24
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:44
Start time:00:35:24
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\Driver\devcon.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\driver\devcon.exe" install "C:\Program Files (x86)\IDmelon\Accesskey\driver\accesskeyfidovhid.inf" root\AccessKeyFidoVhid
Imagebase:0x7ff694610000
File size:83'456 bytes
MD5 hash:6EA4F64D02AE236A6B60E5E665079A89
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:45
Start time:00:35:25
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:46
Start time:00:35:26
Start date:21/07/2024
Path:C:\Windows\System32\svchost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
Imagebase:0x7ff6eef20000
File size:55'320 bytes
MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:47
Start time:00:35:26
Start date:21/07/2024
Path:C:\Windows\System32\drvinst.exe
Wow64 process (32bit):false
Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{e57175bf-8fbc-764b-ad7a-50e1a8f38e0f}\accesskeyfidovhid.inf" "9" "4196477d7" "0000000000000168" "WinSta0\Default" "0000000000000100" "208" "c:\program files (x86)\idmelon\accesskey\driver"
Imagebase:0x7ff72a770000
File size:337'920 bytes
MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:50
Start time:00:35:27
Start date:21/07/2024
Path:C:\Windows\System32\drvinst.exe
Wow64 process (32bit):false
Commandline:DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:50ab71fe221ae399:AccessKeyFidoVhid:21.4.53.488:root\accesskeyfidovhid," "4196477d7" "0000000000000168"
Imagebase:0x7ff72a770000
File size:337'920 bytes
MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:52
Start time:00:35:28
Start date:21/07/2024
Path:C:\Windows\System32\drivers\WUDFRd.sys
Wow64 process (32bit):
Commandline:
Imagebase:
File size:315'392 bytes
MD5 hash:0B7A5464602DA68DA6BEFC2A1B5BE4C5
Has elevated privileges:
Has administrator privileges:
Programmed in:C, C++ or other language
Has exited:false

Target ID:53
Start time:00:35:28
Start date:21/07/2024
Path:C:\Windows\System32\drivers\mshidumdf.sys
Wow64 process (32bit):
Commandline:
Imagebase:
File size:12'288 bytes
MD5 hash:9E90FE6DF363D2427A5C773120E7B27D
Has elevated privileges:
Has administrator privileges:
Programmed in:C, C++ or other language
Has exited:false

Target ID:54
Start time:00:35:28
Start date:21/07/2024
Path:C:\Windows\System32\WUDFHost.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\WUDFHost.exe" -HostGUID:{193a1820-d9ac-4997-8c55-be817523f6aa} -IoEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-3ba73f07-7082-44ba-ac25-62d6a3756b80 -SystemEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-0c2aa50f-a6b5-49c5-8b4d-5aa353434dea -IoCancelEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-d4f7a26f-e897-4801-9374-f1c601e77e78 -NonStateChangingEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-ec48fbad-1509-4711-bef9-62c3b1e095c0 -LifetimeId:a4533485-4f57-41b2-936a-ec5cac55ccfb -DeviceGroupId:WudfDefaultDevicePool -HostArg:0
Imagebase:0x7ff7e7d50000
File size:271'872 bytes
MD5 hash:00E2EF3D2C9309CA4135195A049CC79C
Has elevated privileges:true
Has administrator privileges:false
Programmed in:C, C++ or other language
Has exited:false

Target ID:55
Start time:00:35:28
Start date:21/07/2024
Path:C:\Windows\System32\drvinst.exe
Wow64 process (32bit):false
Commandline:DrvInst.exe "1" "0" "HID\HIDCLASS\1&2d595ca7&0&0000" "" "" "4eeb73e57" "0000000000000000"
Imagebase:0x7ff72a770000
File size:337'920 bytes
MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:56
Start time:00:35:30
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" install AccesskeyReaderService "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:57
Start time:00:35:30
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:58
Start time:00:35:30
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Application "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\accesskey-reader-service.exe"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:59
Start time:00:35:30
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:60
Start time:00:35:30
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppDirectory "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:61
Start time:00:35:30
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:62
Start time:00:35:30
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdout "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:63
Start time:00:35:30
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:64
Start time:00:35:31
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStderr "C:\Program Files (x86)\IDmelon\Accesskey\accesskey-reader\service_logs.log"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:65
Start time:00:35:31
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:66
Start time:00:35:31
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService Description "IDmelon Accesskey reader service which is responsible for reading Accesskey IDs"
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:67
Start time:00:35:31
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:68
Start time:00:35:31
Start date:21/07/2024
Path:C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe" set AccesskeyReaderService AppStdoutCreationDisposition 4
Imagebase:0x140000000
File size:373'288 bytes
MD5 hash:17DE7869B1B721B3FFF9DBE111CAAFF8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:69
Start time:00:35:31
Start date:21/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:29.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:16.6%
    Total number of Nodes:1353
    Total number of Limit Nodes:45
    execution_graph 2950 401bc0 2951 401c11 2950->2951 2952 401bcd 2950->2952 2954 401c16 2951->2954 2955 401c3b GlobalAlloc 2951->2955 2953 4023af 2952->2953 2959 401be4 2952->2959 2957 4065b4 21 API calls 2953->2957 2965 401c56 2954->2965 2988 406577 lstrcpynW 2954->2988 2969 4065b4 2955->2969 2958 4023bc 2957->2958 2989 405bd7 2958->2989 2986 406577 lstrcpynW 2959->2986 2961 401c28 GlobalFree 2961->2965 2964 401bf3 2987 406577 lstrcpynW 2964->2987 2967 401c02 2993 406577 lstrcpynW 2967->2993 2984 4065bf 2969->2984 2970 406806 2971 40681f 2970->2971 3016 406577 lstrcpynW 2970->3016 2971->2965 2973 4067d7 lstrlenW 2973->2984 2974 4065b4 15 API calls 2974->2973 2978 4066d0 GetSystemDirectoryW 2978->2984 2979 4066e6 GetWindowsDirectoryW 2979->2984 2980 406778 lstrcatW 2980->2984 2982 4065b4 15 API calls 2982->2984 2984->2970 2984->2973 2984->2974 2984->2978 2984->2979 2984->2980 2984->2982 2985 406748 SHGetPathFromIDListW CoTaskMemFree 2984->2985 2994 406445 2984->2994 2999 40696b GetModuleHandleA 2984->2999 3005 406825 2984->3005 3014 4064be wsprintfW 2984->3014 3015 406577 lstrcpynW 2984->3015 2985->2984 2986->2964 2987->2967 2988->2961 2990 405bec 2989->2990 2991 405c38 2990->2991 2992 405c00 MessageBoxIndirectW 2990->2992 2991->2965 2992->2991 2993->2965 3017 4063e4 2994->3017 2997 4064a9 2997->2984 2998 406479 RegQueryValueExW RegCloseKey 2998->2997 3000 406991 GetProcAddress 2999->3000 3001 406987 2999->3001 3004 4069a0 3000->3004 3021 4068fb GetSystemDirectoryW 3001->3021 3003 40698d 3003->3000 3003->3004 3004->2984 3006 406832 3005->3006 3008 40689b CharNextW 3006->3008 3009 4068a8 3006->3009 3012 406887 CharNextW 3006->3012 3013 406896 CharNextW 3006->3013 3024 405e73 3006->3024 3007 4068ad CharPrevW 3007->3009 3008->3006 3008->3009 3009->3007 3010 4068ce 3009->3010 3010->2984 3012->3006 3013->3008 3014->2984 3015->2984 3016->2971 3018 4063f3 3017->3018 3019 4063f7 3018->3019 3020 4063fc RegOpenKeyExW 3018->3020 3019->2997 3019->2998 3020->3019 3022 40691d wsprintfW LoadLibraryExW 3021->3022 3022->3003 3025 405e79 3024->3025 3026 405e8f 3025->3026 3027 405e80 CharNextW 3025->3027 3026->3006 3027->3025 3876 402641 3877 402dcb 21 API calls 3876->3877 3878 402648 3877->3878 3881 406067 GetFileAttributesW CreateFileW 3878->3881 3880 402654 3881->3880 3882 4025c3 3883 402e0b 21 API calls 3882->3883 3884 4025cd 3883->3884 3885 402da9 21 API calls 3884->3885 3886 4025d6 3885->3886 3887 4025f2 RegEnumKeyW 3886->3887 3888 4025fe RegEnumValueW 3886->3888 3890 402953 3886->3890 3889 402613 RegCloseKey 3887->3889 3888->3889 3889->3890 3240 4015c8 3241 402dcb 21 API calls 3240->3241 3242 4015cf SetFileAttributesW 3241->3242 3243 4015e1 3242->3243 3892 401fc9 3893 402dcb 21 API calls 3892->3893 3894 401fcf 3893->3894 3895 4055fc 28 API calls 3894->3895 3896 401fd9 3895->3896 3897 405b5a 2 API calls 3896->3897 3898 401fdf 3897->3898 3899 402002 CloseHandle 3898->3899 3903 402953 3898->3903 3905 406a16 WaitForSingleObject 3898->3905 3899->3903 3902 401ff4 3902->3899 3910 4064be wsprintfW 3902->3910 3906 406a30 3905->3906 3907 406a42 GetExitCodeProcess 3906->3907 3908 4069a7 2 API calls 3906->3908 3907->3902 3909 406a37 WaitForSingleObject 3908->3909 3909->3906 3910->3899 3269 4014cb 3270 4055fc 28 API calls 3269->3270 3271 4014d2 3270->3271 3272 4021cf 3273 402dcb 21 API calls 3272->3273 3274 4021d6 3273->3274 3275 402dcb 21 API calls 3274->3275 3276 4021e0 3275->3276 3277 402dcb 21 API calls 3276->3277 3278 4021ea 3277->3278 3279 402dcb 21 API calls 3278->3279 3280 4021f4 3279->3280 3281 402dcb 21 API calls 3280->3281 3282 4021fe 3281->3282 3283 40223d CoCreateInstance 3282->3283 3284 402dcb 21 API calls 3282->3284 3287 40225c 3283->3287 3284->3283 3285 401423 28 API calls 3286 40231b 3285->3286 3287->3285 3287->3286 3911 40204f 3912 402dcb 21 API calls 3911->3912 3913 402056 3912->3913 3914 40696b 5 API calls 3913->3914 3915 402065 3914->3915 3916 402081 GlobalAlloc 3915->3916 3925 4020f1 3915->3925 3917 402095 3916->3917 3916->3925 3918 40696b 5 API calls 3917->3918 3919 40209c 3918->3919 3920 40696b 5 API calls 3919->3920 3921 4020a6 3920->3921 3921->3925 3926 4064be wsprintfW 3921->3926 3923 4020df 3927 4064be wsprintfW 3923->3927 3926->3923 3927->3925 3928 40254f 3929 402e0b 21 API calls 3928->3929 3930 402559 3929->3930 3931 402dcb 21 API calls 3930->3931 3932 402562 3931->3932 3933 402953 3932->3933 3934 40256d RegQueryValueExW 3932->3934 3935 40258d 3934->3935 3938 402593 RegCloseKey 3934->3938 3935->3938 3939 4064be wsprintfW 3935->3939 3938->3933 3939->3938 3348 403552 SetErrorMode GetVersionExW 3349 4035a6 GetVersionExW 3348->3349 3350 4035de 3348->3350 3349->3350 3351 403635 3350->3351 3352 40696b 5 API calls 3350->3352 3353 4068fb 3 API calls 3351->3353 3352->3351 3354 40364b lstrlenA 3353->3354 3354->3351 3355 40365b 3354->3355 3356 40696b 5 API calls 3355->3356 3357 403662 3356->3357 3358 40696b 5 API calls 3357->3358 3359 403669 3358->3359 3360 40696b 5 API calls 3359->3360 3361 403675 #17 OleInitialize SHGetFileInfoW 3360->3361 3436 406577 lstrcpynW 3361->3436 3364 4036c4 GetCommandLineW 3437 406577 lstrcpynW 3364->3437 3366 4036d6 3367 405e73 CharNextW 3366->3367 3368 4036fc CharNextW 3367->3368 3373 40370e 3368->3373 3369 403810 3370 403824 GetTempPathW 3369->3370 3438 403521 3370->3438 3372 40383c 3374 403840 GetWindowsDirectoryW lstrcatW 3372->3374 3375 403896 DeleteFileW 3372->3375 3373->3369 3376 405e73 CharNextW 3373->3376 3382 403812 3373->3382 3377 403521 12 API calls 3374->3377 3448 4030a2 GetTickCount GetModuleFileNameW 3375->3448 3376->3373 3379 40385c 3377->3379 3379->3375 3381 403860 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3379->3381 3380 4038aa 3383 403a9d ExitProcess OleUninitialize 3380->3383 3388 403951 3380->3388 3389 405e73 CharNextW 3380->3389 3385 403521 12 API calls 3381->3385 3532 406577 lstrcpynW 3382->3532 3386 403ad3 3383->3386 3387 403aaf 3383->3387 3393 40388e 3385->3393 3390 403b57 ExitProcess 3386->3390 3391 403adb GetCurrentProcess OpenProcessToken 3386->3391 3394 405bd7 MessageBoxIndirectW 3387->3394 3476 403c49 3388->3476 3404 4038c9 3389->3404 3395 403af3 LookupPrivilegeValueW AdjustTokenPrivileges 3391->3395 3396 403b27 3391->3396 3393->3375 3393->3383 3399 403abd ExitProcess 3394->3399 3395->3396 3400 40696b 5 API calls 3396->3400 3397 403961 3397->3383 3401 403b2e 3400->3401 3406 403b43 ExitWindowsEx 3401->3406 3409 403b50 3401->3409 3402 403927 3407 405f4e 18 API calls 3402->3407 3403 40396a 3405 405b42 5 API calls 3403->3405 3404->3402 3404->3403 3408 40396f lstrlenW 3405->3408 3406->3390 3406->3409 3410 403933 3407->3410 3535 406577 lstrcpynW 3408->3535 3540 40140b 3409->3540 3410->3383 3533 406577 lstrcpynW 3410->3533 3413 403989 3415 4039a1 3413->3415 3536 406577 lstrcpynW 3413->3536 3419 4039c7 wsprintfW 3415->3419 3433 4039f3 3415->3433 3416 403946 3534 406577 lstrcpynW 3416->3534 3420 4065b4 21 API calls 3419->3420 3420->3415 3421 405acb 2 API calls 3421->3433 3422 405b25 2 API calls 3422->3433 3423 403a03 GetFileAttributesW 3425 403a0f DeleteFileW 3423->3425 3423->3433 3424 403a3d SetCurrentDirectoryW 3426 406337 40 API calls 3424->3426 3425->3433 3428 403a4c CopyFileW 3426->3428 3427 403a3b 3427->3383 3428->3427 3428->3433 3429 405c83 71 API calls 3429->3433 3430 406337 40 API calls 3430->3433 3431 4065b4 21 API calls 3431->3433 3433->3415 3433->3419 3433->3421 3433->3422 3433->3423 3433->3424 3433->3427 3433->3429 3433->3430 3433->3431 3434 403ac5 CloseHandle 3433->3434 3435 4068d4 2 API calls 3433->3435 3537 405b5a CreateProcessW 3433->3537 3434->3427 3435->3433 3436->3364 3437->3366 3439 406825 5 API calls 3438->3439 3440 40352d 3439->3440 3441 403537 3440->3441 3442 405e46 3 API calls 3440->3442 3441->3372 3443 40353f 3442->3443 3444 405b25 2 API calls 3443->3444 3445 403545 3444->3445 3446 406096 2 API calls 3445->3446 3447 403550 3446->3447 3447->3372 3543 406067 GetFileAttributesW CreateFileW 3448->3543 3450 4030e2 3451 4030f2 3450->3451 3544 406577 lstrcpynW 3450->3544 3451->3380 3453 403108 3454 405e92 2 API calls 3453->3454 3455 40310e 3454->3455 3545 406577 lstrcpynW 3455->3545 3457 403119 GetFileSize 3458 403130 3457->3458 3473 403213 3457->3473 3458->3451 3461 4034f4 ReadFile 3458->3461 3464 40327f 3458->3464 3472 40303e 6 API calls 3458->3472 3458->3473 3460 40321c 3460->3451 3462 40324c GlobalAlloc 3460->3462 3558 40350a SetFilePointer 3460->3558 3461->3458 3557 40350a SetFilePointer 3462->3557 3466 40303e 6 API calls 3464->3466 3466->3451 3467 403235 3470 4034f4 ReadFile 3467->3470 3468 403267 3469 4032d9 35 API calls 3468->3469 3474 403273 3469->3474 3471 403240 3470->3471 3471->3451 3471->3462 3472->3458 3546 40303e 3473->3546 3474->3451 3474->3474 3475 4032b0 SetFilePointer 3474->3475 3475->3451 3477 40696b 5 API calls 3476->3477 3478 403c5d 3477->3478 3479 403c63 3478->3479 3480 403c75 3478->3480 3578 4064be wsprintfW 3479->3578 3481 406445 3 API calls 3480->3481 3483 403ca5 3481->3483 3482 403cc4 lstrcatW 3486 403c73 3482->3486 3483->3482 3485 406445 3 API calls 3483->3485 3485->3482 3563 403f1f 3486->3563 3489 405f4e 18 API calls 3490 403cf6 3489->3490 3491 403d8a 3490->3491 3493 406445 3 API calls 3490->3493 3492 405f4e 18 API calls 3491->3492 3494 403d90 3492->3494 3496 403d28 3493->3496 3495 403da0 LoadImageW 3494->3495 3497 4065b4 21 API calls 3494->3497 3498 403e46 3495->3498 3499 403dc7 RegisterClassW 3495->3499 3496->3491 3500 403d49 lstrlenW 3496->3500 3503 405e73 CharNextW 3496->3503 3497->3495 3502 40140b 2 API calls 3498->3502 3501 403dfd SystemParametersInfoW CreateWindowExW 3499->3501 3531 403e50 3499->3531 3504 403d57 lstrcmpiW 3500->3504 3505 403d7d 3500->3505 3501->3498 3506 403e4c 3502->3506 3507 403d46 3503->3507 3504->3505 3508 403d67 GetFileAttributesW 3504->3508 3509 405e46 3 API calls 3505->3509 3511 403f1f 22 API calls 3506->3511 3506->3531 3507->3500 3510 403d73 3508->3510 3512 403d83 3509->3512 3510->3505 3513 405e92 2 API calls 3510->3513 3514 403e5d 3511->3514 3579 406577 lstrcpynW 3512->3579 3513->3505 3516 403e69 ShowWindow 3514->3516 3517 403eec 3514->3517 3519 4068fb 3 API calls 3516->3519 3571 4056cf OleInitialize 3517->3571 3521 403e81 3519->3521 3520 403ef2 3522 403ef6 3520->3522 3523 403f0e 3520->3523 3524 403e8f GetClassInfoW 3521->3524 3526 4068fb 3 API calls 3521->3526 3530 40140b 2 API calls 3522->3530 3522->3531 3525 40140b 2 API calls 3523->3525 3527 403ea3 GetClassInfoW RegisterClassW 3524->3527 3528 403eb9 DialogBoxParamW 3524->3528 3525->3531 3526->3524 3527->3528 3529 40140b 2 API calls 3528->3529 3529->3531 3530->3531 3531->3397 3532->3370 3533->3416 3534->3388 3535->3413 3536->3415 3538 405b99 3537->3538 3539 405b8d CloseHandle 3537->3539 3538->3433 3539->3538 3541 401389 2 API calls 3540->3541 3542 401420 3541->3542 3542->3390 3543->3450 3544->3453 3545->3457 3547 403047 3546->3547 3548 40305f 3546->3548 3549 403050 DestroyWindow 3547->3549 3550 403057 3547->3550 3551 403067 3548->3551 3552 40306f GetTickCount 3548->3552 3549->3550 3550->3460 3559 4069a7 3551->3559 3553 4030a0 3552->3553 3554 40307d CreateDialogParamW ShowWindow 3552->3554 3553->3460 3554->3553 3557->3468 3558->3467 3560 4069c4 PeekMessageW 3559->3560 3561 40306d 3560->3561 3562 4069ba DispatchMessageW 3560->3562 3561->3460 3562->3560 3564 403f33 3563->3564 3580 4064be wsprintfW 3564->3580 3566 403fa4 3581 403fd8 3566->3581 3568 403cd4 3568->3489 3569 403fa9 3569->3568 3570 4065b4 21 API calls 3569->3570 3570->3569 3584 404542 3571->3584 3573 404542 SendMessageW 3575 40572b OleUninitialize 3573->3575 3574 4056f2 3577 405719 3574->3577 3587 401389 3574->3587 3575->3520 3577->3573 3578->3486 3579->3491 3580->3566 3582 4065b4 21 API calls 3581->3582 3583 403fe6 SetWindowTextW 3582->3583 3583->3569 3585 40455a 3584->3585 3586 40454b SendMessageW 3584->3586 3585->3574 3586->3585 3589 401390 3587->3589 3588 4013fe 3588->3574 3589->3588 3590 4013cb MulDiv SendMessageW 3589->3590 3590->3589 3940 401a55 3941 402dcb 21 API calls 3940->3941 3942 401a5e ExpandEnvironmentStringsW 3941->3942 3943 401a72 3942->3943 3945 401a85 3942->3945 3944 401a77 lstrcmpW 3943->3944 3943->3945 3944->3945 3662 4023d7 3663 4023df 3662->3663 3667 4023e5 3662->3667 3664 402dcb 21 API calls 3663->3664 3664->3667 3665 402401 3670 402dcb 21 API calls 3665->3670 3666 4023f3 3666->3665 3669 402dcb 21 API calls 3666->3669 3667->3666 3668 402dcb 21 API calls 3667->3668 3668->3666 3669->3665 3671 40240a WritePrivateProfileStringW 3670->3671 3946 4014d7 3947 402da9 21 API calls 3946->3947 3948 4014dd Sleep 3947->3948 3950 402c4f 3948->3950 3766 402459 3767 402461 3766->3767 3768 40248c 3766->3768 3782 402e0b 3767->3782 3769 402dcb 21 API calls 3768->3769 3771 402493 3769->3771 3778 402e89 3771->3778 3774 402472 3775 402dcb 21 API calls 3774->3775 3777 402479 RegDeleteValueW RegCloseKey 3775->3777 3776 4024a0 3777->3776 3779 402e9d 3778->3779 3781 402e96 3778->3781 3779->3781 3787 402ece 3779->3787 3781->3776 3783 402dcb 21 API calls 3782->3783 3784 402e22 3783->3784 3785 4063e4 RegOpenKeyExW 3784->3785 3786 402468 3785->3786 3786->3774 3786->3776 3788 4063e4 RegOpenKeyExW 3787->3788 3789 402efc 3788->3789 3790 402fb1 3789->3790 3791 402f0c RegEnumValueW 3789->3791 3792 402f2f 3789->3792 3790->3781 3791->3792 3793 402f96 RegCloseKey 3791->3793 3792->3793 3794 402f6b RegEnumKeyW 3792->3794 3795 402f74 RegCloseKey 3792->3795 3798 402ece 6 API calls 3792->3798 3793->3790 3794->3792 3794->3795 3796 40696b 5 API calls 3795->3796 3797 402f84 3796->3797 3799 402fa6 RegDeleteKeyExW 3797->3799 3800 402f88 RegDeleteKeyW 3797->3800 3798->3792 3799->3790 3800->3790 3956 40175a 3957 402dcb 21 API calls 3956->3957 3958 401761 SearchPathW 3957->3958 3959 40177c 3958->3959 3960 401d5d 3961 402da9 21 API calls 3960->3961 3962 401d64 3961->3962 3963 402da9 21 API calls 3962->3963 3964 401d70 GetDlgItem 3963->3964 3965 40265d 3964->3965 3966 404f63 GetDlgItem GetDlgItem 3967 404fb5 7 API calls 3966->3967 3973 4051da 3966->3973 3968 40505c DeleteObject 3967->3968 3969 40504f SendMessageW 3967->3969 3970 405065 3968->3970 3969->3968 3971 40509c 3970->3971 3974 4065b4 21 API calls 3970->3974 3975 4044f6 22 API calls 3971->3975 3972 4052bc 3976 405368 3972->3976 3986 405315 SendMessageW 3972->3986 4009 4051cd 3972->4009 3973->3972 4005 405249 3973->4005 4020 404eb1 SendMessageW 3973->4020 3979 40507e SendMessageW SendMessageW 3974->3979 3980 4050b0 3975->3980 3977 405372 SendMessageW 3976->3977 3978 40537a 3976->3978 3977->3978 3983 4053a3 3978->3983 3988 405393 3978->3988 3989 40538c ImageList_Destroy 3978->3989 3979->3970 3985 4044f6 22 API calls 3980->3985 3981 4052ae SendMessageW 3981->3972 3982 40455d 8 API calls 3987 405569 3982->3987 3990 40551d 3983->3990 4013 4053de 3983->4013 4025 404f31 3983->4025 3997 4050c1 3985->3997 3991 40532a SendMessageW 3986->3991 3986->4009 3988->3983 3992 40539c GlobalFree 3988->3992 3989->3988 3995 40552f ShowWindow GetDlgItem ShowWindow 3990->3995 3990->4009 3994 40533d 3991->3994 3992->3983 3993 40519c GetWindowLongW SetWindowLongW 3996 4051b5 3993->3996 4000 40534e SendMessageW 3994->4000 3995->4009 3998 4051d2 3996->3998 3999 4051ba ShowWindow 3996->3999 3997->3993 4001 405197 3997->4001 4004 405114 SendMessageW 3997->4004 4006 405152 SendMessageW 3997->4006 4007 405166 SendMessageW 3997->4007 4019 40452b SendMessageW 3998->4019 4018 40452b SendMessageW 3999->4018 4000->3976 4001->3993 4001->3996 4004->3997 4005->3972 4005->3981 4006->3997 4007->3997 4009->3982 4010 4054e8 4011 4054f3 InvalidateRect 4010->4011 4014 4054ff 4010->4014 4011->4014 4012 40540c SendMessageW 4016 405422 4012->4016 4013->4012 4013->4016 4014->3990 4034 404e6c 4014->4034 4015 405496 SendMessageW SendMessageW 4015->4016 4016->4010 4016->4015 4018->4009 4019->3973 4021 404f10 SendMessageW 4020->4021 4022 404ed4 GetMessagePos ScreenToClient SendMessageW 4020->4022 4023 404f08 4021->4023 4022->4023 4024 404f0d 4022->4024 4023->4005 4024->4021 4037 406577 lstrcpynW 4025->4037 4027 404f44 4038 4064be wsprintfW 4027->4038 4029 404f4e 4030 40140b 2 API calls 4029->4030 4031 404f57 4030->4031 4039 406577 lstrcpynW 4031->4039 4033 404f5e 4033->4013 4040 404da3 4034->4040 4036 404e81 4036->3990 4037->4027 4038->4029 4039->4033 4041 404dbc 4040->4041 4042 4065b4 21 API calls 4041->4042 4043 404e20 4042->4043 4044 4065b4 21 API calls 4043->4044 4045 404e2b 4044->4045 4046 4065b4 21 API calls 4045->4046 4047 404e41 lstrlenW wsprintfW SetDlgItemTextW 4046->4047 4047->4036 4048 402663 4049 402692 4048->4049 4050 402677 4048->4050 4052 4026c2 4049->4052 4053 402697 4049->4053 4051 402da9 21 API calls 4050->4051 4062 40267e 4051->4062 4054 402dcb 21 API calls 4052->4054 4055 402dcb 21 API calls 4053->4055 4056 4026c9 lstrlenW 4054->4056 4057 40269e 4055->4057 4056->4062 4065 406599 WideCharToMultiByte 4057->4065 4059 4026b2 lstrlenA 4059->4062 4060 4026f6 4061 40270c 4060->4061 4063 406119 WriteFile 4060->4063 4062->4060 4062->4061 4066 406148 SetFilePointer 4062->4066 4063->4061 4065->4059 4067 406164 4066->4067 4072 40617c 4066->4072 4068 4060ea ReadFile 4067->4068 4069 406170 4068->4069 4070 406185 SetFilePointer 4069->4070 4071 4061ad SetFilePointer 4069->4071 4069->4072 4070->4071 4073 406190 4070->4073 4071->4072 4072->4060 4074 406119 WriteFile 4073->4074 4074->4072 3128 4015e6 3129 402dcb 21 API calls 3128->3129 3130 4015ed 3129->3130 3147 405ef1 CharNextW CharNextW 3130->3147 3132 401656 3134 401688 3132->3134 3135 40165b 3132->3135 3133 405e73 CharNextW 3143 4015f6 3133->3143 3138 401423 28 API calls 3134->3138 3136 401423 28 API calls 3135->3136 3137 401662 3136->3137 3159 406577 lstrcpynW 3137->3159 3145 401680 3138->3145 3142 40166f SetCurrentDirectoryW 3142->3145 3143->3132 3143->3133 3144 40163c GetFileAttributesW 3143->3144 3153 405b42 3143->3153 3156 405acb CreateDirectoryW 3143->3156 3160 405b25 CreateDirectoryW 3143->3160 3144->3143 3148 405f0e 3147->3148 3151 405f20 3147->3151 3150 405f1b CharNextW 3148->3150 3148->3151 3149 405f44 3149->3143 3150->3149 3151->3149 3152 405e73 CharNextW 3151->3152 3152->3151 3154 40696b 5 API calls 3153->3154 3155 405b49 3154->3155 3155->3143 3157 405b17 3156->3157 3158 405b1b GetLastError 3156->3158 3157->3143 3158->3157 3159->3142 3161 405b35 3160->3161 3162 405b39 GetLastError 3160->3162 3161->3143 3162->3161 3163 401966 3164 401968 3163->3164 3165 402dcb 21 API calls 3164->3165 3166 40196d 3165->3166 3169 405c83 3166->3169 3205 405f4e 3169->3205 3172 405cab DeleteFileW 3177 401976 3172->3177 3173 405cc2 3174 405de2 3173->3174 3219 406577 lstrcpynW 3173->3219 3174->3177 3182 4068d4 2 API calls 3174->3182 3176 405ce8 3178 405cfb 3176->3178 3179 405cee lstrcatW 3176->3179 3220 405e92 lstrlenW 3178->3220 3180 405d01 3179->3180 3183 405d11 lstrcatW 3180->3183 3185 405d1c lstrlenW FindFirstFileW 3180->3185 3184 405e07 3182->3184 3183->3185 3184->3177 3233 405e46 lstrlenW CharPrevW 3184->3233 3185->3174 3203 405d3e 3185->3203 3188 405dc5 FindNextFileW 3192 405ddb FindClose 3188->3192 3188->3203 3189 405c3b 5 API calls 3191 405e1d 3189->3191 3193 405e21 3191->3193 3194 405e37 3191->3194 3192->3174 3193->3177 3197 4055fc 28 API calls 3193->3197 3196 4055fc 28 API calls 3194->3196 3196->3177 3199 405e2e 3197->3199 3198 405c83 64 API calls 3198->3203 3200 406337 40 API calls 3199->3200 3200->3177 3201 4055fc 28 API calls 3201->3188 3202 4055fc 28 API calls 3202->3203 3203->3188 3203->3198 3203->3201 3203->3202 3204 406337 40 API calls 3203->3204 3224 406577 lstrcpynW 3203->3224 3225 405c3b 3203->3225 3204->3203 3236 406577 lstrcpynW 3205->3236 3207 405f5f 3208 405ef1 4 API calls 3207->3208 3209 405f65 3208->3209 3210 405ca3 3209->3210 3211 406825 5 API calls 3209->3211 3210->3172 3210->3173 3217 405f75 3211->3217 3212 405fa6 lstrlenW 3213 405fb1 3212->3213 3212->3217 3215 405e46 3 API calls 3213->3215 3214 4068d4 2 API calls 3214->3217 3216 405fb6 GetFileAttributesW 3215->3216 3216->3210 3217->3210 3217->3212 3217->3214 3218 405e92 2 API calls 3217->3218 3218->3212 3219->3176 3221 405ea0 3220->3221 3222 405eb2 3221->3222 3223 405ea6 CharPrevW 3221->3223 3222->3180 3223->3221 3223->3222 3224->3203 3237 406042 GetFileAttributesW 3225->3237 3228 405c68 3228->3203 3229 405c56 RemoveDirectoryW 3231 405c64 3229->3231 3230 405c5e DeleteFileW 3230->3231 3231->3228 3232 405c74 SetFileAttributesW 3231->3232 3232->3228 3234 405e62 lstrcatW 3233->3234 3235 405e11 3233->3235 3234->3235 3235->3189 3236->3207 3238 405c47 3237->3238 3239 406054 SetFileAttributesW 3237->3239 3238->3228 3238->3229 3238->3230 3239->3238 4075 404666 lstrlenW 4076 404685 4075->4076 4077 404687 WideCharToMultiByte 4075->4077 4076->4077 4078 4049e7 4079 404a13 4078->4079 4080 404a24 4078->4080 4139 405bbb GetDlgItemTextW 4079->4139 4082 404a30 GetDlgItem 4080->4082 4114 404a8f 4080->4114 4086 404a44 4082->4086 4083 404a1e 4084 406825 5 API calls 4083->4084 4084->4080 4085 404a58 SetWindowTextW 4091 4044f6 22 API calls 4085->4091 4086->4085 4090 405ef1 4 API calls 4086->4090 4087 404d22 4089 40455d 8 API calls 4087->4089 4094 404d36 4089->4094 4095 404a4e 4090->4095 4096 404a74 4091->4096 4092 4065b4 21 API calls 4097 404b03 SHBrowseForFolderW 4092->4097 4093 404ba3 4098 405f4e 18 API calls 4093->4098 4095->4085 4105 405e46 3 API calls 4095->4105 4099 4044f6 22 API calls 4096->4099 4100 404b73 4097->4100 4101 404b1b CoTaskMemFree 4097->4101 4102 404ba9 4098->4102 4103 404a82 4099->4103 4100->4087 4141 405bbb GetDlgItemTextW 4100->4141 4104 405e46 3 API calls 4101->4104 4142 406577 lstrcpynW 4102->4142 4140 40452b SendMessageW 4103->4140 4107 404b28 4104->4107 4105->4085 4110 404b5f SetDlgItemTextW 4107->4110 4115 4065b4 21 API calls 4107->4115 4109 404a88 4112 40696b 5 API calls 4109->4112 4110->4100 4111 404bc0 4113 40696b 5 API calls 4111->4113 4112->4114 4122 404bc7 4113->4122 4114->4087 4114->4092 4114->4100 4116 404b47 lstrcmpiW 4115->4116 4116->4110 4119 404b58 lstrcatW 4116->4119 4117 404c08 4143 406577 lstrcpynW 4117->4143 4119->4110 4120 404c0f 4121 405ef1 4 API calls 4120->4121 4123 404c15 GetDiskFreeSpaceW 4121->4123 4122->4117 4126 405e92 2 API calls 4122->4126 4128 404c60 4122->4128 4125 404c39 MulDiv 4123->4125 4123->4128 4125->4128 4126->4122 4127 404cd1 4130 404cf4 4127->4130 4132 40140b 2 API calls 4127->4132 4128->4127 4129 404e6c 24 API calls 4128->4129 4131 404cbe 4129->4131 4144 404518 KiUserCallbackDispatcher 4130->4144 4133 404cd3 SetDlgItemTextW 4131->4133 4134 404cc3 4131->4134 4132->4130 4133->4127 4137 404da3 24 API calls 4134->4137 4136 404d10 4136->4087 4145 404940 4136->4145 4137->4127 4139->4083 4140->4109 4141->4093 4142->4111 4143->4120 4144->4136 4146 404953 SendMessageW 4145->4146 4147 40494e 4145->4147 4146->4087 4147->4146 3244 401c68 3245 402da9 21 API calls 3244->3245 3246 401c6f 3245->3246 3247 402da9 21 API calls 3246->3247 3248 401c7c 3247->3248 3249 401c91 3248->3249 3250 402dcb 21 API calls 3248->3250 3251 401ca1 3249->3251 3252 402dcb 21 API calls 3249->3252 3250->3249 3253 401cf8 3251->3253 3254 401cac 3251->3254 3252->3251 3255 402dcb 21 API calls 3253->3255 3256 402da9 21 API calls 3254->3256 3257 401cfd 3255->3257 3258 401cb1 3256->3258 3259 402dcb 21 API calls 3257->3259 3260 402da9 21 API calls 3258->3260 3261 401d06 FindWindowExW 3259->3261 3262 401cbd 3260->3262 3265 401d28 3261->3265 3263 401ce8 SendMessageW 3262->3263 3264 401cca SendMessageTimeoutW 3262->3264 3263->3265 3264->3265 4148 4028e9 4149 4028ef 4148->4149 4150 4028f7 FindClose 4149->4150 4151 402c4f 4149->4151 4150->4151 3288 403b6f 3289 403b87 3288->3289 3290 403b79 CloseHandle 3288->3290 3295 403bb4 3289->3295 3290->3289 3293 405c83 71 API calls 3294 403b98 3293->3294 3296 403bc2 3295->3296 3297 403bc7 FreeLibrary GlobalFree 3296->3297 3298 403b8c 3296->3298 3297->3297 3297->3298 3298->3293 4152 405570 4153 405580 4152->4153 4154 405594 4152->4154 4155 405586 4153->4155 4156 4055dd 4153->4156 4157 40559c IsWindowVisible 4154->4157 4163 4055b3 4154->4163 4158 404542 SendMessageW 4155->4158 4160 4055e2 CallWindowProcW 4156->4160 4157->4156 4159 4055a9 4157->4159 4161 405590 4158->4161 4162 404eb1 5 API calls 4159->4162 4160->4161 4162->4163 4163->4160 4164 404f31 4 API calls 4163->4164 4164->4156 4165 4016f1 4166 402dcb 21 API calls 4165->4166 4167 4016f7 GetFullPathNameW 4166->4167 4168 401711 4167->4168 4169 401733 4167->4169 4168->4169 4172 4068d4 2 API calls 4168->4172 4170 401748 GetShortPathNameW 4169->4170 4171 402c4f 4169->4171 4170->4171 4173 401723 4172->4173 4173->4169 4175 406577 lstrcpynW 4173->4175 4175->4169 4176 401e73 GetDC 4177 402da9 21 API calls 4176->4177 4178 401e85 GetDeviceCaps MulDiv ReleaseDC 4177->4178 4179 402da9 21 API calls 4178->4179 4180 401eb6 4179->4180 4181 4065b4 21 API calls 4180->4181 4182 401ef3 CreateFontIndirectW 4181->4182 4183 40265d 4182->4183 3632 402975 3633 402dcb 21 API calls 3632->3633 3634 402981 3633->3634 3635 402997 3634->3635 3636 402dcb 21 API calls 3634->3636 3637 406042 2 API calls 3635->3637 3636->3635 3638 40299d 3637->3638 3660 406067 GetFileAttributesW CreateFileW 3638->3660 3640 4029aa 3641 402a60 3640->3641 3642 4029c5 GlobalAlloc 3640->3642 3643 402a48 3640->3643 3644 402a67 DeleteFileW 3641->3644 3645 402a7a 3641->3645 3642->3643 3646 4029de 3642->3646 3647 4032d9 35 API calls 3643->3647 3644->3645 3661 40350a SetFilePointer 3646->3661 3649 402a55 CloseHandle 3647->3649 3649->3641 3650 4029e4 3651 4034f4 ReadFile 3650->3651 3652 4029ed GlobalAlloc 3651->3652 3653 402a31 3652->3653 3654 4029fd 3652->3654 3656 406119 WriteFile 3653->3656 3655 4032d9 35 API calls 3654->3655 3659 402a0a 3655->3659 3657 402a3d GlobalFree 3656->3657 3657->3643 3658 402a28 GlobalFree 3658->3653 3659->3658 3660->3640 3661->3650 4184 4014f5 SetForegroundWindow 4185 402c4f 4184->4185 3672 403ff7 3673 404170 3672->3673 3674 40400f 3672->3674 3676 404181 GetDlgItem GetDlgItem 3673->3676 3677 4041c1 3673->3677 3674->3673 3675 40401b 3674->3675 3678 404026 SetWindowPos 3675->3678 3679 404039 3675->3679 3680 4044f6 22 API calls 3676->3680 3681 40421b 3677->3681 3691 401389 2 API calls 3677->3691 3678->3679 3683 404042 ShowWindow 3679->3683 3684 404084 3679->3684 3685 4041ab SetClassLongW 3680->3685 3682 404542 SendMessageW 3681->3682 3698 40416b 3681->3698 3713 40422d 3682->3713 3686 404062 GetWindowLongW 3683->3686 3687 40412e 3683->3687 3688 4040a3 3684->3688 3689 40408c DestroyWindow 3684->3689 3690 40140b 2 API calls 3685->3690 3686->3687 3693 40407b ShowWindow 3686->3693 3752 40455d 3687->3752 3694 4040a8 SetWindowLongW 3688->3694 3695 4040b9 3688->3695 3742 40447f 3689->3742 3690->3677 3696 4041f3 3691->3696 3693->3684 3694->3698 3695->3687 3701 4040c5 GetDlgItem 3695->3701 3696->3681 3697 4041f7 SendMessageW 3696->3697 3697->3698 3699 40140b 2 API calls 3699->3713 3700 404481 DestroyWindow KiUserCallbackDispatcher 3700->3742 3703 4040f3 3701->3703 3704 4040d6 SendMessageW IsWindowEnabled 3701->3704 3702 4044b0 ShowWindow 3702->3698 3706 404100 3703->3706 3707 404147 SendMessageW 3703->3707 3708 404113 3703->3708 3716 4040f8 3703->3716 3704->3698 3704->3703 3705 4065b4 21 API calls 3705->3713 3706->3707 3706->3716 3707->3687 3711 404130 3708->3711 3712 40411b 3708->3712 3710 4044f6 22 API calls 3710->3713 3715 40140b 2 API calls 3711->3715 3714 40140b 2 API calls 3712->3714 3713->3698 3713->3699 3713->3700 3713->3705 3713->3710 3733 4043c1 DestroyWindow 3713->3733 3743 4044f6 3713->3743 3714->3716 3715->3716 3716->3687 3749 4044cf 3716->3749 3718 4042a8 GetDlgItem 3719 4042c5 ShowWindow KiUserCallbackDispatcher 3718->3719 3720 4042bd 3718->3720 3746 404518 KiUserCallbackDispatcher 3719->3746 3720->3719 3722 4042ef KiUserCallbackDispatcher 3727 404303 3722->3727 3723 404308 GetSystemMenu EnableMenuItem SendMessageW 3724 404338 SendMessageW 3723->3724 3723->3727 3724->3727 3726 403fd8 22 API calls 3726->3727 3727->3723 3727->3726 3747 40452b SendMessageW 3727->3747 3748 406577 lstrcpynW 3727->3748 3729 404367 lstrlenW 3730 4065b4 21 API calls 3729->3730 3731 40437d SetWindowTextW 3730->3731 3732 401389 2 API calls 3731->3732 3732->3713 3734 4043db CreateDialogParamW 3733->3734 3733->3742 3735 40440e 3734->3735 3734->3742 3736 4044f6 22 API calls 3735->3736 3737 404419 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3736->3737 3738 401389 2 API calls 3737->3738 3739 40445f 3738->3739 3739->3698 3740 404467 ShowWindow 3739->3740 3741 404542 SendMessageW 3740->3741 3741->3742 3742->3698 3742->3702 3744 4065b4 21 API calls 3743->3744 3745 404501 SetDlgItemTextW 3744->3745 3745->3718 3746->3722 3747->3727 3748->3729 3750 4044d6 3749->3750 3751 4044dc SendMessageW 3749->3751 3750->3751 3751->3687 3753 404575 GetWindowLongW 3752->3753 3763 404620 3752->3763 3754 40458a 3753->3754 3753->3763 3755 4045b7 GetSysColor 3754->3755 3756 4045ba 3754->3756 3754->3763 3755->3756 3757 4045c0 SetTextColor 3756->3757 3758 4045ca SetBkMode 3756->3758 3757->3758 3759 4045e2 GetSysColor 3758->3759 3760 4045e8 3758->3760 3759->3760 3761 4045f9 3760->3761 3762 4045ef SetBkColor 3760->3762 3761->3763 3764 404613 CreateBrushIndirect 3761->3764 3765 40460c DeleteObject 3761->3765 3762->3761 3763->3698 3764->3763 3765->3764 4186 40197b 4187 402dcb 21 API calls 4186->4187 4188 401982 lstrlenW 4187->4188 4189 40265d 4188->4189 3850 4020fd 3851 4021c1 3850->3851 3852 40210f 3850->3852 3855 401423 28 API calls 3851->3855 3853 402dcb 21 API calls 3852->3853 3854 402116 3853->3854 3856 402dcb 21 API calls 3854->3856 3861 40231b 3855->3861 3857 40211f 3856->3857 3858 402135 LoadLibraryExW 3857->3858 3859 402127 GetModuleHandleW 3857->3859 3858->3851 3860 402146 3858->3860 3859->3858 3859->3860 3870 4069da 3860->3870 3864 402190 3865 4055fc 28 API calls 3864->3865 3868 402167 3865->3868 3866 402157 3867 401423 28 API calls 3866->3867 3866->3868 3867->3868 3868->3861 3869 4021b3 FreeLibrary 3868->3869 3869->3861 3875 406599 WideCharToMultiByte 3870->3875 3872 4069f7 3873 402151 3872->3873 3874 4069fe GetProcAddress 3872->3874 3873->3864 3873->3866 3874->3873 3875->3872 4190 402b7e 4191 402bd0 4190->4191 4192 402b85 4190->4192 4193 40696b 5 API calls 4191->4193 4194 402bce 4192->4194 4196 402da9 21 API calls 4192->4196 4195 402bd7 4193->4195 4197 402dcb 21 API calls 4195->4197 4198 402b93 4196->4198 4199 402be0 4197->4199 4200 402da9 21 API calls 4198->4200 4199->4194 4201 402be4 IIDFromString 4199->4201 4203 402b9f 4200->4203 4201->4194 4202 402bf3 4201->4202 4202->4194 4208 406577 lstrcpynW 4202->4208 4207 4064be wsprintfW 4203->4207 4205 402c10 CoTaskMemFree 4205->4194 4207->4194 4208->4205 4209 401000 4210 401037 BeginPaint GetClientRect 4209->4210 4212 40100c DefWindowProcW 4209->4212 4213 4010f3 4210->4213 4214 401179 4212->4214 4215 401073 CreateBrushIndirect FillRect DeleteObject 4213->4215 4216 4010fc 4213->4216 4215->4213 4217 401102 CreateFontIndirectW 4216->4217 4218 401167 EndPaint 4216->4218 4217->4218 4219 401112 6 API calls 4217->4219 4218->4214 4219->4218 3107 401781 3108 402dcb 21 API calls 3107->3108 3109 401788 3108->3109 3113 406096 3109->3113 3111 40178f 3112 406096 2 API calls 3111->3112 3112->3111 3114 4060a3 GetTickCount GetTempFileNameW 3113->3114 3115 4060dd 3114->3115 3116 4060d9 3114->3116 3115->3111 3116->3114 3116->3115 4220 401d82 4221 402da9 21 API calls 4220->4221 4222 401d93 SetWindowLongW 4221->4222 4223 402c4f 4222->4223 3117 401f03 3125 402da9 3117->3125 3119 401f09 3120 402da9 21 API calls 3119->3120 3121 401f15 3120->3121 3122 401f21 ShowWindow 3121->3122 3123 401f2c EnableWindow 3121->3123 3124 402c4f 3122->3124 3123->3124 3126 4065b4 21 API calls 3125->3126 3127 402dbe 3126->3127 3127->3119 4224 401503 4225 401508 4224->4225 4227 40152e 4224->4227 4226 402da9 21 API calls 4225->4226 4226->4227 4228 402903 4229 40290b 4228->4229 4230 40290f FindNextFileW 4229->4230 4233 402921 4229->4233 4231 402968 4230->4231 4230->4233 4234 406577 lstrcpynW 4231->4234 4234->4233 4235 403c07 4236 403c12 4235->4236 4237 403c19 GlobalAlloc 4236->4237 4238 403c16 4236->4238 4237->4238 4239 401588 4240 402bc9 4239->4240 4243 4064be wsprintfW 4240->4243 4242 402bce 4243->4242 4244 40198d 4245 402da9 21 API calls 4244->4245 4246 401994 4245->4246 4247 402da9 21 API calls 4246->4247 4248 4019a1 4247->4248 4249 402dcb 21 API calls 4248->4249 4250 4019b8 lstrlenW 4249->4250 4251 4019c9 4250->4251 4252 401a0a 4251->4252 4256 406577 lstrcpynW 4251->4256 4254 4019fa 4254->4252 4255 4019ff lstrlenW 4254->4255 4255->4252 4256->4254 4257 40168f 4258 402dcb 21 API calls 4257->4258 4259 401695 4258->4259 4260 4068d4 2 API calls 4259->4260 4261 40169b 4260->4261 4262 402b10 4263 402da9 21 API calls 4262->4263 4264 402b16 4263->4264 4265 4065b4 21 API calls 4264->4265 4266 402953 4264->4266 4265->4266 4267 402711 4268 402da9 21 API calls 4267->4268 4275 402720 4268->4275 4269 40276a ReadFile 4269->4275 4279 40285d 4269->4279 4270 4060ea ReadFile 4270->4275 4271 4027aa MultiByteToWideChar 4271->4275 4272 40285f 4280 4064be wsprintfW 4272->4280 4273 406148 5 API calls 4273->4275 4275->4269 4275->4270 4275->4271 4275->4272 4275->4273 4276 4027d0 SetFilePointer MultiByteToWideChar 4275->4276 4277 402870 4275->4277 4275->4279 4276->4275 4278 402891 SetFilePointer 4277->4278 4277->4279 4278->4279 4280->4279 4281 401491 4282 4055fc 28 API calls 4281->4282 4283 401498 4282->4283 3591 401794 3592 402dcb 21 API calls 3591->3592 3593 40179b 3592->3593 3594 4017c3 3593->3594 3595 4017bb 3593->3595 3631 406577 lstrcpynW 3594->3631 3630 406577 lstrcpynW 3595->3630 3598 4017ce 3600 405e46 3 API calls 3598->3600 3599 4017c1 3602 406825 5 API calls 3599->3602 3601 4017d4 lstrcatW 3600->3601 3601->3599 3615 4017e0 3602->3615 3603 4068d4 2 API calls 3603->3615 3605 406042 2 API calls 3605->3615 3606 4017f2 CompareFileTime 3606->3615 3607 4018b2 3608 4055fc 28 API calls 3607->3608 3611 4018bc 3608->3611 3609 4055fc 28 API calls 3612 40189e 3609->3612 3610 406577 lstrcpynW 3610->3615 3613 4032d9 35 API calls 3611->3613 3614 4018cf 3613->3614 3616 4018e3 SetFileTime 3614->3616 3618 4018f5 FindCloseChangeNotification 3614->3618 3615->3603 3615->3605 3615->3606 3615->3607 3615->3610 3617 4065b4 21 API calls 3615->3617 3626 405bd7 MessageBoxIndirectW 3615->3626 3628 401889 3615->3628 3629 406067 GetFileAttributesW CreateFileW 3615->3629 3616->3618 3617->3615 3618->3612 3619 401906 3618->3619 3620 40190b 3619->3620 3621 40191e 3619->3621 3622 4065b4 21 API calls 3620->3622 3623 4065b4 21 API calls 3621->3623 3624 401913 lstrcatW 3622->3624 3625 401926 3623->3625 3624->3625 3627 405bd7 MessageBoxIndirectW 3625->3627 3626->3615 3627->3612 3628->3609 3628->3612 3629->3615 3630->3599 3631->3598 4284 401a97 4285 402da9 21 API calls 4284->4285 4286 401aa0 4285->4286 4287 402da9 21 API calls 4286->4287 4288 401a45 4287->4288 4289 401598 4290 4015b1 4289->4290 4291 4015a8 ShowWindow 4289->4291 4292 4015bf ShowWindow 4290->4292 4293 402c4f 4290->4293 4291->4290 4292->4293 4294 402419 4295 402dcb 21 API calls 4294->4295 4296 402428 4295->4296 4297 402dcb 21 API calls 4296->4297 4298 402431 4297->4298 4299 402dcb 21 API calls 4298->4299 4300 40243b GetPrivateProfileStringW 4299->4300 4301 40201b 4302 402dcb 21 API calls 4301->4302 4303 402022 4302->4303 4304 4068d4 2 API calls 4303->4304 4305 402028 4304->4305 4307 402039 4305->4307 4308 4064be wsprintfW 4305->4308 4308->4307 4309 401b9c 4310 402dcb 21 API calls 4309->4310 4311 401ba3 4310->4311 4312 402da9 21 API calls 4311->4312 4313 401bac wsprintfW 4312->4313 4314 402c4f 4313->4314 4315 40149e 4316 4014ac PostQuitMessage 4315->4316 4317 4023c2 4315->4317 4316->4317 3028 4016a0 3042 402dcb 3028->3042 3031 402dcb 21 API calls 3032 4016b0 3031->3032 3033 402dcb 21 API calls 3032->3033 3034 4016b9 MoveFileW 3033->3034 3035 4016c5 3034->3035 3036 4016cc 3034->3036 3055 401423 3035->3055 3040 40231b 3036->3040 3048 4068d4 FindFirstFileW 3036->3048 3043 402dd7 3042->3043 3044 4065b4 21 API calls 3043->3044 3045 402df8 3044->3045 3046 4016a7 3045->3046 3047 406825 5 API calls 3045->3047 3046->3031 3047->3046 3049 4016db 3048->3049 3050 4068ea FindClose 3048->3050 3049->3040 3051 406337 MoveFileExW 3049->3051 3050->3049 3052 40634b 3051->3052 3054 406358 3051->3054 3058 4061bd 3052->3058 3054->3035 3096 4055fc 3055->3096 3059 406213 GetShortPathNameW 3058->3059 3060 4061ed 3058->3060 3062 406332 3059->3062 3063 406228 3059->3063 3085 406067 GetFileAttributesW CreateFileW 3060->3085 3062->3054 3063->3062 3065 406230 wsprintfA 3063->3065 3064 4061f7 CloseHandle GetShortPathNameW 3064->3062 3067 40620b 3064->3067 3066 4065b4 21 API calls 3065->3066 3068 406258 3066->3068 3067->3059 3067->3062 3086 406067 GetFileAttributesW CreateFileW 3068->3086 3070 406265 3070->3062 3071 406274 GetFileSize GlobalAlloc 3070->3071 3072 406296 3071->3072 3073 40632b CloseHandle 3071->3073 3087 4060ea ReadFile 3072->3087 3073->3062 3078 4062b5 lstrcpyA 3081 4062d7 3078->3081 3079 4062c9 3080 405fcc 4 API calls 3079->3080 3080->3081 3082 40630e SetFilePointer 3081->3082 3094 406119 WriteFile 3082->3094 3085->3064 3086->3070 3088 406108 3087->3088 3088->3073 3089 405fcc lstrlenA 3088->3089 3090 40600d lstrlenA 3089->3090 3091 405fe6 lstrcmpiA 3090->3091 3093 406015 3090->3093 3092 406004 CharNextA 3091->3092 3091->3093 3092->3090 3093->3078 3093->3079 3095 406137 GlobalFree 3094->3095 3095->3073 3098 405617 3096->3098 3106 401431 3096->3106 3097 405633 lstrlenW 3100 405641 lstrlenW 3097->3100 3101 40565c 3097->3101 3098->3097 3099 4065b4 21 API calls 3098->3099 3099->3097 3102 405653 lstrcatW 3100->3102 3100->3106 3103 405662 SetWindowTextW 3101->3103 3104 40566f 3101->3104 3102->3101 3103->3104 3105 405675 SendMessageW SendMessageW SendMessageW 3104->3105 3104->3106 3105->3106 3106->3040 4318 4049a0 4319 4049b0 4318->4319 4320 4049d6 4318->4320 4321 4044f6 22 API calls 4319->4321 4322 40455d 8 API calls 4320->4322 4323 4049bd SetDlgItemTextW 4321->4323 4324 4049e2 4322->4324 4323->4320 4325 401a24 4326 402dcb 21 API calls 4325->4326 4327 401a2b 4326->4327 4328 402dcb 21 API calls 4327->4328 4329 401a34 4328->4329 4330 401a3b lstrcmpiW 4329->4330 4331 401a4d lstrcmpW 4329->4331 4332 401a41 4330->4332 4331->4332 4333 402324 4334 402dcb 21 API calls 4333->4334 4335 40232a 4334->4335 4336 402dcb 21 API calls 4335->4336 4337 402333 4336->4337 4338 402dcb 21 API calls 4337->4338 4339 40233c 4338->4339 4340 4068d4 2 API calls 4339->4340 4341 402345 4340->4341 4342 402356 lstrlenW lstrlenW 4341->4342 4343 402349 4341->4343 4345 4055fc 28 API calls 4342->4345 4344 4055fc 28 API calls 4343->4344 4347 402351 4343->4347 4344->4347 4346 402394 SHFileOperationW 4345->4346 4346->4343 4346->4347 4348 401da6 4349 401db9 GetDlgItem 4348->4349 4350 401dac 4348->4350 4352 401db3 4349->4352 4351 402da9 21 API calls 4350->4351 4351->4352 4353 401dfa GetClientRect LoadImageW SendMessageW 4352->4353 4354 402dcb 21 API calls 4352->4354 4356 401e58 4353->4356 4358 401e64 4353->4358 4354->4353 4357 401e5d DeleteObject 4356->4357 4356->4358 4357->4358 4359 4023a8 4360 4023c2 4359->4360 4361 4023af 4359->4361 4362 4065b4 21 API calls 4361->4362 4363 4023bc 4362->4363 4364 405bd7 MessageBoxIndirectW 4363->4364 4364->4360 3266 402c2a SendMessageW 3267 402c44 InvalidateRect 3266->3267 3268 402c4f 3266->3268 3267->3268 4365 40462c lstrcpynW lstrlenW 3299 4024af 3300 402dcb 21 API calls 3299->3300 3301 4024c1 3300->3301 3302 402dcb 21 API calls 3301->3302 3303 4024cb 3302->3303 3316 402e5b 3303->3316 3306 402953 3307 402503 3309 40250f 3307->3309 3311 402da9 21 API calls 3307->3311 3308 402dcb 21 API calls 3310 4024f9 lstrlenW 3308->3310 3312 40252e RegSetValueExW 3309->3312 3320 4032d9 3309->3320 3310->3307 3311->3309 3314 402544 RegCloseKey 3312->3314 3314->3306 3317 402e76 3316->3317 3340 406412 3317->3340 3322 4032f2 3320->3322 3321 403320 3344 4034f4 3321->3344 3322->3321 3347 40350a SetFilePointer 3322->3347 3326 40348d 3329 4034cf 3326->3329 3332 403491 3326->3332 3327 40333d GetTickCount 3328 403477 3327->3328 3336 40338c 3327->3336 3328->3312 3331 4034f4 ReadFile 3329->3331 3330 4034f4 ReadFile 3330->3336 3331->3328 3332->3328 3333 4034f4 ReadFile 3332->3333 3334 406119 WriteFile 3332->3334 3333->3332 3334->3332 3335 4033e2 GetTickCount 3335->3336 3336->3328 3336->3330 3336->3335 3337 403407 MulDiv wsprintfW 3336->3337 3339 406119 WriteFile 3336->3339 3338 4055fc 28 API calls 3337->3338 3338->3336 3339->3336 3341 406421 3340->3341 3342 4024db 3341->3342 3343 40642c RegCreateKeyExW 3341->3343 3342->3306 3342->3307 3342->3308 3343->3342 3345 4060ea ReadFile 3344->3345 3346 40332b 3345->3346 3346->3326 3346->3327 3346->3328 3347->3321 4366 402930 4367 402dcb 21 API calls 4366->4367 4368 402937 FindFirstFileW 4367->4368 4369 40295f 4368->4369 4373 40294a 4368->4373 4370 402968 4369->4370 4374 4064be wsprintfW 4369->4374 4375 406577 lstrcpynW 4370->4375 4374->4370 4375->4373 4376 401931 4377 401968 4376->4377 4378 402dcb 21 API calls 4377->4378 4379 40196d 4378->4379 4380 405c83 71 API calls 4379->4380 4381 401976 4380->4381 4382 401934 4383 402dcb 21 API calls 4382->4383 4384 40193b 4383->4384 4385 405bd7 MessageBoxIndirectW 4384->4385 4386 401944 4385->4386 4387 4046b5 4389 4047e7 4387->4389 4390 4046cd 4387->4390 4388 404851 4391 40491b 4388->4391 4392 40485b GetDlgItem 4388->4392 4389->4388 4389->4391 4398 404822 GetDlgItem SendMessageW 4389->4398 4393 4044f6 22 API calls 4390->4393 4397 40455d 8 API calls 4391->4397 4394 404875 4392->4394 4395 4048dc 4392->4395 4396 404734 4393->4396 4394->4395 4400 40489b SendMessageW LoadCursorW SetCursor 4394->4400 4395->4391 4401 4048ee 4395->4401 4399 4044f6 22 API calls 4396->4399 4411 404916 4397->4411 4420 404518 KiUserCallbackDispatcher 4398->4420 4404 404741 CheckDlgButton 4399->4404 4421 404964 4400->4421 4406 404904 4401->4406 4407 4048f4 SendMessageW 4401->4407 4403 40484c 4408 404940 SendMessageW 4403->4408 4418 404518 KiUserCallbackDispatcher 4404->4418 4406->4411 4412 40490a SendMessageW 4406->4412 4407->4406 4408->4388 4412->4411 4413 40475f GetDlgItem 4419 40452b SendMessageW 4413->4419 4415 404775 SendMessageW 4416 404792 GetSysColor 4415->4416 4417 40479b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4415->4417 4416->4417 4417->4411 4418->4413 4419->4415 4420->4403 4424 405b9d ShellExecuteExW 4421->4424 4423 4048ca LoadCursorW SetCursor 4423->4395 4424->4423 4425 4028b6 4426 4028bd 4425->4426 4429 402bce 4425->4429 4427 402da9 21 API calls 4426->4427 4428 4028c4 4427->4428 4430 4028d3 SetFilePointer 4428->4430 4430->4429 4431 4028e3 4430->4431 4433 4064be wsprintfW 4431->4433 4433->4429 4434 401f37 4435 402dcb 21 API calls 4434->4435 4436 401f3d 4435->4436 4437 402dcb 21 API calls 4436->4437 4438 401f46 4437->4438 4439 402dcb 21 API calls 4438->4439 4440 401f4f 4439->4440 4441 402dcb 21 API calls 4440->4441 4442 401f58 4441->4442 4443 401423 28 API calls 4442->4443 4444 401f5f 4443->4444 4451 405b9d ShellExecuteExW 4444->4451 4446 401fa7 4447 406a16 5 API calls 4446->4447 4449 402953 4446->4449 4448 401fc4 CloseHandle 4447->4448 4448->4449 4451->4446 4452 402fb8 4453 402fe3 4452->4453 4454 402fca SetTimer 4452->4454 4455 403038 4453->4455 4456 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4453->4456 4454->4453 4456->4455 4457 4014b8 4458 4014be 4457->4458 4459 401389 2 API calls 4458->4459 4460 4014c6 4459->4460 3801 40573b 3802 4058e5 3801->3802 3803 40575c GetDlgItem GetDlgItem GetDlgItem 3801->3803 3805 405916 3802->3805 3806 4058ee GetDlgItem CreateThread FindCloseChangeNotification 3802->3806 3846 40452b SendMessageW 3803->3846 3808 405941 3805->3808 3810 405966 3805->3810 3811 40592d ShowWindow ShowWindow 3805->3811 3806->3805 3849 4056cf 5 API calls 3806->3849 3807 4057cc 3815 4057d3 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3807->3815 3809 4059a1 3808->3809 3812 405955 3808->3812 3813 40597b ShowWindow 3808->3813 3809->3810 3822 4059af SendMessageW 3809->3822 3814 40455d 8 API calls 3810->3814 3848 40452b SendMessageW 3811->3848 3817 4044cf SendMessageW 3812->3817 3818 40599b 3813->3818 3819 40598d 3813->3819 3827 405974 3814->3827 3820 405841 3815->3820 3821 405825 SendMessageW SendMessageW 3815->3821 3817->3810 3824 4044cf SendMessageW 3818->3824 3823 4055fc 28 API calls 3819->3823 3825 405854 3820->3825 3826 405846 SendMessageW 3820->3826 3821->3820 3822->3827 3828 4059c8 CreatePopupMenu 3822->3828 3823->3818 3824->3809 3830 4044f6 22 API calls 3825->3830 3826->3825 3829 4065b4 21 API calls 3828->3829 3831 4059d8 AppendMenuW 3829->3831 3832 405864 3830->3832 3833 4059f5 GetWindowRect 3831->3833 3834 405a08 TrackPopupMenu 3831->3834 3835 4058a1 GetDlgItem SendMessageW 3832->3835 3836 40586d ShowWindow 3832->3836 3833->3834 3834->3827 3837 405a23 3834->3837 3835->3827 3840 4058c8 SendMessageW SendMessageW 3835->3840 3838 405890 3836->3838 3839 405883 ShowWindow 3836->3839 3841 405a3f SendMessageW 3837->3841 3847 40452b SendMessageW 3838->3847 3839->3838 3840->3827 3841->3841 3842 405a5c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3841->3842 3844 405a81 SendMessageW 3842->3844 3844->3844 3845 405aaa GlobalUnlock SetClipboardData CloseClipboard 3844->3845 3845->3827 3846->3807 3847->3835 3848->3808 4461 401d3c 4462 402da9 21 API calls 4461->4462 4463 401d42 IsWindow 4462->4463 4464 401a45 4463->4464 4465 404d3d 4466 404d69 4465->4466 4467 404d4d 4465->4467 4468 404d9c 4466->4468 4469 404d6f SHGetPathFromIDListW 4466->4469 4476 405bbb GetDlgItemTextW 4467->4476 4471 404d86 SendMessageW 4469->4471 4472 404d7f 4469->4472 4471->4468 4474 40140b 2 API calls 4472->4474 4473 404d5a SendMessageW 4473->4466 4474->4471 4476->4473

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 403552-4035a4 SetErrorMode GetVersionExW 1 4035a6-4035d6 GetVersionExW 0->1 2 4035de-4035e3 0->2 1->2 3 4035e5 2->3 4 4035eb-40362d 2->4 3->4 5 403640 4->5 6 40362f-403637 call 40696b 4->6 7 403645-403659 call 4068fb lstrlenA 5->7 6->5 12 403639 6->12 13 40365b-403677 call 40696b * 3 7->13 12->5 20 403688-4036ec #17 OleInitialize SHGetFileInfoW call 406577 GetCommandLineW call 406577 13->20 21 403679-40367f 13->21 28 4036f5-403709 call 405e73 CharNextW 20->28 29 4036ee-4036f0 20->29 21->20 26 403681 21->26 26->20 32 403804-40380a 28->32 29->28 33 403810 32->33 34 40370e-403714 32->34 35 403824-40383e GetTempPathW call 403521 33->35 36 403716-40371b 34->36 37 40371d-403724 34->37 44 403840-40385e GetWindowsDirectoryW lstrcatW call 403521 35->44 45 403896-4038b0 DeleteFileW call 4030a2 35->45 36->36 36->37 39 403726-40372b 37->39 40 40372c-403730 37->40 39->40 42 4037f1-403800 call 405e73 40->42 43 403736-40373c 40->43 42->32 61 403802-403803 42->61 47 403756-40378f 43->47 48 40373e-403745 43->48 44->45 64 403860-403890 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403521 44->64 66 4038b6-4038bc 45->66 67 403a9d-403aad ExitProcess OleUninitialize 45->67 51 403791-403796 47->51 52 4037ac-4037e6 47->52 49 403747-40374a 48->49 50 40374c 48->50 49->47 49->50 50->47 51->52 56 403798-4037a0 51->56 58 4037e8-4037ec 52->58 59 4037ee-4037f0 52->59 62 4037a2-4037a5 56->62 63 4037a7 56->63 58->59 65 403812-40381f call 406577 58->65 59->42 61->32 62->52 62->63 63->52 64->45 64->67 65->35 72 4038c2-4038cd call 405e73 66->72 73 403955-40395c call 403c49 66->73 70 403ad3-403ad9 67->70 71 403aaf-403abf call 405bd7 ExitProcess 67->71 75 403b57-403b5f 70->75 76 403adb-403af1 GetCurrentProcess OpenProcessToken 70->76 87 40391b-403925 72->87 88 4038cf-403904 72->88 83 403961-403965 73->83 84 403b61 75->84 85 403b65-403b69 ExitProcess 75->85 81 403af3-403b21 LookupPrivilegeValueW AdjustTokenPrivileges 76->81 82 403b27-403b35 call 40696b 76->82 81->82 97 403b43-403b4e ExitWindowsEx 82->97 98 403b37-403b41 82->98 83->67 84->85 92 403927-403935 call 405f4e 87->92 93 40396a-403990 call 405b42 lstrlenW call 406577 87->93 90 403906-40390a 88->90 94 403913-403917 90->94 95 40390c-403911 90->95 92->67 107 40393b-403951 call 406577 * 2 92->107 110 4039a1-4039b9 93->110 111 403992-40399c call 406577 93->111 94->90 100 403919 94->100 95->94 95->100 97->75 102 403b50-403b52 call 40140b 97->102 98->97 98->102 100->87 102->75 107->73 114 4039be-4039c2 110->114 111->110 116 4039c7-4039f1 wsprintfW call 4065b4 114->116 120 4039f3-4039f8 call 405acb 116->120 121 4039fa call 405b25 116->121 125 4039ff-403a01 120->125 121->125 126 403a03-403a0d GetFileAttributesW 125->126 127 403a3d-403a5c SetCurrentDirectoryW call 406337 CopyFileW 125->127 128 403a2e-403a39 126->128 129 403a0f-403a18 DeleteFileW 126->129 135 403a9b 127->135 136 403a5e-403a7f call 406337 call 4065b4 call 405b5a 127->136 128->114 132 403a3b 128->132 129->128 131 403a1a-403a2c call 405c83 129->131 131->116 131->128 132->67 135->67 144 403a81-403a8b 136->144 145 403ac5-403ad1 CloseHandle 136->145 144->135 146 403a8d-403a95 call 4068d4 144->146 145->135 146->116 146->135
    APIs
    • SetErrorMode.KERNELBASE ref: 00403575
    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004035A0
    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004035B3
    • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040364C
    • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403689
    • OleInitialize.OLE32(00000000), ref: 00403690
    • SHGetFileInfoW.SHELL32(0042AA28,00000000,?,000002B4,00000000), ref: 004036AF
    • GetCommandLineW.KERNEL32(00433700,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036C4
    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",00000020,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036FD
    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403835
    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403846
    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403852
    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403866
    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040386E
    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040387F
    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403887
    • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040389B
    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403974
      • Part of subcall function 00406577: lstrcpynW.KERNEL32(?,?,00000400,004036C4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406584
    • wsprintfW.USER32 ref: 004039D1
    • GetFileAttributesW.KERNEL32(00437800,C:\Users\user\AppData\Local\Temp\), ref: 00403A04
    • DeleteFileW.KERNEL32(00437800), ref: 00403A10
    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A3E
      • Part of subcall function 00406337: MoveFileExW.KERNEL32(?,?,00000005,00405E35,?,00000000,000000F1,?,?,?,?,?), ref: 00406341
    • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,00437800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A54
      • Part of subcall function 00405B5A: CreateProcessW.KERNEL32(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B83
      • Part of subcall function 00405B5A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B90
      • Part of subcall function 004068D4: FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\,00405F97,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068DF
      • Part of subcall function 004068D4: FindClose.KERNEL32(00000000), ref: 004068EB
    • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A9D
    • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AA2
    • ExitProcess.KERNEL32 ref: 00403ABF
    • CloseHandle.KERNEL32(00000000,00438000,00438000,?,00437800,00000000), ref: 00403AC6
    • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AE2
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AE9
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AFE
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403B21
    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B46
    • ExitProcess.KERNEL32 ref: 00403B69
      • Part of subcall function 00405B25: CreateDirectoryW.KERNELBASE(?,00000000,00403545,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00405B2B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
    • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"$1033$C:\Program Files (x86)\IDmelon$C:\Program Files (x86)\IDmelon\Accesskey$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
    • API String ID: 2017177436-3056925620
    • Opcode ID: e7e0cd5b0ef4c9577908e2ee54baf6434358d7d27fb2459445cbf059cdb406f7
    • Instruction ID: 854c728f01c0035939758d15b123b9002cb8995d15bf2fdbd915a0a46deb4321
    • Opcode Fuzzy Hash: e7e0cd5b0ef4c9577908e2ee54baf6434358d7d27fb2459445cbf059cdb406f7
    • Instruction Fuzzy Hash: 6DF1F470604301ABD320AF659D05B6B7EE8EB8570AF10483FF581B22D1DB7DDA458B6E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 149 40573b-405756 150 4058e5-4058ec 149->150 151 40575c-405823 GetDlgItem * 3 call 40452b call 404e84 GetClientRect GetSystemMetrics SendMessageW * 2 149->151 153 405916-405923 150->153 154 4058ee-405910 GetDlgItem CreateThread FindCloseChangeNotification 150->154 173 405841-405844 151->173 174 405825-40583f SendMessageW * 2 151->174 156 405941-40594b 153->156 157 405925-40592b 153->157 154->153 158 4059a1-4059a5 156->158 159 40594d-405953 156->159 161 405966-40596f call 40455d 157->161 162 40592d-40593c ShowWindow * 2 call 40452b 157->162 158->161 167 4059a7-4059ad 158->167 163 405955-405961 call 4044cf 159->163 164 40597b-40598b ShowWindow 159->164 170 405974-405978 161->170 162->156 163->161 171 40599b-40599c call 4044cf 164->171 172 40598d-405996 call 4055fc 164->172 167->161 175 4059af-4059c2 SendMessageW 167->175 171->158 172->171 178 405854-40586b call 4044f6 173->178 179 405846-405852 SendMessageW 173->179 174->173 180 405ac4-405ac6 175->180 181 4059c8-4059f3 CreatePopupMenu call 4065b4 AppendMenuW 175->181 188 4058a1-4058c2 GetDlgItem SendMessageW 178->188 189 40586d-405881 ShowWindow 178->189 179->178 180->170 186 4059f5-405a05 GetWindowRect 181->186 187 405a08-405a1d TrackPopupMenu 181->187 186->187 187->180 190 405a23-405a3a 187->190 188->180 193 4058c8-4058e0 SendMessageW * 2 188->193 191 405890 189->191 192 405883-40588e ShowWindow 189->192 194 405a3f-405a5a SendMessageW 190->194 195 405896-40589c call 40452b 191->195 192->195 193->180 194->194 196 405a5c-405a7f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 194->196 195->188 198 405a81-405aa8 SendMessageW 196->198 198->198 199 405aaa-405abe GlobalUnlock SetClipboardData CloseClipboard 198->199 199->180
    APIs
    • GetDlgItem.USER32(?,00000403), ref: 00405799
    • GetDlgItem.USER32(?,000003EE), ref: 004057A8
    • GetClientRect.USER32(?,?), ref: 004057E5
    • GetSystemMetrics.USER32(00000002), ref: 004057EC
    • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040580D
    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040581E
    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405831
    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040583F
    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405852
    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405874
    • ShowWindow.USER32(?,00000008), ref: 00405888
    • GetDlgItem.USER32(?,000003EC), ref: 004058A9
    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004058B9
    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058D2
    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058DE
    • GetDlgItem.USER32(?,000003F8), ref: 004057B7
      • Part of subcall function 0040452B: SendMessageW.USER32(00000028,?,00000001,00404356), ref: 00404539
    • GetDlgItem.USER32(?,000003EC), ref: 004058FB
    • CreateThread.KERNELBASE(00000000,00000000,Function_000056CF,00000000), ref: 00405909
    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405910
    • ShowWindow.USER32(00000000), ref: 00405934
    • ShowWindow.USER32(?,00000008), ref: 00405939
    • ShowWindow.USER32(00000008), ref: 00405983
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004059B7
    • CreatePopupMenu.USER32 ref: 004059C8
    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059DC
    • GetWindowRect.USER32(?,?), ref: 004059FC
    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405A15
    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A4D
    • OpenClipboard.USER32(00000000), ref: 00405A5D
    • EmptyClipboard.USER32 ref: 00405A63
    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A6F
    • GlobalLock.KERNEL32(00000000), ref: 00405A79
    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A8D
    • GlobalUnlock.KERNEL32(00000000), ref: 00405AAD
    • SetClipboardData.USER32(0000000D,00000000), ref: 00405AB8
    • CloseClipboard.USER32 ref: 00405ABE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
    • String ID: {
    • API String ID: 4154960007-366298937
    • Opcode ID: a6b03d6253f0693a7e446d599fbd443ff6998c32a83cf6a7614abef3e4004c11
    • Instruction ID: d3b07f9c2581fb6b60ef1a2666babd9f8dcdaaa8066b0d43d813b8afd8e95190
    • Opcode Fuzzy Hash: a6b03d6253f0693a7e446d599fbd443ff6998c32a83cf6a7614abef3e4004c11
    • Instruction Fuzzy Hash: 03B159B0900608FFDF11AF60DD89AAE7B79FB48355F00813AFA45BA1A0C7785A51DF58

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 448 405c83-405ca9 call 405f4e 451 405cc2-405cc9 448->451 452 405cab-405cbd DeleteFileW 448->452 454 405ccb-405ccd 451->454 455 405cdc-405cec call 406577 451->455 453 405e3f-405e43 452->453 456 405cd3-405cd6 454->456 457 405ded-405df2 454->457 463 405cfb-405cfc call 405e92 455->463 464 405cee-405cf9 lstrcatW 455->464 456->455 456->457 457->453 459 405df4-405df7 457->459 461 405e01-405e09 call 4068d4 459->461 462 405df9-405dff 459->462 461->453 472 405e0b-405e1f call 405e46 call 405c3b 461->472 462->453 465 405d01-405d05 463->465 464->465 468 405d11-405d17 lstrcatW 465->468 469 405d07-405d0f 465->469 471 405d1c-405d38 lstrlenW FindFirstFileW 468->471 469->468 469->471 473 405de2-405de6 471->473 474 405d3e-405d46 471->474 488 405e21-405e24 472->488 489 405e37-405e3a call 4055fc 472->489 473->457 476 405de8 473->476 477 405d66-405d7a call 406577 474->477 478 405d48-405d50 474->478 476->457 490 405d91-405d9c call 405c3b 477->490 491 405d7c-405d84 477->491 480 405d52-405d5a 478->480 481 405dc5-405dd5 FindNextFileW 478->481 480->477 484 405d5c-405d64 480->484 481->474 487 405ddb-405ddc FindClose 481->487 484->477 484->481 487->473 488->462 494 405e26-405e35 call 4055fc call 406337 488->494 489->453 500 405dbd-405dc0 call 4055fc 490->500 501 405d9e-405da1 490->501 491->481 495 405d86-405d8f call 405c83 491->495 494->453 495->481 500->481 504 405da3-405db3 call 4055fc call 406337 501->504 505 405db5-405dbb 501->505 504->481 505->481
    APIs
    • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405CAC
    • lstrcatW.KERNEL32(0042EA70,\*.*), ref: 00405CF4
    • lstrcatW.KERNEL32(?,0040A014), ref: 00405D17
    • lstrlenW.KERNEL32(?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405D1D
    • FindFirstFileW.KERNELBASE(0042EA70,?,?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405D2D
    • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DCD
    • FindClose.KERNEL32(00000000), ref: 00405DDC
    Strings
    • \*.*, xrefs: 00405CEE
    • "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe", xrefs: 00405C8C
    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C90
    • pB, xrefs: 00405CDC
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
    • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$pB
    • API String ID: 2035342205-375994177
    • Opcode ID: 06b40870d9db2984f76d7466e756925df4fbec91ebb4a1c75f6c7faa270cb809
    • Instruction ID: 26a84cf893ecfac7fe2d2a8ab9ced37764d13583991ceadb599b2dfedf858990
    • Opcode Fuzzy Hash: 06b40870d9db2984f76d7466e756925df4fbec91ebb4a1c75f6c7faa270cb809
    • Instruction Fuzzy Hash: 8E41B030800A18B6CB21AB65DC4DAAF7778EF42718F10813BF851711D1DB7C4A82DEAE
    APIs
    • FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\,00405F97,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068DF
    • FindClose.KERNEL32(00000000), ref: 004068EB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID: C:\
    • API String ID: 2295610775-3404278061
    • Opcode ID: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
    • Instruction ID: 1cf04926a4a3889f6b92b588199f87985a57aa1d1812818edfb9113e4ef6e03f
    • Opcode Fuzzy Hash: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
    • Instruction Fuzzy Hash: 53D012725162209BC240673CBD0C84B7A58AF253317518A3AF46AF61E0DB348C639699
    APIs
    • CoCreateInstance.OLE32(004085E8,?,00000001,004085D8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
    Strings
    • C:\Program Files (x86)\IDmelon\Accesskey, xrefs: 0040228E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateInstance
    • String ID: C:\Program Files (x86)\IDmelon\Accesskey
    • API String ID: 542301482-2077697000
    • Opcode ID: 99423ef168fa0dc7d563ab215b90f00d26a2448a52d76e49bcb10065e06d2d2e
    • Instruction ID: 879178e2914a864b6efeea5842d2d3985b85c893096dfa9a9f6c7732eb85e553
    • Opcode Fuzzy Hash: 99423ef168fa0dc7d563ab215b90f00d26a2448a52d76e49bcb10065e06d2d2e
    • Instruction Fuzzy Hash: D1412571A00209AFCB00DFE4CA89A9D7BB5FF48318B20457EF505EB2D1DB799981CB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 200 403ff7-404009 201 404170-40417f 200->201 202 40400f-404015 200->202 204 404181-4041c9 GetDlgItem * 2 call 4044f6 SetClassLongW call 40140b 201->204 205 4041ce-4041e3 201->205 202->201 203 40401b-404024 202->203 206 404026-404033 SetWindowPos 203->206 207 404039-404040 203->207 204->205 209 404223-404228 call 404542 205->209 210 4041e5-4041e8 205->210 206->207 212 404042-40405c ShowWindow 207->212 213 404084-40408a 207->213 218 40422d-404248 209->218 215 4041ea-4041f5 call 401389 210->215 216 40421b-40421d 210->216 219 404062-404075 GetWindowLongW 212->219 220 40415d-40416b call 40455d 212->220 221 4040a3-4040a6 213->221 222 40408c-40409e DestroyWindow 213->222 215->216 235 4041f7-404216 SendMessageW 215->235 216->209 217 4044c3 216->217 229 4044c5-4044cc 217->229 226 404251-404257 218->226 227 40424a-40424c call 40140b 218->227 219->220 228 40407b-40407e ShowWindow 219->228 220->229 232 4040a8-4040b4 SetWindowLongW 221->232 233 4040b9-4040bf 221->233 230 4044a0-4044a6 222->230 239 404481-40449a DestroyWindow KiUserCallbackDispatcher 226->239 240 40425d-404268 226->240 227->226 228->213 230->217 238 4044a8-4044ae 230->238 232->229 233->220 241 4040c5-4040d4 GetDlgItem 233->241 235->229 238->217 242 4044b0-4044b9 ShowWindow 238->242 239->230 240->239 243 40426e-4042bb call 4065b4 call 4044f6 * 3 GetDlgItem 240->243 244 4040f3-4040f6 241->244 245 4040d6-4040ed SendMessageW IsWindowEnabled 241->245 242->217 272 4042c5-404301 ShowWindow KiUserCallbackDispatcher call 404518 KiUserCallbackDispatcher 243->272 273 4042bd-4042c2 243->273 246 4040f8-4040f9 244->246 247 4040fb-4040fe 244->247 245->217 245->244 249 404129-40412e call 4044cf 246->249 250 404100-404106 247->250 251 40410c-404111 247->251 249->220 253 404147-404157 SendMessageW 250->253 254 404108-40410a 250->254 251->253 255 404113-404119 251->255 253->220 254->249 258 404130-404139 call 40140b 255->258 259 40411b-404121 call 40140b 255->259 258->220 268 40413b-404145 258->268 270 404127 259->270 268->270 270->249 276 404303-404304 272->276 277 404306 272->277 273->272 278 404308-404336 GetSystemMenu EnableMenuItem SendMessageW 276->278 277->278 279 404338-404349 SendMessageW 278->279 280 40434b 278->280 281 404351-404390 call 40452b call 403fd8 call 406577 lstrlenW call 4065b4 SetWindowTextW call 401389 279->281 280->281 281->218 292 404396-404398 281->292 292->218 293 40439e-4043a2 292->293 294 4043c1-4043d5 DestroyWindow 293->294 295 4043a4-4043aa 293->295 294->230 297 4043db-404408 CreateDialogParamW 294->297 295->217 296 4043b0-4043b6 295->296 296->218 298 4043bc 296->298 297->230 299 40440e-404465 call 4044f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 297->299 298->217 299->217 304 404467-40447a ShowWindow call 404542 299->304 306 40447f 304->306 306->230
    APIs
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404033
    • ShowWindow.USER32(?), ref: 00404053
    • GetWindowLongW.USER32(?,000000F0), ref: 00404065
    • ShowWindow.USER32(?,00000004), ref: 0040407E
    • DestroyWindow.USER32 ref: 00404092
    • SetWindowLongW.USER32(?,00000000,00000000), ref: 004040AB
    • GetDlgItem.USER32(?,?), ref: 004040CA
    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040DE
    • IsWindowEnabled.USER32(00000000), ref: 004040E5
    • GetDlgItem.USER32(?,00000001), ref: 00404190
    • GetDlgItem.USER32(?,00000002), ref: 0040419A
    • SetClassLongW.USER32(?,000000F2,?), ref: 004041B4
    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404205
    • GetDlgItem.USER32(?,00000003), ref: 004042AB
    • ShowWindow.USER32(00000000,?), ref: 004042CC
    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042DE
    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042F9
    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040430F
    • EnableMenuItem.USER32(00000000), ref: 00404316
    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040432E
    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404341
    • lstrlenW.KERNEL32(0042CA68,?,0042CA68,00000000), ref: 0040436B
    • SetWindowTextW.USER32(?,0042CA68), ref: 0040437F
    • ShowWindow.USER32(?,0000000A), ref: 004044B3
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$Item$MessageSendShow$Long$CallbackDispatcherMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
    • String ID:
    • API String ID: 3964124867-0
    • Opcode ID: 85e06a1bfb462d71b49bda8b571905cea54c43c8c85ee92c4a54339351a5f343
    • Instruction ID: 8cad316efbf8f9c89f6feec2797fb874042f4abab253e3557332251604c97906
    • Opcode Fuzzy Hash: 85e06a1bfb462d71b49bda8b571905cea54c43c8c85ee92c4a54339351a5f343
    • Instruction Fuzzy Hash: C6C1A1B1500204BBDB206F61EE89E2B3AA8FB85755F01453EF751B51F0CB39A8529B2D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 307 403c49-403c61 call 40696b 310 403c63-403c73 call 4064be 307->310 311 403c75-403cac call 406445 307->311 319 403ccf-403cf8 call 403f1f call 405f4e 310->319 315 403cc4-403cca lstrcatW 311->315 316 403cae-403cbf call 406445 311->316 315->319 316->315 325 403d8a-403d92 call 405f4e 319->325 326 403cfe-403d03 319->326 331 403da0-403dc5 LoadImageW 325->331 332 403d94-403d9b call 4065b4 325->332 326->325 327 403d09-403d23 call 406445 326->327 333 403d28-403d31 327->333 335 403e46-403e4e call 40140b 331->335 336 403dc7-403df7 RegisterClassW 331->336 332->331 333->325 337 403d33-403d37 333->337 350 403e50-403e53 335->350 351 403e58-403e63 call 403f1f 335->351 340 403f15 336->340 341 403dfd-403e41 SystemParametersInfoW CreateWindowExW 336->341 338 403d49-403d55 lstrlenW 337->338 339 403d39-403d46 call 405e73 337->339 345 403d57-403d65 lstrcmpiW 338->345 346 403d7d-403d85 call 405e46 call 406577 338->346 339->338 344 403f17-403f1e 340->344 341->335 345->346 349 403d67-403d71 GetFileAttributesW 345->349 346->325 353 403d73-403d75 349->353 354 403d77-403d78 call 405e92 349->354 350->344 360 403e69-403e83 ShowWindow call 4068fb 351->360 361 403eec-403eed call 4056cf 351->361 353->346 353->354 354->346 368 403e85-403e8a call 4068fb 360->368 369 403e8f-403ea1 GetClassInfoW 360->369 364 403ef2-403ef4 361->364 366 403ef6-403efc 364->366 367 403f0e-403f10 call 40140b 364->367 366->350 374 403f02-403f09 call 40140b 366->374 367->340 368->369 372 403ea3-403eb3 GetClassInfoW RegisterClassW 369->372 373 403eb9-403edc DialogBoxParamW call 40140b 369->373 372->373 377 403ee1-403eea call 403b99 373->377 374->350 377->344
    APIs
      • Part of subcall function 0040696B: GetModuleHandleA.KERNEL32(?,00000020,?,00403662,0000000C,?,?,?,?,?,?,?,?), ref: 0040697D
      • Part of subcall function 0040696B: GetProcAddress.KERNEL32(00000000,?), ref: 00406998
    • lstrcatW.KERNEL32(1033,0042CA68), ref: 00403CCA
    • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Program Files (x86)\IDmelon,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,74DF3420), ref: 00403D4A
    • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Program Files (x86)\IDmelon,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000), ref: 00403D5D
    • GetFileAttributesW.KERNEL32(Remove folder: ), ref: 00403D68
    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Program Files (x86)\IDmelon), ref: 00403DB1
      • Part of subcall function 004064BE: wsprintfW.USER32 ref: 004064CB
    • RegisterClassW.USER32(004336A0), ref: 00403DEE
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403E06
    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E3B
    • ShowWindow.USER32(00000005,00000000), ref: 00403E71
    • GetClassInfoW.USER32(00000000,RichEdit20W,004336A0), ref: 00403E9D
    • GetClassInfoW.USER32(00000000,RichEdit,004336A0), ref: 00403EAA
    • RegisterClassW.USER32(004336A0), ref: 00403EB3
    • DialogBoxParamW.USER32(?,00000000,00403FF7,00000000), ref: 00403ED2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
    • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Program Files (x86)\IDmelon$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
    • API String ID: 1975747703-3268727705
    • Opcode ID: 5e20c267018cc28429e7407a64d751b23d4fe7797b8e7b228d04f4c9996f5690
    • Instruction ID: c722afd28cb3ad108a11d8546cd61d6ece1c23d3a169ae69e987cf65e7f86a01
    • Opcode Fuzzy Hash: 5e20c267018cc28429e7407a64d751b23d4fe7797b8e7b228d04f4c9996f5690
    • Instruction Fuzzy Hash: 7961C370500700BED620AF66AD46F2B3A6CEB85B5AF40053FF945B22E2DB7C5941CA6D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 381 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406067 384 4030f2-4030f7 381->384 385 4030fc-40312a call 406577 call 405e92 call 406577 GetFileSize 381->385 387 4032d2-4032d6 384->387 393 403130 385->393 394 403215-403223 call 40303e 385->394 396 403135-40314c 393->396 400 403225-403228 394->400 401 403278-40327d 394->401 398 403150-403159 call 4034f4 396->398 399 40314e 396->399 407 40327f-403287 call 40303e 398->407 408 40315f-403166 398->408 399->398 403 40322a-403242 call 40350a call 4034f4 400->403 404 40324c-403276 GlobalAlloc call 40350a call 4032d9 400->404 401->387 403->401 430 403244-40324a 403->430 404->401 428 403289-40329a 404->428 407->401 412 4031e2-4031e6 408->412 413 403168-40317c call 406022 408->413 418 4031f0-4031f6 412->418 419 4031e8-4031ef call 40303e 412->419 413->418 427 40317e-403185 413->427 424 403205-40320d 418->424 425 4031f8-403202 call 406a58 418->425 419->418 424->396 429 403213 424->429 425->424 427->418 434 403187-40318e 427->434 435 4032a2-4032a7 428->435 436 40329c 428->436 429->394 430->401 430->404 434->418 437 403190-403197 434->437 438 4032a8-4032ae 435->438 436->435 437->418 439 403199-4031a0 437->439 438->438 440 4032b0-4032cb SetFilePointer call 406022 438->440 439->418 441 4031a2-4031c2 439->441 444 4032d0 440->444 441->401 443 4031c8-4031cc 441->443 445 4031d4-4031dc 443->445 446 4031ce-4031d2 443->446 444->387 445->418 447 4031de-4031e0 445->447 446->429 446->445 447->418
    APIs
    • GetTickCount.KERNEL32 ref: 004030B3
    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,00000400), ref: 004030CF
      • Part of subcall function 00406067: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 0040606B
      • Part of subcall function 00406067: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040608D
    • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 0040311B
    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
    Strings
    • soft, xrefs: 00403190
    • "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe", xrefs: 004030A8
    • C:\Users\user\AppData\Local\Temp\, xrefs: 004030A9
    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403278
    • Error launching installer, xrefs: 004030F2
    • Null, xrefs: 00403199
    • C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, xrefs: 004030B9, 004030C8, 004030DC, 004030FC
    • Inst, xrefs: 00403187
    • C:\Users\user\Desktop, xrefs: 004030FD, 00403102, 00403108
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
    • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
    • API String ID: 2803837635-2171173163
    • Opcode ID: f372480b0837c6c57a2d238aa6b96231c33c595cef11dcb5259494f9e9f0d70c
    • Instruction ID: 55eb758a8cc994b5b8f5e8324c308f37a69edd03a8198e206d37cac48cd63750
    • Opcode Fuzzy Hash: f372480b0837c6c57a2d238aa6b96231c33c595cef11dcb5259494f9e9f0d70c
    • Instruction Fuzzy Hash: E9519171900204AFDB209FA5DD86B9E7EACEB09356F20417BF504B62D1C7789F408BAD

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 512 4065b4-4065bd 513 4065d0-4065ea 512->513 514 4065bf-4065ce 512->514 515 4065f0-4065fc 513->515 516 4067fa-406800 513->516 514->513 515->516 517 406602-406609 515->517 518 406806-406813 516->518 519 40660e-40661b 516->519 517->516 521 406815-40681a call 406577 518->521 522 40681f-406822 518->522 519->518 520 406621-40662a 519->520 523 406630-406673 520->523 524 4067e7 520->524 521->522 528 406679-406685 523->528 529 40678b-40678f 523->529 526 4067f5-4067f8 524->526 527 4067e9-4067f3 524->527 526->516 527->516 530 406687 528->530 531 40668f-406691 528->531 532 406791-406798 529->532 533 4067c3-4067c7 529->533 530->531 536 406693-4066b1 call 406445 531->536 537 4066cb-4066ce 531->537 534 4067a8-4067b4 call 406577 532->534 535 40679a-4067a6 call 4064be 532->535 538 4067d7-4067e5 lstrlenW 533->538 539 4067c9-4067d2 call 4065b4 533->539 551 4067b9-4067bf 534->551 535->551 550 4066b6-4066b9 536->550 544 4066d0-4066dc GetSystemDirectoryW 537->544 545 4066e1-4066e4 537->545 538->516 539->538 546 40676e-406771 544->546 547 4066f6-4066fa 545->547 548 4066e6-4066f2 GetWindowsDirectoryW 545->548 552 406783-406789 call 406825 546->552 553 406773-406776 546->553 547->546 554 4066fc-40671a 547->554 548->547 550->553 555 4066bf-4066c6 call 4065b4 550->555 551->538 556 4067c1 551->556 552->538 553->552 557 406778-40677e lstrcatW 553->557 559 40671c-406722 554->559 560 40672e-406746 call 40696b 554->560 555->546 556->552 557->552 565 40672a-40672c 559->565 569 406748-40675b SHGetPathFromIDListW CoTaskMemFree 560->569 570 40675d-406766 560->570 565->560 567 406768-40676c 565->567 567->546 569->567 569->570 570->554 570->567
    APIs
    • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 004066D6
    • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,?,?,00000000,00000000,00425A20,74DF23A0), ref: 004066EC
    • SHGetPathFromIDListW.SHELL32(00000000,Remove folder: ), ref: 0040674A
    • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406753
    • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040677E
    • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,?,?,00000000,00000000,00425A20,74DF23A0), ref: 004067D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
    • String ID: Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
    • API String ID: 4024019347-117590677
    • Opcode ID: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
    • Instruction ID: fc4c1bf1ff31ba1b34cdfc75387d7881e57296f2874843d1a5ebc397bafcf832
    • Opcode Fuzzy Hash: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
    • Instruction Fuzzy Hash: D16135716042009BD720AF24DD80B6B76E8EF85328F12453FF647B32D0DB7D9961865E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 571 4032d9-4032f0 572 4032f2 571->572 573 4032f9-403302 571->573 572->573 574 403304 573->574 575 40330b-403310 573->575 574->575 576 403320-40332d call 4034f4 575->576 577 403312-40331b call 40350a 575->577 581 4034e2 576->581 582 403333-403337 576->582 577->576 583 4034e4-4034e5 581->583 584 40348d-40348f 582->584 585 40333d-403386 GetTickCount 582->585 586 4034ed-4034f1 583->586 589 403491-403494 584->589 590 4034cf-4034d2 584->590 587 4034ea 585->587 588 40338c-403394 585->588 587->586 592 403396 588->592 593 403399-4033a7 call 4034f4 588->593 589->587 591 403496 589->591 594 4034d4 590->594 595 4034d7-4034e0 call 4034f4 590->595 596 403499-40349f 591->596 592->593 593->581 605 4033ad-4033b6 593->605 594->595 595->581 603 4034e7 595->603 599 4034a1 596->599 600 4034a3-4034b1 call 4034f4 596->600 599->600 600->581 608 4034b3-4034b8 call 406119 600->608 603->587 607 4033bc-4033dc call 406ac6 605->607 613 4033e2-4033f5 GetTickCount 607->613 614 403485-403487 607->614 612 4034bd-4034bf 608->612 615 4034c1-4034cb 612->615 616 403489-40348b 612->616 617 403440-403442 613->617 618 4033f7-4033ff 613->618 614->583 615->596 621 4034cd 615->621 616->583 619 403444-403448 617->619 620 403479-40347d 617->620 622 403401-403405 618->622 623 403407-403438 MulDiv wsprintfW call 4055fc 618->623 624 40344a-403451 call 406119 619->624 625 40345f-40346a 619->625 620->588 626 403483 620->626 621->587 622->617 622->623 628 40343d 623->628 631 403456-403458 624->631 630 40346d-403471 625->630 626->587 628->617 630->607 632 403477 630->632 631->616 633 40345a-40345d 631->633 632->587 633->630
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CountTick$wsprintf
    • String ID: *B$ ZB$ A$ A$... %d%%
    • API String ID: 551687249-3856725213
    • Opcode ID: eaa593b87575a6ec937a1f138dd1ec6c9bfb619ef7c698298e3bc5a85a372825
    • Instruction ID: 3a086bfa1ae904988031f2e91e2ff9394e13111a018eeb379290de00703e2b75
    • Opcode Fuzzy Hash: eaa593b87575a6ec937a1f138dd1ec6c9bfb619ef7c698298e3bc5a85a372825
    • Instruction Fuzzy Hash: 2F519F71900219DBCB11DF65DA44B9E7FB8AF44766F10413BE810BB2D1C7789A40CBA9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 634 401794-4017b9 call 402dcb call 405ebd 639 4017c3-4017d5 call 406577 call 405e46 lstrcatW 634->639 640 4017bb-4017c1 call 406577 634->640 645 4017da-4017db call 406825 639->645 640->645 649 4017e0-4017e4 645->649 650 4017e6-4017f0 call 4068d4 649->650 651 401817-40181a 649->651 659 401802-401814 650->659 660 4017f2-401800 CompareFileTime 650->660 653 401822-40183e call 406067 651->653 654 40181c-40181d call 406042 651->654 661 401840-401843 653->661 662 4018b2-4018db call 4055fc call 4032d9 653->662 654->653 659->651 660->659 663 401894-40189e call 4055fc 661->663 664 401845-401883 call 406577 * 2 call 4065b4 call 406577 call 405bd7 661->664 676 4018e3-4018ef SetFileTime 662->676 677 4018dd-4018e1 662->677 674 4018a7-4018ad 663->674 664->649 697 401889-40188a 664->697 678 402c58 674->678 680 4018f5-401900 FindCloseChangeNotification 676->680 677->676 677->680 682 402c5a-402c5e 678->682 683 401906-401909 680->683 684 402c4f-402c52 680->684 685 40190b-40191c call 4065b4 lstrcatW 683->685 686 40191e-401921 call 4065b4 683->686 684->678 692 401926-4023c7 call 405bd7 685->692 686->692 692->682 700 402953-40295a 692->700 697->674 698 40188c-40188d 697->698 698->663 700->684
    APIs
    • lstrcatW.KERNEL32(00000000,00000000), ref: 004017D5
    • CompareFileTime.KERNEL32(-00000014,?,show,show,00000000,00000000,show,C:\Program Files (x86)\IDmelon\Accesskey,?,?,00000031), ref: 004017FA
      • Part of subcall function 00406577: lstrcpynW.KERNEL32(?,?,00000400,004036C4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406584
      • Part of subcall function 004055FC: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000,?), ref: 00405634
      • Part of subcall function 004055FC: lstrlenW.KERNEL32(0040343D,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000), ref: 00405644
      • Part of subcall function 004055FC: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,0040343D), ref: 00405657
      • Part of subcall function 004055FC: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\), ref: 00405669
      • Part of subcall function 004055FC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040568F
      • Part of subcall function 004055FC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004056A9
      • Part of subcall function 004055FC: SendMessageW.USER32(?,00001013,?,00000000), ref: 004056B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
    • String ID: C:\Program Files (x86)\IDmelon\Accesskey$C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp$C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\InstallOptions.dll$show
    • API String ID: 1941528284-2025781149
    • Opcode ID: 86d07d04b1d7bc420b44533fa191de8f1a63e7a8af8a14afb7d0afcb2e6aa1a2
    • Instruction ID: 896c0c78208a39cbb5dd39340d0745d1a2bf2ace5f7797069eceb710e9101d93
    • Opcode Fuzzy Hash: 86d07d04b1d7bc420b44533fa191de8f1a63e7a8af8a14afb7d0afcb2e6aa1a2
    • Instruction Fuzzy Hash: 4C41B671900108BACB117BB5DD85DBE7AB9EF45328F21423FF412B10E2D73C8A919A2D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 701 4055fc-405611 702 405617-405628 701->702 703 4056c8-4056cc 701->703 704 405633-40563f lstrlenW 702->704 705 40562a-40562e call 4065b4 702->705 707 405641-405651 lstrlenW 704->707 708 40565c-405660 704->708 705->704 707->703 709 405653-405657 lstrcatW 707->709 710 405662-405669 SetWindowTextW 708->710 711 40566f-405673 708->711 709->708 710->711 712 405675-4056b7 SendMessageW * 3 711->712 713 4056b9-4056bb 711->713 712->713 713->703 714 4056bd-4056c0 713->714 714->703
    APIs
    • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000,?), ref: 00405634
    • lstrlenW.KERNEL32(0040343D,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000), ref: 00405644
    • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,0040343D), ref: 00405657
    • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\), ref: 00405669
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040568F
    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004056A9
    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004056B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$lstrlen$TextWindowlstrcat
    • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\
    • API String ID: 2531174081-4199893219
    • Opcode ID: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
    • Instruction ID: 60923f6e922cea494a698f26c75bee70e53a21f42b4b77269416c2a585f1ce57
    • Opcode Fuzzy Hash: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
    • Instruction Fuzzy Hash: 9A21A171900258BACB119FA5ED449DFBFB4EF45310F50843AF908B22A0C3794A40CFA8

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 715 402975-40298e call 402dcb call 405ebd 720 402990-402992 call 402dcb 715->720 721 402997-4029b0 call 406042 call 406067 715->721 720->721 727 402a60-402a65 721->727 728 4029b6-4029bf 721->728 731 402a67-402a73 DeleteFileW 727->731 732 402a7a 727->732 729 4029c5-4029dc GlobalAlloc 728->729 730 402a48-402a50 call 4032d9 728->730 729->730 733 4029de-4029fb call 40350a call 4034f4 GlobalAlloc 729->733 736 402a55-402a5a CloseHandle 730->736 731->732 740 402a31-402a44 call 406119 GlobalFree 733->740 741 4029fd-402a05 call 4032d9 733->741 736->727 740->730 744 402a0a 741->744 746 402a24-402a26 744->746 747 402a28-402a2b GlobalFree 746->747 748 402a0c-402a21 call 406022 746->748 747->740 748->746
    APIs
    • GlobalAlloc.KERNELBASE(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
    • GlobalFree.KERNEL32(?), ref: 00402A2B
    • GlobalFree.KERNELBASE(00000000), ref: 00402A3E
    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Global$AllocFree$CloseDeleteFileHandle
    • String ID:
    • API String ID: 2667972263-0
    • Opcode ID: aeea345b9e496e3d3fafa1617fda85685875a2e3d5cd25ef925516c77ed6eae9
    • Instruction ID: fd7949a1005e62e73a365a75524f2bbb059e9229dbd09bef2f8decdc6a7611be
    • Opcode Fuzzy Hash: aeea345b9e496e3d3fafa1617fda85685875a2e3d5cd25ef925516c77ed6eae9
    • Instruction Fuzzy Hash: FA31A271D00124BBCF21AFA5CE89D9E7E79AF45324F14423AF421762E1CB798D418FA8

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 751 402ece-402f00 call 4063e4 754 402fb1-402fb5 751->754 755 402f06-402f0a 751->755 756 402f0c-402f2d RegEnumValueW 755->756 757 402f2f-402f42 755->757 756->757 758 402f96-402fa4 RegCloseKey 756->758 759 402f6b-402f72 RegEnumKeyW 757->759 758->754 760 402f44-402f46 759->760 761 402f74-402f86 RegCloseKey call 40696b 759->761 760->758 763 402f48-402f5c call 402ece 760->763 767 402fa6-402faf RegDeleteKeyExW 761->767 768 402f88-402f94 RegDeleteKeyW 761->768 763->761 769 402f5e-402f6a 763->769 767->754 768->754 769->759
    APIs
    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
    • RegDeleteKeyExW.KERNELBASE(?,?,00100020,00000000,00000003,?,?), ref: 00402FAF
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseDeleteEnum$Value
    • String ID:
    • API String ID: 3807931542-0
    • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
    • Instruction ID: 446d876c474c9d83549856ad9cac23e68bb7371358ae7480bd0e7fa7c4692e5e
    • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
    • Instruction Fuzzy Hash: 1D212A7150010ABFDF129F90CE89EEF7A7DEB54388F110076B909B21E0E7B58E54AA64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 770 4068fb-40691b GetSystemDirectoryW 771 40691d 770->771 772 40691f-406921 770->772 771->772 773 406932-406934 772->773 774 406923-40692c 772->774 776 406935-406968 wsprintfW LoadLibraryExW 773->776 774->773 775 40692e-406930 774->775 775->776
    APIs
    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406912
    • wsprintfW.USER32 ref: 0040694D
    • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406961
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: DirectoryLibraryLoadSystemwsprintf
    • String ID: %s%S.dll$UXTHEME
    • API String ID: 2200240437-1106614640
    • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
    • Instruction ID: 6d7bab0cfc2d48cbbbe6bb2f91b005b1c0391479526b60628745523d5c0137a7
    • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
    • Instruction Fuzzy Hash: 66F02B71501129A7CF10AB68DD0EF9F376CAB00304F10447AA646F10E0EB7CDB69CB98

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 777 401c68-401c88 call 402da9 * 2 782 401c94-401c98 777->782 783 401c8a-401c91 call 402dcb 777->783 785 401ca4-401caa 782->785 786 401c9a-401ca1 call 402dcb 782->786 783->782 789 401cf8-401d22 call 402dcb * 2 FindWindowExW 785->789 790 401cac-401cc8 call 402da9 * 2 785->790 786->785 800 401d28 789->800 801 401ce8-401cf6 SendMessageW 790->801 802 401cca-401ce6 SendMessageTimeoutW 790->802 803 401d2b-401d2e 800->803 801->800 802->803 804 401d34 803->804 805 402c4f-402c5e 803->805 804->805
    APIs
    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$Timeout
    • String ID: !
    • API String ID: 1777923405-2657877971
    • Opcode ID: a637eb720a8cb25f7279c4c7dfa93e68b81a041eba1bee5adc213dda34b2fd0f
    • Instruction ID: 1a2acd516b32d4a8bba1f086ee74ddb70cdd2400578aaa813c3bd98b8eca9c32
    • Opcode Fuzzy Hash: a637eb720a8cb25f7279c4c7dfa93e68b81a041eba1bee5adc213dda34b2fd0f
    • Instruction Fuzzy Hash: 1121A071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF501B61D0D7B88941DB98

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 808 4024af-4024e0 call 402dcb * 2 call 402e5b 815 4024e6-4024f0 808->815 816 402c4f-402c5e 808->816 817 4024f2-4024ff call 402dcb lstrlenW 815->817 818 402503-402506 815->818 817->818 821 402508-402519 call 402da9 818->821 822 40251a-40251d 818->822 821->822 826 40252e-402542 RegSetValueExW 822->826 827 40251f-402529 call 4032d9 822->827 830 402544 826->830 831 402547-402628 RegCloseKey 826->831 827->826 830->831 831->816 833 402953-40295a 831->833 833->816
    APIs
    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp,00000023,00000011,00000002), ref: 004024FA
    • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp,00000000,00000011,00000002), ref: 0040253A
    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp,00000000,00000011,00000002), ref: 00402622
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseValuelstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp
    • API String ID: 2655323295-482291397
    • Opcode ID: 1ee84d76f42b9e83beb61e37e14ca78df45b1a10c6f610f11eef06d316a7ff26
    • Instruction ID: 9ef1a868ac7dccf2a0d827ba333ec8444b87bd6dca13d8647f6a5f0896484b93
    • Opcode Fuzzy Hash: 1ee84d76f42b9e83beb61e37e14ca78df45b1a10c6f610f11eef06d316a7ff26
    • Instruction Fuzzy Hash: DF11B131D00119BEEF00AFA1DE4AAAEB6B4EF44318F20443FF404B61D1D7B88E009A68
    APIs
      • Part of subcall function 00406577: lstrcpynW.KERNEL32(?,?,00000400,004036C4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406584
      • Part of subcall function 00405EF1: CharNextW.USER32(?,?,C:\,?,00405F65,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405EFF
      • Part of subcall function 00405EF1: CharNextW.USER32(00000000), ref: 00405F04
      • Part of subcall function 00405EF1: CharNextW.USER32(00000000), ref: 00405F1C
    • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405FA7
    • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405FB7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharNext$AttributesFilelstrcpynlstrlen
    • String ID: C:\$C:\Users\user\AppData\Local\Temp\
    • API String ID: 3248276644-3049482934
    • Opcode ID: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
    • Instruction ID: 6a7a19aedd3560da6e477bd72522a8c235124595f9c35bb96c459409ca5d5c37
    • Opcode Fuzzy Hash: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
    • Instruction Fuzzy Hash: 28F0F42A105E6369C622333A5C05AAF1954CE86324B5A453FBC91F22C5CF3C8A42CDBE
    APIs
    • GetTickCount.KERNEL32 ref: 004060B4
    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403550,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C), ref: 004060CF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CountFileNameTempTick
    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
    • API String ID: 1716503409-678247507
    • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
    • Instruction ID: 0f0e971a11aa9000600537ad3b21051f2e76e4828209a3ca974843c19b3e0847
    • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
    • Instruction Fuzzy Hash: B5F09076B40204BBEB00CF69ED05F9EB7ACEBA5750F11803AE901F7180E6B099648768
    APIs
      • Part of subcall function 00405EF1: CharNextW.USER32(?,?,C:\,?,00405F65,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405EFF
      • Part of subcall function 00405EF1: CharNextW.USER32(00000000), ref: 00405F04
      • Part of subcall function 00405EF1: CharNextW.USER32(00000000), ref: 00405F1C
    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
      • Part of subcall function 00405ACB: CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405B0D
    • SetCurrentDirectoryW.KERNELBASE(?,C:\Program Files (x86)\IDmelon\Accesskey,?,00000000,000000F0), ref: 00401672
    Strings
    • C:\Program Files (x86)\IDmelon\Accesskey, xrefs: 00401665
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharNext$Directory$AttributesCreateCurrentFile
    • String ID: C:\Program Files (x86)\IDmelon\Accesskey
    • API String ID: 1892508949-2077697000
    • Opcode ID: 522b783c9de46c7eb01671ee67dcdc22f4b8e2acc15c0cd2b2b5e6563b12514b
    • Instruction ID: 104414052cab316a424bfe0d2ff1de268c148956b102069c6a2fab9df067ebf3
    • Opcode Fuzzy Hash: 522b783c9de46c7eb01671ee67dcdc22f4b8e2acc15c0cd2b2b5e6563b12514b
    • Instruction Fuzzy Hash: 0911BE31804514ABCF206FA5CD01AAE36B0EF14368B25493BE941B22F1C63A4A41DA5D
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,Remove folder: ,?,00000000,004066B6,80000002), ref: 0040648B
    • RegCloseKey.KERNELBASE(?), ref: 00406496
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseQueryValue
    • String ID: Remove folder:
    • API String ID: 3356406503-1958208860
    • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
    • Instruction ID: 39ab2095516423f533248995afa5b88f9e2e33bd0920f2eea258779ff0fd120f
    • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
    • Instruction Fuzzy Hash: AB017C72500209AADF21CF51CC09EDB3BACFB55364F01803AFD1AA21A0D778D964DBA8
    APIs
    • FreeLibrary.KERNELBASE(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403B8C,00403AA2,?,?,00000008,0000000A,0000000C), ref: 00403BCE
    • GlobalFree.KERNEL32(00000000), ref: 00403BD5
    Strings
    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403BB4
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Free$GlobalLibrary
    • String ID: C:\Users\user\AppData\Local\Temp\
    • API String ID: 1100898210-3081826266
    • Opcode ID: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
    • Instruction ID: 378dd3650374f781d23bf779db5809bbac3881e8a2166d277484928c36cee721
    • Opcode Fuzzy Hash: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
    • Instruction Fuzzy Hash: 20E08C336204205BC6311F15AE05B1A77786F89B2AF01402AE8407B2628BB47C528FC8
    APIs
    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
      • Part of subcall function 004055FC: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000,?), ref: 00405634
      • Part of subcall function 004055FC: lstrlenW.KERNEL32(0040343D,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,00000000,00425A20,74DF23A0,?,?,?,?,?,?,?,?,?,0040343D,00000000), ref: 00405644
      • Part of subcall function 004055FC: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,0040343D), ref: 00405657
      • Part of subcall function 004055FC: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\), ref: 00405669
      • Part of subcall function 004055FC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040568F
      • Part of subcall function 004055FC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004056A9
      • Part of subcall function 004055FC: SendMessageW.USER32(?,00001013,?,00000000), ref: 004056B7
    • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402139
    • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
    • String ID:
    • API String ID: 334405425-0
    • Opcode ID: a9a1cb99ff15f1357771582dd7df8513af6aefa9ca18d0a30a4eed977a1c7e10
    • Instruction ID: ae41dde4eff0046a081fa93f434b6203791b13f397c20c3345ef6f3f33f6a532
    • Opcode Fuzzy Hash: a9a1cb99ff15f1357771582dd7df8513af6aefa9ca18d0a30a4eed977a1c7e10
    • Instruction Fuzzy Hash: 4B21A131904104EACF10AFA5CF89A9E7A71BF44369F30413BF105B91E5CBBD99829A2D
    APIs
    • GlobalFree.KERNEL32(00693DA8), ref: 00401C30
    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Global$AllocFree
    • String ID: show
    • API String ID: 3394109436-839833857
    • Opcode ID: b2bf5aa3fb98d5d7659b4efbfb09c2738223d3c1d5b8947c58a47baf3ffb3ed2
    • Instruction ID: b741a03fd702b7c6772e3f95c256d95ec8b7de3af2fdc922703a565136a7d287
    • Opcode Fuzzy Hash: b2bf5aa3fb98d5d7659b4efbfb09c2738223d3c1d5b8947c58a47baf3ffb3ed2
    • Instruction Fuzzy Hash: 9521F372904150EBDB20ABA4EE85E6E33B8AB04718715063FF542B72D5C7BCE8409B9D
    APIs
      • Part of subcall function 00406042: GetFileAttributesW.KERNELBASE(?,?,00405C47,?,?,00000000,00405E1D,?,?,?,?), ref: 00406047
      • Part of subcall function 00406042: SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040605B
    • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405E1D), ref: 00405C56
    • DeleteFileW.KERNELBASE(?,?,?,00000000,00405E1D), ref: 00405C5E
    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C76
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$Attributes$DeleteDirectoryRemove
    • String ID:
    • API String ID: 1655745494-0
    • Opcode ID: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
    • Instruction ID: c82196251123d647324ab779b7bb87df945e5a0710881db1f7e3845477fa960f
    • Opcode Fuzzy Hash: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
    • Instruction Fuzzy Hash: 96E0E53220D79116E21067305A4CB5F2998DF86724F05093AF892B11C1DB78494A8AAE
    APIs
    • SendMessageW.USER32(00000408,?,00000000,0040412E), ref: 004044ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: x
    • API String ID: 3850602802-2363233923
    • Opcode ID: 940325285312ba596bb559440598d7c93f49923121e0d523c76edeea93f158b3
    • Instruction ID: 727aaa30b1a0279700c4ddf998542a6092130f4ca847e2a016c42ef825c52627
    • Opcode Fuzzy Hash: 940325285312ba596bb559440598d7c93f49923121e0d523c76edeea93f158b3
    • Instruction Fuzzy Hash: 62C012B1180200BECB105B80DE01F067B60E7A4B02F11A439F380240B087706862DB0C
    APIs
    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
    • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
    • Instruction ID: 0adee223d2b7ba7d815a442a2885e1f2b60e3b86eb1a18037e9b6c54a102055c
    • Opcode Fuzzy Hash: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
    • Instruction Fuzzy Hash: 0E01FF31620220AFE7195B389E05B6B3698E710329F10863FF851F62F1EA78DC429B4C
    APIs
    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040247B
    • RegCloseKey.ADVAPI32(00000000), ref: 00402484
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseDeleteValue
    • String ID:
    • API String ID: 2831762973-0
    • Opcode ID: 88532daaf68fc495be88ee40bdce2257086fb46b70832e880cbbaed8aa0e1354
    • Instruction ID: 8c17455a9467dbb84b7eb3278e4b377a62f271589af7dc4cff81b1a675067d18
    • Opcode Fuzzy Hash: 88532daaf68fc495be88ee40bdce2257086fb46b70832e880cbbaed8aa0e1354
    • Instruction Fuzzy Hash: 6CF06832A045219BDB10BBA5DA8E5AE62A5AB44354F11443FE502B71C1CAF84D02977D
    APIs
    • OleInitialize.OLE32(00000000), ref: 004056DF
      • Part of subcall function 00404542: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404554
    • OleUninitialize.OLE32(00000404,00000000), ref: 0040572B
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: InitializeMessageSendUninitialize
    • String ID:
    • API String ID: 2896919175-0
    • Opcode ID: bbf0263ab9fe446523fd7f753457698ace2b8a2c52ebc29179148d008809b166
    • Instruction ID: 52f38fc7938b2997ebb4afee836ba7d943988f66c47461a03c1f49ca59b4ab2d
    • Opcode Fuzzy Hash: bbf0263ab9fe446523fd7f753457698ace2b8a2c52ebc29179148d008809b166
    • Instruction Fuzzy Hash: 2AF02E72400610DBE7016B94AD02BA373A8FBC53A5F05503EFF89B32E0CB3658018B5D
    APIs
    • CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405B0D
    • GetLastError.KERNEL32 ref: 00405B1B
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateDirectoryErrorLast
    • String ID:
    • API String ID: 1375471231-0
    • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
    • Instruction ID: 83f907d2df1d2810bbbe2cf052e9f9ea9028798b61a5f10ffece60f544324ce8
    • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
    • Instruction Fuzzy Hash: 44F0F4B0D1060EDBDB00DFA4D6497EFBBB4AB04309F00812AD941B6281D7B89248CBA9
    APIs
    • ShowWindow.USER32(00000000,00000000), ref: 00401F21
    • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$EnableShow
    • String ID:
    • API String ID: 1136574915-0
    • Opcode ID: 220038190f5765e08acb68cab3f819293a66988b7b4b21bab0f24e91f41eee4f
    • Instruction ID: 14a8ef39102396d835bb54982d99b4aace68b6eedf0c4e81be07541ee7d8ceed
    • Opcode Fuzzy Hash: 220038190f5765e08acb68cab3f819293a66988b7b4b21bab0f24e91f41eee4f
    • Instruction Fuzzy Hash: FEE04F76908610DFE748EBA4AE499EEB3F4EF80365B20197FE001F11D1DBB94D00966D
    APIs
    • GetModuleHandleA.KERNEL32(?,00000020,?,00403662,0000000C,?,?,?,?,?,?,?,?), ref: 0040697D
    • GetProcAddress.KERNEL32(00000000,?), ref: 00406998
      • Part of subcall function 004068FB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406912
      • Part of subcall function 004068FB: wsprintfW.USER32 ref: 0040694D
      • Part of subcall function 004068FB: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406961
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
    • String ID:
    • API String ID: 2547128583-0
    • Opcode ID: fa9529b661a20328ef717d54741181462d2da8a99b8882de0ad3477ad76f042b
    • Instruction ID: f16a4ad3e9102b165210d3f50f6adbe363033f5fe81171ed8a06a41b6d2757eb
    • Opcode Fuzzy Hash: fa9529b661a20328ef717d54741181462d2da8a99b8882de0ad3477ad76f042b
    • Instruction Fuzzy Hash: F1E08673504311AAD6105B759D0492772E89F89750302443EF986F2140DB38EC32A6AE
    APIs
    • SendMessageW.USER32(?,0000000B,?), ref: 00402C39
    • InvalidateRect.USER32(?), ref: 00402C49
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: InvalidateMessageRectSend
    • String ID:
    • API String ID: 909852535-0
    • Opcode ID: cfe8654151a7fb919b36f8ec236feca4529e6266032f4a9ef2e5c0ddbf65b270
    • Instruction ID: 92b7ebcd256046620b39c8ea217ab7c3c79192c04b2b2643f27b5f3eae77931e
    • Opcode Fuzzy Hash: cfe8654151a7fb919b36f8ec236feca4529e6266032f4a9ef2e5c0ddbf65b270
    • Instruction Fuzzy Hash: 9EE0ECB2650504FFEB15DB94EE85DAEB7B9EB80355B00047EF101E1060D7745D91DB28
    APIs
    • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 0040606B
    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040608D
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$AttributesCreate
    • String ID:
    • API String ID: 415043291-0
    • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
    • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
    • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
    • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
    APIs
    • GetFileAttributesW.KERNELBASE(?,?,00405C47,?,?,00000000,00405E1D,?,?,?,?), ref: 00406047
    • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040605B
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
    • Instruction ID: a0ae240d833e004fe72580c92a9f2193965d94811d262e1a0a63bc04ff00b3bc
    • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
    • Instruction Fuzzy Hash: 7ED0C972504220AFC2102728AE0889BBB55DB542717028A35F8A9A22B0CB304CA68694
    APIs
    • CloseHandle.KERNEL32(FFFFFFFF,00403AA2,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B7A
    Strings
    • C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\, xrefs: 00403B8E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\
    • API String ID: 2962429428-1540193091
    • Opcode ID: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
    • Instruction ID: 1b7086e6f2e4317af50c710f47857d00c701bc700238930339e1f9ec47f16c49
    • Opcode Fuzzy Hash: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
    • Instruction Fuzzy Hash: 38C0223010070086F0202F389E0FA183A24670073DBA08329B0B8F00F3CF7C164C841D
    APIs
    • CreateDirectoryW.KERNELBASE(?,00000000,00403545,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00405B2B
    • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B39
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateDirectoryErrorLast
    • String ID:
    • API String ID: 1375471231-0
    • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
    • Instruction ID: 2532c664264170c07cbc731aa09703a23e3881c092aaf3b019fc47175ec23a7b
    • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
    • Instruction Fuzzy Hash: 98C04C70604906DAD7505F219F087177960AB50741F158439A6C7F40A0DA74A455D92D
    APIs
    • MoveFileW.KERNEL32(00000000,00000000), ref: 004016BB
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileMove
    • String ID:
    • API String ID: 3562171763-0
    • Opcode ID: 28dc5c50ebc12032345a7729cf35481b8c8bbd71f25d5d2fe63a1407a727cbb2
    • Instruction ID: b5cd7fb0f8cac405fb011e9cf8ea0a60cc8dc6b6af2237c550085c2a5a912803
    • Opcode Fuzzy Hash: 28dc5c50ebc12032345a7729cf35481b8c8bbd71f25d5d2fe63a1407a727cbb2
    • Instruction Fuzzy Hash: 1DF0903160812293CB1077B55F0ED9F26A49F8137CB21063FB112B21E1D6BCC902926E
    APIs
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: PrivateProfileStringWrite
    • String ID:
    • API String ID: 390214022-0
    • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
    • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
    • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
    • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
    APIs
    • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 0040643B
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Create
    • String ID:
    • API String ID: 2289755597-0
    • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
    • Instruction ID: 173efcb61436e01de2ec3b268cd8b302251cd5bc368a703a1804e99dfb897165
    • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
    • Instruction Fuzzy Hash: 51E0BF72010109BFEF095F60DD4AD7B3A1DE708610B11852EF906D5051E6B5A9705675
    APIs
    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034BD,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 0040612D
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
    • Instruction ID: 5447fabf40714e60d37a3b8d529c829a5aab84dab7567664cea5a9789522ebfd
    • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
    • Instruction Fuzzy Hash: DFE08C3221021ABBDF109E518C00EEB3B6CEB003A0F014432FD26E7050D630E86097A4
    APIs
    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403507,00000000,00000000,0040332B,000000FF,00000004,00000000,00000000,00000000), ref: 004060FE
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileRead
    • String ID:
    • API String ID: 2738559852-0
    • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
    • Instruction ID: 2902185137110ca2ffdb2282e3c832ce644deeff7f1201e2b4f2572205eed693
    • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
    • Instruction Fuzzy Hash: D0E08C3221021AABCF109E508C01EEB3BACFF043A0F014432FD12EB042D230E9229BA4
    APIs
    • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,00406472,?,?,?,?,Remove folder: ,?,00000000), ref: 00406408
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Open
    • String ID:
    • API String ID: 71445658-0
    • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
    • Instruction ID: 12ce3b422fe6a0da393528f22193a7488631f194d1dbc4d2354a9349d97d7052
    • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
    • Instruction Fuzzy Hash: 34D0123204020DBBEF115F90DD01FAB3B1DEB08310F018836FE06A4091D776D570A758
    APIs
    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: bd9eef0ddba76f96e5ede74a4073dc30a0544dd5bf06428a66fa2d1577afb889
    • Instruction ID: cd4f68ad1bc4df61111a8e6125a37bec327b368bc2224c93a9ffc6bdd58994c4
    • Opcode Fuzzy Hash: bd9eef0ddba76f96e5ede74a4073dc30a0544dd5bf06428a66fa2d1577afb889
    • Instruction Fuzzy Hash: 74D05B72B08101D7DB00DBE89B49A9E77A4DB50378B31853BD111F11D4D7B8C545A71D
    APIs
    • SetDlgItemTextW.USER32(?,?,00000000), ref: 00404510
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ItemText
    • String ID:
    • API String ID: 3367045223-0
    • Opcode ID: 9f5f9317995870dd68fcf34551989b3f9c33a874f6e62bdf9e4bbf2fb329bfe5
    • Instruction ID: 97ac48dd61a0b469960c63b80490aac8c8cd18122c4a3518691629518e2bbf09
    • Opcode Fuzzy Hash: 9f5f9317995870dd68fcf34551989b3f9c33a874f6e62bdf9e4bbf2fb329bfe5
    • Instruction Fuzzy Hash: 2DC08C31008200BFE241A704CC42F0FB3ECEF9031AF00C42EB05CE00D6C6B495208A26
    APIs
    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404554
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 8dc2ea4a8cffd810c80330d43262312fa0f844130cc7d84a637c392e617d0b66
    • Instruction ID: 6ad8b1d984edffd0e08e34c6f36dd165e1dcb54a73607e2b540eae92d4c67d50
    • Opcode Fuzzy Hash: 8dc2ea4a8cffd810c80330d43262312fa0f844130cc7d84a637c392e617d0b66
    • Instruction Fuzzy Hash: ACC04C717402007BDA209F549D49F1777546790702F1495397351E51E0C674E550D61C
    APIs
    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 00403518
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
    • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
    • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
    • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
    APIs
    • SendMessageW.USER32(00000028,?,00000001,00404356), ref: 00404539
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 5e23afa4ba150cac51e31494d2c9f0ee7f8efb4361c8cf2b7a73957f204a5961
    • Instruction ID: 777369a795cbaa9bd4fd16da76cbada5404ff361b75e364c58eeef3f96c31ac9
    • Opcode Fuzzy Hash: 5e23afa4ba150cac51e31494d2c9f0ee7f8efb4361c8cf2b7a73957f204a5961
    • Instruction Fuzzy Hash: 6BB09235181600AADA115B40DE09F867BA2E7A4701F029438B340640B0CBB210A0DB08
    APIs
    • KiUserCallbackDispatcher.NTDLL(?,004042EF), ref: 00404522
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CallbackDispatcherUser
    • String ID:
    • API String ID: 2492992576-0
    • Opcode ID: faa9f1bbc6a73408ed15535010d366895e2d742fa65bef251b9024de670fa5bb
    • Instruction ID: 186c68f4495094c0cebc3eb7279f68ffc90812dad8dfd9e689695b78415bb769
    • Opcode Fuzzy Hash: faa9f1bbc6a73408ed15535010d366895e2d742fa65bef251b9024de670fa5bb
    • Instruction Fuzzy Hash: 43A00176544A04ABCE12EB50EF4990ABB62BBA4B01B618879A285514388B325921EB19
    APIs
    • GetDlgItem.USER32(?,000003FB), ref: 00404A36
    • SetWindowTextW.USER32(00000000,?), ref: 00404A60
    • SHBrowseForFolderW.SHELL32(?), ref: 00404B11
    • CoTaskMemFree.OLE32(00000000), ref: 00404B1C
    • lstrcmpiW.KERNEL32(Remove folder: ,0042CA68,00000000,?,?), ref: 00404B4E
    • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404B5A
    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B6C
      • Part of subcall function 00405BBB: GetDlgItemTextW.USER32(?,?,00000400,00404BA3), ref: 00405BCE
      • Part of subcall function 00406825: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00406888
      • Part of subcall function 00406825: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406897
      • Part of subcall function 00406825: CharNextW.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 0040689C
      • Part of subcall function 00406825: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 004068AF
    • GetDiskFreeSpaceW.KERNEL32(0042AA38,?,?,0000040F,?,0042AA38,0042AA38,?,00000001,0042AA38,?,?,000003FB,?), ref: 00404C2F
    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C4A
      • Part of subcall function 00404DA3: lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E44
      • Part of subcall function 00404DA3: wsprintfW.USER32 ref: 00404E4D
      • Part of subcall function 00404DA3: SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E60
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
    • String ID: A$C:\Program Files (x86)\IDmelon$Remove folder:
    • API String ID: 2624150263-2023687464
    • Opcode ID: 716f91307e0c0206c4811f73cf3aa40f2f43fcc6cf09981b0470e9a043fb6368
    • Instruction ID: 819d6111372f9eb468737b2dc9595d459319e5efb98401d1644bfd8e85b56d65
    • Opcode Fuzzy Hash: 716f91307e0c0206c4811f73cf3aa40f2f43fcc6cf09981b0470e9a043fb6368
    • Instruction Fuzzy Hash: 14A180B1901208ABDB11EFA5DD45BAFB7B8EF84314F11803BF601B62D1D77C9A418B69
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040293F
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileFindFirst
    • String ID:
    • API String ID: 1974802433-0
    • Opcode ID: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
    • Instruction ID: 26e9208e2aa2ebd90a7e98889f3239c7d6ed4a815a584e9a2b1206afb1357c73
    • Opcode Fuzzy Hash: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
    • Instruction Fuzzy Hash: D1F08C71A04105AAD700EBE4EE499AEB378EF14324F20017BE112F31E5D7B89E509B2E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
    • Instruction ID: 02047a1f5ab1e1ae91636e32b2ea393de8a2dfbdc7c3bc720fead707395ef2b6
    • Opcode Fuzzy Hash: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
    • Instruction Fuzzy Hash: 74E19A71A0470ADFCB24CF58C890BAABBF5FF44305F15852EE496A72D1E738AA51CB05
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
    • Instruction ID: 0a97e2f3c77d8a3c51360fc4da6bbcda8fc4cde0dfaec3b210e24d05d93e5961
    • Opcode Fuzzy Hash: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
    • Instruction Fuzzy Hash: 46C14872E042198BCF18DF68C4905EEB7B2BF88354F25866AD856B7380D734A942CF95
    APIs
    • GetDlgItem.USER32(?,000003F9), ref: 00404F7B
    • GetDlgItem.USER32(?,00000408), ref: 00404F86
    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FD0
    • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FE7
    • SetWindowLongW.USER32(?,000000FC,00405570), ref: 00405000
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00405014
    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405026
    • SendMessageW.USER32(?,00001109,00000002), ref: 0040503C
    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405048
    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040505A
    • DeleteObject.GDI32(00000000), ref: 0040505D
    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405088
    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405094
    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040512F
    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040515F
      • Part of subcall function 0040452B: SendMessageW.USER32(00000028,?,00000001,00404356), ref: 00404539
    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405173
    • GetWindowLongW.USER32(?,000000F0), ref: 004051A1
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004051AF
    • ShowWindow.USER32(?,00000005), ref: 004051BF
    • SendMessageW.USER32(?,00000419,00000000,?), ref: 004052BA
    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040531F
    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405334
    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405358
    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405378
    • ImageList_Destroy.COMCTL32(?), ref: 0040538D
    • GlobalFree.KERNEL32(?), ref: 0040539D
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405416
    • SendMessageW.USER32(?,00001102,?,?), ref: 004054BF
    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054CE
    • InvalidateRect.USER32(?,00000000,00000001), ref: 004054F9
    • ShowWindow.USER32(?,00000000), ref: 00405547
    • GetDlgItem.USER32(?,000003FE), ref: 00405552
    • ShowWindow.USER32(00000000), ref: 00405559
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
    • String ID: $M$N
    • API String ID: 2564846305-813528018
    • Opcode ID: 90cd5b96e7067808b838d0f88060242d92195fc86ed4621a895529849429e476
    • Instruction ID: 2b71226c2ce540754c325362a134889399d6c5c4637dca841463e5b600fa6882
    • Opcode Fuzzy Hash: 90cd5b96e7067808b838d0f88060242d92195fc86ed4621a895529849429e476
    • Instruction Fuzzy Hash: 8802AD70900608AFDF20DFA8DD85AAF7BB5FB45314F10817AE611BA2E1D7798A41CF58
    APIs
    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404753
    • GetDlgItem.USER32(?,000003E8), ref: 00404767
    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404784
    • GetSysColor.USER32(?), ref: 00404795
    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004047A3
    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004047B1
    • lstrlenW.KERNEL32(?), ref: 004047B6
    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047C3
    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047D8
    • GetDlgItem.USER32(?,0000040A), ref: 00404831
    • SendMessageW.USER32(00000000), ref: 00404838
    • GetDlgItem.USER32(?,000003E8), ref: 00404863
    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004048A6
    • LoadCursorW.USER32(00000000,00007F02), ref: 004048B4
    • SetCursor.USER32(00000000), ref: 004048B7
    • LoadCursorW.USER32(00000000,00007F00), ref: 004048D0
    • SetCursor.USER32(00000000), ref: 004048D3
    • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404902
    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404914
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
    • String ID: ,F@$N$Remove folder:
    • API String ID: 3103080414-938614624
    • Opcode ID: ffd7346a229d966f7877475afaa511d8b27e78dae7af650fbb9c2f9128a087cb
    • Instruction ID: ccb0ec9a7d9d767aff215416cd1a2e620de701fb5c4a8d8609e67ea5798c0c5e
    • Opcode Fuzzy Hash: ffd7346a229d966f7877475afaa511d8b27e78dae7af650fbb9c2f9128a087cb
    • Instruction Fuzzy Hash: 046192F1900209BFDB10AF64DD85EAA7B69FB84315F00853AFB05B65E0C778A951CF98
    APIs
    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
    • BeginPaint.USER32(?,?), ref: 00401047
    • GetClientRect.USER32(?,?), ref: 0040105B
    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
    • DeleteObject.GDI32(?), ref: 004010ED
    • CreateFontIndirectW.GDI32(?), ref: 00401105
    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
    • SelectObject.GDI32(00000000,?), ref: 00401140
    • DrawTextW.USER32(00000000,00433700,000000FF,00000010,00000820), ref: 00401156
    • SelectObject.GDI32(00000000,00000000), ref: 00401160
    • DeleteObject.GDI32(?), ref: 00401165
    • EndPaint.USER32(?,?), ref: 0040116E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
    • String ID: F
    • API String ID: 941294808-1304234792
    • Opcode ID: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
    • Instruction ID: eca0ad76d85821e0a7fbe67f508e5060b260b918cc65b70bf06bca200ae74670
    • Opcode Fuzzy Hash: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
    • Instruction Fuzzy Hash: 2F418B71800209AFCB058FA5DE459AFBFB9FF45314F00802EF591AA1A0C738EA54DFA4
    APIs
    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406358,?,?), ref: 004061F8
    • GetShortPathNameW.KERNEL32(?,00430108,00000400), ref: 00406201
      • Part of subcall function 00405FCC: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004062B1,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FDC
      • Part of subcall function 00405FCC: lstrlenA.KERNEL32(00000000,?,00000000,004062B1,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040600E
    • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 0040621E
    • wsprintfA.USER32 ref: 0040623C
    • GetFileSize.KERNEL32(00000000,00000000,00430908,C0000000,00000004,00430908,?,?,?,?,?), ref: 00406277
    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406286
    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004062BE
    • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,0042FD08,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406314
    • GlobalFree.KERNEL32(00000000), ref: 00406325
    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040632C
      • Part of subcall function 00406067: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 0040606B
      • Part of subcall function 00406067: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040608D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
    • String ID: %ls=%ls$[Rename]
    • API String ID: 2171350718-461813615
    • Opcode ID: b6131911dca260ac1acd8a9d51529d53a14599eca6d80b74622841643bb82037
    • Instruction ID: 21ba76f912769f78f8e3df01d85e3e27af82f360ac84a16f7af8f01611abcd2b
    • Opcode Fuzzy Hash: b6131911dca260ac1acd8a9d51529d53a14599eca6d80b74622841643bb82037
    • Instruction Fuzzy Hash: 66314330240325BBD2206B659D48F6B3B6CDF45708F16043EFD42B62C2DA3C982486BD
    APIs
    • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00406888
    • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406897
    • CharNextW.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 0040689C
    • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040352D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 004068AF
    Strings
    • *?|<>/":, xrefs: 00406877
    • "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe", xrefs: 00406869
    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406826
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Char$Next$Prev
    • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
    • API String ID: 589700163-2445662262
    • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
    • Instruction ID: bedb2e6347f460b6a244a356934bd0223db9426f0f89d28790e15ec7ef568a4f
    • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
    • Instruction Fuzzy Hash: C911B66780221295DB303B148C40A7762A8AF59754F56C43FED86732C0E77C5C9282AD
    APIs
    • GetWindowLongW.USER32(?,000000EB), ref: 0040457A
    • GetSysColor.USER32(00000000), ref: 004045B8
    • SetTextColor.GDI32(?,00000000), ref: 004045C4
    • SetBkMode.GDI32(?,?), ref: 004045D0
    • GetSysColor.USER32(?), ref: 004045E3
    • SetBkColor.GDI32(?,?), ref: 004045F3
    • DeleteObject.GDI32(?), ref: 0040460D
    • CreateBrushIndirect.GDI32(?), ref: 00404617
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
    • String ID:
    • API String ID: 2320649405-0
    • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
    • Instruction ID: 3bf72a8e0ffa46ee4049c610ab3cabbd6d50cfb344f29d4a8179c655b9565abb
    • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
    • Instruction Fuzzy Hash: 5C2165B1500B04ABC7319F38DE08B577BF4AF41715F04892EEA96A26E0D739D944CB54
    APIs
    • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
      • Part of subcall function 00406148: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040615E
    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$Pointer$ByteCharMultiWide$Read
    • String ID: 9
    • API String ID: 163830602-2366072709
    • Opcode ID: e6852b5c5fbfd8bc876860f3b14f1bcaed0b753dd9a04d4db6e12186382bd870
    • Instruction ID: d1aefac9689752b6b3ea6a4f87dd4281ecbe68d6f3974aa7f4e2ef829afcd0bd
    • Opcode Fuzzy Hash: e6852b5c5fbfd8bc876860f3b14f1bcaed0b753dd9a04d4db6e12186382bd870
    • Instruction Fuzzy Hash: 66510C75D04119AADF20EFD4CA85AAEBBB9FF44304F14817BE501B62D0D7B89D828B58
    APIs
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404ECC
    • GetMessagePos.USER32 ref: 00404ED4
    • ScreenToClient.USER32(?,?), ref: 00404EEE
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404F00
    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Message$Send$ClientScreen
    • String ID: f
    • API String ID: 41195575-1993550816
    • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
    • Instruction ID: fe1e2a7802b6c51c8f018a14413b1ee553013da7dc16083b389f375565560bf3
    • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
    • Instruction Fuzzy Hash: 20015E71900219BADB00DB94DD85BFEBBBCAF95711F10412BBB51B61D0C7B4AA418BA4
    APIs
    • GetDC.USER32(?), ref: 00401E76
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
    • ReleaseDC.USER32(?,00000000), ref: 00401EA9
    • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401EF8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CapsCreateDeviceFontIndirectRelease
    • String ID: MS Shell Dlg
    • API String ID: 3808545654-76309092
    • Opcode ID: d16b9d3e65f9976eb005c53eb2d4e9b3ac670e2d85412e8b50a51612330472b7
    • Instruction ID: 32ce691c062fdf7882ca7c79f7dc95dd78c7e40f541a0607bb82830de01dd458
    • Opcode Fuzzy Hash: d16b9d3e65f9976eb005c53eb2d4e9b3ac670e2d85412e8b50a51612330472b7
    • Instruction Fuzzy Hash: 3C017171905250EFE7005BB4EE49BDD3FA4AB19301F208A7AF142B61E2CBB904458BED
    APIs
    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
    • MulDiv.KERNEL32(01F42D36,00000064,01F43F68), ref: 00403001
    • wsprintfW.USER32 ref: 00403011
    • SetWindowTextW.USER32(?,?), ref: 00403021
    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
    Strings
    • verifying installer: %d%%, xrefs: 0040300B
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Text$ItemTimerWindowwsprintf
    • String ID: verifying installer: %d%%
    • API String ID: 1451636040-82062127
    • Opcode ID: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
    • Instruction ID: de78d71e2fb772fb87643f85aa6fa794cb5f2d0f129fd79c7e15704eeb750e6f
    • Opcode Fuzzy Hash: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
    • Instruction Fuzzy Hash: 85014F71640208BBEF209F60DD49FEE3B79AB04344F008039FA02B51D0DBB996559B59
    APIs
    • GetDlgItem.USER32(?,?), ref: 00401DBF
    • GetClientRect.USER32(?,?), ref: 00401E0A
    • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
    • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
    • DeleteObject.GDI32(00000000), ref: 00401E5E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
    • String ID:
    • API String ID: 1849352358-0
    • Opcode ID: 81c9bb8771d2fff4a04963bae7b32cf8a9b6882c20dc3426dc9c78dd315e4f46
    • Instruction ID: c57303c31a56d7bc8f2a0c5af16d3cdd50a2ae23bf22298ce01a5789fd7b985b
    • Opcode Fuzzy Hash: 81c9bb8771d2fff4a04963bae7b32cf8a9b6882c20dc3426dc9c78dd315e4f46
    • Instruction Fuzzy Hash: B9211972900119AFCB05DF98DE45AEEBBB5EB08354F14003AFA45F62A0D7789D81DB98
    APIs
    • lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E44
    • wsprintfW.USER32 ref: 00404E4D
    • SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E60
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ItemTextlstrlenwsprintf
    • String ID: %u.%u%s%s
    • API String ID: 3540041739-3551169577
    • Opcode ID: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
    • Instruction ID: f1ad69e943298bab6ea0b6c220370dbc78873d19d133ff1b34b391d97265b774
    • Opcode Fuzzy Hash: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
    • Instruction Fuzzy Hash: 3011EB336041287BDB10566DAC45E9E329CDF85374F250237FE25F21D5E978C92182E8
    APIs
    • CharNextW.USER32(?,?,C:\,?,00405F65,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405CA3,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe"), ref: 00405EFF
    • CharNextW.USER32(00000000), ref: 00405F04
    • CharNextW.USER32(00000000), ref: 00405F1C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharNext
    • String ID: C:\
    • API String ID: 3213498283-3404278061
    • Opcode ID: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
    • Instruction ID: 0a1f1b5a9c7109d9782da40e5c64a20d368bd089a9add51530d5bf68f03dfa04
    • Opcode Fuzzy Hash: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
    • Instruction Fuzzy Hash: 98F09062D00A2795DA31B7645C85A7766BCEB593A0B00807BE601B72C0D7BC48818EDA
    APIs
    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040353F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00405E4C
    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040353F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040383C,?,00000008,0000000A,0000000C), ref: 00405E56
    • lstrcatW.KERNEL32(?,0040A014), ref: 00405E68
    Strings
    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E46
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharPrevlstrcatlstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\
    • API String ID: 2659869361-3081826266
    • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
    • Instruction ID: f2f0f64a112d89f35c11d852d44423d34ca235ab8761dbed5ccf1744ff487032
    • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
    • Instruction Fuzzy Hash: C2D05E31101534AAC6116F54AD04DDB62AC9E46384381483BF541B20A5C778595186FD
    APIs
    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\InstallOptions.dll), ref: 004026BA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: lstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp$C:\Users\user\AppData\Local\Temp\nsk9B0F.tmp\InstallOptions.dll
    • API String ID: 1659193697-3046679440
    • Opcode ID: a4ab9620505a7c85356e9c2108c39dfcc9113724b8f7ebba52d5104abcb2633f
    • Instruction ID: 2d8dd356423beb748054ff885628a6ea3dfbd93006732d19d47d72bde2aed11d
    • Opcode Fuzzy Hash: a4ab9620505a7c85356e9c2108c39dfcc9113724b8f7ebba52d5104abcb2633f
    • Instruction Fuzzy Hash: 3C11EB71A00315ABCB106FB19E466AE7761AF40748F21443FF502B71C1EAFD8891676E
    APIs
    • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
    • GetTickCount.KERNEL32 ref: 0040306F
    • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
    • ShowWindow.USER32(00000000,00000005), ref: 0040309A
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$CountCreateDestroyDialogParamShowTick
    • String ID:
    • API String ID: 2102729457-0
    • Opcode ID: dba963b85b565a1be4b34eea4ba853e9dad76a83014f6dce089c5eda9641480c
    • Instruction ID: e0f0fd039426b51c9db09d8e0aed7b7b9f53d87474512ec8403aba9b2c913b41
    • Opcode Fuzzy Hash: dba963b85b565a1be4b34eea4ba853e9dad76a83014f6dce089c5eda9641480c
    • Instruction Fuzzy Hash: 93F05470602A21ABC6216F50FE09A9B7B69FB45B12B41043AF545B11ACCB384891CB9D
    APIs
    • IsWindowVisible.USER32(?), ref: 0040559F
    • CallWindowProcW.USER32(?,?,?,?), ref: 004055F0
      • Part of subcall function 00404542: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404554
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$CallMessageProcSendVisible
    • String ID:
    • API String ID: 3748168415-3916222277
    • Opcode ID: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
    • Instruction ID: f144bc20a23b2fc1dad06cc698734642626ca736bc3518a3bbd7873959a32aa8
    • Opcode Fuzzy Hash: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
    • Instruction Fuzzy Hash: 21017171100608BBDF219F11DD84A9F376BEB84794F204037FA027A1D9C7398D529A69
    APIs
    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 00405E98
    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe,80000000,00000003), ref: 00405EA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharPrevlstrlen
    • String ID: C:\Users\user\Desktop
    • API String ID: 2709904686-224404859
    • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
    • Instruction ID: f09b3c5ebc87e5286f4ae90cf2a9e4f9baad7a67d9a69d6c991adc66958b5f71
    • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
    • Instruction Fuzzy Hash: 40D05EB28019209ED3226B04EC0499F73A8EF123107868826E980A61A5D7785D818AEC
    APIs
    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004062B1,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FDC
    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FF4
    • CharNextA.USER32(00000000,?,00000000,004062B1,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406005
    • lstrlenA.KERNEL32(00000000,?,00000000,004062B1,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040600E
    Memory Dump Source
    • Source File: 00000000.00000002.2060903488.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2060886979.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060921863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2060938460.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2061055445.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: lstrlen$CharNextlstrcmpi
    • String ID:
    • API String ID: 190613189-0
    • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
    • Instruction ID: b896d6fd3cda69cb85c158c7a33f171d68b8f81fed19edc6c2f6f75b2124ada4
    • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
    • Instruction Fuzzy Hash: 64F0F631104418FFC702DFA5DD00D9EBBA8EF45350B2200B9E841FB250D674DE11AB68

    Execution Graph

    Execution Coverage:4.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:2.2%
    Total number of Nodes:735
    Total number of Limit Nodes:45
    execution_graph 15247 1400250ee 15256 140019a9c 15247->15256 15249 14001c6a8 _getptd 45 API calls 15250 140025156 15249->15250 15251 14001c6a8 _getptd 45 API calls 15250->15251 15252 140025169 15251->15252 15255 140025143 __CxxFrameHandler 15255->15249 15257 14001c6a8 _getptd 45 API calls 15256->15257 15258 140019aae 15257->15258 15259 140019abc 15258->15259 15271 14001e118 DecodePointer 15258->15271 15261 14001c6a8 _getptd 45 API calls 15259->15261 15263 140019ac1 15261->15263 15262 140019ad8 15265 14001e118 __CxxFrameHandler 50 API calls 15262->15265 15263->15262 15264 140019ae8 15263->15264 15266 14001c6a8 _getptd 45 API calls 15264->15266 15267 140019add 15265->15267 15266->15267 15267->15255 15268 140019a68 15267->15268 15269 14001c6a8 _getptd 45 API calls 15268->15269 15270 140019a76 15269->15270 15270->15255 15272 14001e12d 15271->15272 15275 14001e0f4 15272->15275 15276 14001c6a8 _getptd 45 API calls 15275->15276 15277 14001e0fd 15276->15277 15280 140023d20 15277->15280 15281 140023d30 15280->15281 15283 140023d3a __CxxFrameHandler 15280->15283 15282 14001dbb8 _FF_MSGBANNER 45 API calls 15281->15282 15282->15283 15284 140023d4e 15283->15284 15290 14001e358 15283->15290 15286 140023d57 RtlCaptureContext 15284->15286 15287 140023db6 __CxxFrameHandler 15284->15287 15288 140018830 _FF_MSGBANNER 15286->15288 15289 140023d77 SetUnhandledExceptionFilter UnhandledExceptionFilter 15288->15289 15289->15287 15291 14001e384 15290->15291 15292 14001e3de DecodePointer 15290->15292 15291->15292 15294 14001e42f 15291->15294 15296 14001e3a8 15291->15296 15297 14001e434 __CxxFrameHandler 15292->15297 15295 14001c624 __doserrno 45 API calls 15294->15295 15295->15297 15296->15292 15299 14001e3b7 15296->15299 15298 14001a91c _lock 45 API calls 15297->15298 15301 14001e4d3 15297->15301 15307 14001e3d6 15297->15307 15298->15301 15300 14001b8bc _errno 45 API calls 15299->15300 15302 14001e3bc 15300->15302 15305 14001e525 15301->15305 15308 14001c534 EncodePointer 15301->15308 15303 14001b7ec _close_nolock 7 API calls 15302->15303 15303->15307 15305->15307 15309 14001a81c LeaveCriticalSection 15305->15309 15307->15284 15622 140014c20 15623 140014c73 _vfwprintf_p 15622->15623 15624 140014c63 15622->15624 15627 1400026b0 85 API calls 15623->15627 15624->15623 15625 140014cb4 15624->15625 15626 140018170 _snwprintf_s 77 API calls 15625->15626 15628 140014cdb 15626->15628 15629 140014c89 15627->15629 15630 140018170 _snwprintf_s 77 API calls 15628->15630 15633 140018800 write_char 8 API calls 15629->15633 15631 140014d08 15630->15631 15632 140006b30 94 API calls 15631->15632 15635 140014d1d 15632->15635 15634 140014c9c 15633->15634 15635->15629 15637 14000d020 15635->15637 15638 140018170 _snwprintf_s 77 API calls 15637->15638 15639 14000d074 15638->15639 15640 14000d0a8 15639->15640 15641 14000d078 15639->15641 15642 14000d11b 15640->15642 15644 14000cd00 89 API calls 15640->15644 15643 1400025f0 3 API calls 15641->15643 15645 14000cd20 89 API calls 15642->15645 15649 14000d0a1 15643->15649 15646 14000d0db 15644->15646 15647 14000d12e 15645->15647 15648 14000d0e3 RegQueryValueExW RegCloseKey 15646->15648 15646->15649 15647->15649 15652 14000d154 15647->15652 15653 14000d16a RegDeleteValueW 15647->15653 15648->15642 15648->15649 15650 140018800 write_char 8 API calls 15649->15650 15651 14000d1a4 15650->15651 15651->15629 15654 14000bfc0 88 API calls 15652->15654 15655 14000d17a 15653->15655 15657 14000d166 15654->15657 15656 14000d181 RegCloseKey 15655->15656 15656->15649 15657->15656 14935 14000d020 14936 140018170 _snwprintf_s 77 API calls 14935->14936 14937 14000d074 14936->14937 14938 14000d0a8 14937->14938 14939 14000d078 14937->14939 14940 14000d11b 14938->14940 14942 14000cd00 89 API calls 14938->14942 14941 1400025f0 3 API calls 14939->14941 14943 14000cd20 89 API calls 14940->14943 14947 14000d0a1 14941->14947 14944 14000d0db 14942->14944 14945 14000d12e 14943->14945 14946 14000d0e3 RegQueryValueExW RegCloseKey 14944->14946 14944->14947 14945->14947 14950 14000d154 14945->14950 14951 14000d16a RegDeleteValueW 14945->14951 14946->14940 14946->14947 14948 140018800 write_char 8 API calls 14947->14948 14949 14000d1a4 14948->14949 14956 14000bfc0 RegSetValueExW 14950->14956 14953 14000d17a 14951->14953 14954 14000d181 RegCloseKey 14953->14954 14954->14947 14955 14000d166 14955->14954 14957 14000c017 GetLastError 14956->14957 14958 14000c00c 14956->14958 14959 140002430 83 API calls 14957->14959 14958->14955 14960 14000c024 14959->14960 14961 1400025f0 3 API calls 14960->14961 14962 14000c045 14961->14962 14962->14955 16053 140024e2d 16056 14001a81c LeaveCriticalSection 16053->16056 16106 140018038 16111 14001a700 16106->16111 16112 14001a60c 16111->16112 16113 14001a91c _lock 45 API calls 16112->16113 16119 14001a635 16113->16119 16114 14001a6d2 16140 14001a81c LeaveCriticalSection 16114->16140 16117 1400180c0 46 API calls 16117->16119 16118 140018148 2 API calls 16118->16119 16119->16114 16119->16117 16119->16118 16130 14001a5c4 16119->16130 16131 14001a5d2 16130->16131 16132 14001a5d9 16130->16132 16141 14001a60c 16131->16141 16134 14001a548 _flush 77 API calls 16132->16134 16135 14001a5de 16134->16135 16136 140019e0c _flush 45 API calls 16135->16136 16139 14001a5d7 16135->16139 16137 14001a5f6 16136->16137 16150 1400212c0 16137->16150 16139->16119 16142 14001a91c _lock 45 API calls 16141->16142 16148 14001a635 16142->16148 16143 14001a6d2 16176 14001a81c LeaveCriticalSection 16143->16176 16146 1400180c0 46 API calls 16146->16148 16147 140018148 2 API calls 16147->16148 16148->16143 16148->16146 16148->16147 16149 14001a5c4 81 API calls 16148->16149 16149->16148 16151 1400212ec 16150->16151 16152 1400212d9 16150->16152 16154 1400213a2 16151->16154 16157 140021300 16151->16157 16153 14001b8bc _errno 45 API calls 16152->16153 16156 1400212de 16153->16156 16155 14001b8bc _errno 45 API calls 16154->16155 16158 1400213a7 16155->16158 16156->16139 16159 140021326 16157->16159 16160 14002134b 16157->16160 16162 14001b7ec _close_nolock 7 API calls 16158->16162 16163 14001b8bc _errno 45 API calls 16159->16163 16161 14002006c _flush 46 API calls 16160->16161 16164 140021352 16161->16164 16162->16156 16165 14002132b 16163->16165 16167 14001ffe8 _close_nolock 45 API calls 16164->16167 16175 140021387 16164->16175 16166 14001b7ec _close_nolock 7 API calls 16165->16166 16166->16156 16169 140021365 FlushFileBuffers 16167->16169 16168 14001b8bc _errno 45 API calls 16170 14002138e 16168->16170 16171 140021372 GetLastError 16169->16171 16173 14002137c 16169->16173 16177 140020114 LeaveCriticalSection 16170->16177 16171->16173 16173->16170 16174 14001b8dc __doserrno 45 API calls 16173->16174 16174->16175 16175->16168 12130 140019e44 12131 140019e5c 12130->12131 12170 1400205ec HeapCreate 12131->12170 12134 140019eea 12173 14001c804 12134->12173 12136 140019ed1 12372 14001dde0 12136->12372 12137 140019ed6 12381 14001dbb8 12137->12381 12171 140019ec4 12170->12171 12172 140020610 HeapSetInformation 12170->12172 12171->12134 12171->12136 12171->12137 12172->12171 12422 14001915c 12173->12422 12175 14001c80f 12427 14001a70c 12175->12427 12178 14001c878 12445 14001c548 12178->12445 12179 14001c818 FlsAlloc 12179->12178 12180 14001c830 12179->12180 12431 14001a34c 12180->12431 12185 14001c847 FlsSetValue 12185->12178 12186 14001c85a 12185->12186 12436 14001c570 12186->12436 14858 140023c7c 12372->14858 12375 14001ddfd 12376 14001dbb8 _FF_MSGBANNER 45 API calls 12375->12376 12379 14001de1e 12375->12379 12378 14001de14 12376->12378 12377 140023c7c _FF_MSGBANNER 45 API calls 12377->12375 12380 14001dbb8 _FF_MSGBANNER 45 API calls 12378->12380 12379->12137 12380->12379 12382 14001dbdb 12381->12382 12383 140023c7c _FF_MSGBANNER 42 API calls 12382->12383 12413 140019ee0 12382->12413 12384 14001dbfd 12383->12384 12385 14001dd82 GetStdHandle 12384->12385 12386 140023c7c _FF_MSGBANNER 42 API calls 12384->12386 12387 14001dd95 _FF_MSGBANNER 12385->12387 12385->12413 12388 14001dc10 12386->12388 12390 14001ddab WriteFile 12387->12390 12387->12413 12388->12385 12389 14001dc21 12388->12389 12389->12413 14864 140022840 12389->14864 12390->12413 12393 14001dc65 GetModuleFileNameA 12395 14001dcb6 _FF_MSGBANNER 12393->12395 12396 14001dc85 12393->12396 12394 14001b6c4 _FF_MSGBANNER 6 API calls 12394->12393 12398 14001dd11 12395->12398 14873 140022768 12395->14873 12397 140022840 _FF_MSGBANNER 42 API calls 12396->12397 12399 14001dc9d 12397->12399 14882 1400226dc 12398->14882 12399->12395 12401 14001b6c4 _FF_MSGBANNER 6 API calls 12399->12401 12401->12395 12404 14001dd3c 12405 1400226dc _FF_MSGBANNER 42 API calls 12404->12405 12408 14001dd52 12405->12408 12407 14001b6c4 _FF_MSGBANNER 6 API calls 12407->12404 12409 14001dd6b 12408->12409 12411 14001b6c4 _FF_MSGBANNER 6 API calls 12408->12411 14891 140023a88 12409->14891 12410 14001b6c4 _FF_MSGBANNER 6 API calls 12410->12398 12411->12409 12414 140018e48 12413->12414 14909 140018e0c GetModuleHandleW 12414->14909 12448 14001c534 EncodePointer 12422->12448 12424 140019167 _initp_misc_winsig 12425 14001e13c EncodePointer 12424->12425 12426 1400191aa EncodePointer 12425->12426 12426->12175 12429 14001a72f 12427->12429 12430 14001a76c 12429->12430 12449 14001e5e4 InitializeCriticalSectionAndSpinCount 12429->12449 12430->12178 12430->12179 12432 14001a371 12431->12432 12434 14001a3b1 12432->12434 12435 14001a38f Sleep 12432->12435 12451 1400207a4 12432->12451 12434->12178 12434->12185 12435->12432 12435->12434 12494 14001a91c 12436->12494 12446 14001c564 12445->12446 12447 14001c557 FlsFree 12445->12447 12447->12446 12450 14001e611 12449->12450 12450->12429 12452 1400207b9 12451->12452 12458 1400207eb malloc 12451->12458 12453 1400207c7 12452->12453 12452->12458 12460 14001b8bc 12453->12460 12455 140020803 HeapAlloc 12457 1400207e7 12455->12457 12455->12458 12457->12432 12458->12455 12458->12457 12467 14001c624 GetLastError FlsGetValue 12460->12467 12462 14001b8c5 12463 14001b7ec DecodePointer 12462->12463 12464 14001b837 _FF_MSGBANNER 12463->12464 12465 14001b81d 12463->12465 12485 14001b6c4 12464->12485 12465->12457 12468 14001c692 SetLastError 12467->12468 12469 14001c64a 12467->12469 12468->12462 12470 14001a34c __doserrno 40 API calls 12469->12470 12471 14001c657 12470->12471 12471->12468 12472 14001c65f FlsSetValue 12471->12472 12473 14001c675 12472->12473 12474 14001c68b 12472->12474 12475 14001c570 __doserrno 40 API calls 12473->12475 12479 14001a458 12474->12479 12478 14001c67c GetCurrentThreadId 12475->12478 12477 14001c690 12477->12468 12478->12468 12480 14001a45d HeapFree 12479->12480 12482 14001a48d free 12479->12482 12481 14001a478 12480->12481 12480->12482 12483 14001b8bc _errno 43 API calls 12481->12483 12482->12477 12484 14001a47d GetLastError 12483->12484 12484->12482 12492 140018830 12485->12492 12487 14001b6e4 RtlCaptureContext 12488 14001b721 12487->12488 12489 14001b781 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12488->12489 12490 14001b7cc GetCurrentProcess TerminateProcess 12489->12490 12491 14001b7c0 _FF_MSGBANNER 12489->12491 12490->12465 12491->12490 12493 140018839 12492->12493 12493->12487 12493->12493 12495 14001a93a 12494->12495 12496 14001a94b EnterCriticalSection 12494->12496 12500 14001a834 12495->12500 12499 140018ddc _lock 44 API calls 12499->12496 12501 14001a872 12500->12501 12502 14001a85b 12500->12502 12504 14001a887 12501->12504 12526 14001a2e0 12501->12526 12503 14001dde0 _FF_MSGBANNER 44 API calls 12502->12503 12505 14001a860 12503->12505 12504->12496 12504->12499 12507 14001dbb8 _FF_MSGBANNER 44 API calls 12505->12507 12509 14001a868 12507->12509 12514 140018e48 malloc 3 API calls 12509->12514 12510 14001a8ac 12513 14001a91c _lock 44 API calls 12510->12513 12511 14001a89d 12512 14001b8bc _errno 44 API calls 12511->12512 12512->12504 12515 14001a8b6 12513->12515 12514->12501 12516 14001a8ee 12515->12516 12517 14001a8bf 12515->12517 12519 14001a458 free 44 API calls 12516->12519 12518 14001e5e4 _lock InitializeCriticalSectionAndSpinCount 12517->12518 12520 14001a8cc 12518->12520 12525 14001a8dd LeaveCriticalSection 12519->12525 12522 14001a458 free 44 API calls 12520->12522 12520->12525 12523 14001a8d8 12522->12523 12524 14001b8bc _errno 44 API calls 12523->12524 12524->12525 12525->12504 12527 14001a2fc 12526->12527 12529 14001a334 12527->12529 12530 14001a314 Sleep 12527->12530 12531 1400206ec 12527->12531 12529->12510 12529->12511 12530->12527 12530->12529 12532 140020704 malloc 12531->12532 12533 140020780 malloc 12531->12533 12534 14002073c RtlAllocateHeap 12532->12534 12535 14002071c 12532->12535 12539 140020765 12532->12539 12542 14002076a 12532->12542 12537 14001b8bc _errno 44 API calls 12533->12537 12534->12532 12538 140020775 12534->12538 12535->12534 12536 14001dde0 _FF_MSGBANNER 44 API calls 12535->12536 12541 14001dbb8 _FF_MSGBANNER 44 API calls 12535->12541 12543 140018e48 malloc 3 API calls 12535->12543 12536->12535 12537->12538 12538->12527 12540 14001b8bc _errno 44 API calls 12539->12540 12540->12542 12541->12535 12544 14001b8bc _errno 44 API calls 12542->12544 12543->12535 12544->12538 14859 140023c84 14858->14859 14860 14001ddee 14859->14860 14861 14001b8bc _errno 45 API calls 14859->14861 14860->12375 14860->12377 14862 140023ca9 14861->14862 14863 14001b7ec _close_nolock 7 API calls 14862->14863 14863->14860 14865 140022855 14864->14865 14866 14002284b 14864->14866 14867 14001b8bc _errno 45 API calls 14865->14867 14866->14865 14871 140022881 14866->14871 14868 14002285d 14867->14868 14869 14001b7ec _close_nolock 7 API calls 14868->14869 14870 14001dc4c 14869->14870 14870->12393 14870->12394 14871->14870 14872 14001b8bc _errno 45 API calls 14871->14872 14872->14868 14874 140022776 14873->14874 14877 14002277b 14874->14877 14879 14001dcf8 14874->14879 14880 1400227c9 14874->14880 14875 14001b8bc _errno 45 API calls 14876 1400227a5 14875->14876 14878 14001b7ec _close_nolock 7 API calls 14876->14878 14877->14875 14877->14879 14878->14879 14879->12398 14879->12410 14880->14879 14881 14001b8bc _errno 45 API calls 14880->14881 14881->14876 14883 1400226f4 14882->14883 14885 1400226ea 14882->14885 14884 14001b8bc _errno 45 API calls 14883->14884 14890 1400226fc 14884->14890 14885->14883 14888 140022738 14885->14888 14886 14001b7ec _close_nolock 7 API calls 14887 14001dd23 14886->14887 14887->12404 14887->12407 14888->14887 14889 14001b8bc _errno 45 API calls 14888->14889 14889->14890 14890->14886 14908 14001c534 EncodePointer 14891->14908 14910 140018e26 GetProcAddress 14909->14910 14911 140018e3f ExitProcess 14909->14911 14910->14911 14912 140018e3b 14910->14912 14912->14911 16825 14001c178 16826 14001c185 16825->16826 16827 14001c18f 16825->16827 16829 14001bf80 16826->16829 16830 14001c6a8 _getptd 45 API calls 16829->16830 16831 14001bfa4 16830->16831 16832 14001bbbc __initmbctable 45 API calls 16831->16832 16833 14001bfac 16832->16833 16853 14001bc78 16833->16853 16836 14001a2e0 _getbuf 45 API calls 16837 14001bfd0 __initmbctable 16836->16837 16852 14001c12d 16837->16852 16860 14001bd08 16837->16860 16840 14001c00b 16844 14001a458 free 45 API calls 16840->16844 16846 14001c030 16840->16846 16841 14001c12f 16842 14001c148 16841->16842 16845 14001a458 free 45 API calls 16841->16845 16841->16852 16843 14001b8bc _errno 45 API calls 16842->16843 16843->16852 16844->16846 16845->16842 16847 14001a91c _lock 45 API calls 16846->16847 16846->16852 16848 14001c068 16847->16848 16849 14001c118 16848->16849 16851 14001a458 free 45 API calls 16848->16851 16870 14001a81c LeaveCriticalSection 16849->16870 16851->16849 16852->16827 16854 140018564 _wcstoui64 45 API calls 16853->16854 16855 14001bc8c 16854->16855 16856 14001bc98 GetOEMCP 16855->16856 16857 14001bcbd 16855->16857 16859 14001bca8 16856->16859 16858 14001bcc2 GetACP 16857->16858 16857->16859 16858->16859 16859->16836 16859->16852 16861 14001bc78 __initmbctable 47 API calls 16860->16861 16862 14001bd2f 16861->16862 16863 14001bd37 __initmbctable 16862->16863 16864 14001bd88 IsValidCodePage 16862->16864 16869 14001bdae _FF_MSGBANNER 16862->16869 16865 140018800 write_char 8 API calls 16863->16865 16864->16863 16866 14001bd99 GetCPInfo 16864->16866 16867 14001bf6b 16865->16867 16866->16863 16866->16869 16867->16840 16867->16841 16871 14001b9d8 GetCPInfo 16869->16871 16872 14001bb06 16871->16872 16873 14001ba1a _FF_MSGBANNER 16871->16873 16876 140018800 write_char 8 API calls 16872->16876 16874 140022384 __initmbctable 67 API calls 16873->16874 16875 14001ba9d 16874->16875 16881 140022080 16875->16881 16878 14001bba6 16876->16878 16878->16863 16880 140022080 __initmbctable 78 API calls 16880->16872 16882 140018564 _wcstoui64 45 API calls 16881->16882 16883 1400220a4 16882->16883 16886 140021b40 16883->16886 16887 140021b98 LCMapStringW 16886->16887 16891 140021bbc 16886->16891 16888 140021bc8 GetLastError 16887->16888 16887->16891 16888->16891 16889 140021e8a 16894 1400245e8 __initmbctable 67 API calls 16889->16894 16890 140021c37 16892 140021e83 16890->16892 16893 140021c55 MultiByteToWideChar 16890->16893 16891->16889 16891->16890 16895 140018800 write_char 8 API calls 16892->16895 16893->16892 16904 140021c84 16893->16904 16896 140021eb8 16894->16896 16897 14001bad0 16895->16897 16896->16892 16898 140022013 LCMapStringA 16896->16898 16899 140021ed7 16896->16899 16897->16880 16915 140021f1f 16898->16915 16901 14002463c __initmbctable 60 API calls 16899->16901 16900 140021d00 MultiByteToWideChar 16902 140021e75 16900->16902 16903 140021d2a LCMapStringW 16900->16903 16906 140021eef 16901->16906 16902->16892 16911 14001a458 free 45 API calls 16902->16911 16903->16902 16907 140021d54 16903->16907 16905 1400206ec malloc 45 API calls 16904->16905 16908 140021cb5 _flush 16904->16908 16905->16908 16906->16892 16909 140021ef7 LCMapStringA 16906->16909 16912 140021d5f 16907->16912 16918 140021d9a 16907->16918 16908->16892 16908->16900 16909->16915 16920 140021f26 16909->16920 16910 140022043 16910->16892 16916 14001a458 free 45 API calls 16910->16916 16911->16892 16912->16902 16914 140021d76 LCMapStringW 16912->16914 16913 14001a458 free 45 API calls 16913->16910 16914->16902 16915->16910 16915->16913 16916->16892 16917 140021e07 LCMapStringW 16921 140021e67 16917->16921 16922 140021e28 WideCharToMultiByte 16917->16922 16919 1400206ec malloc 45 API calls 16918->16919 16928 140021db8 _flush 16918->16928 16919->16928 16923 1400206ec malloc 45 API calls 16920->16923 16925 140021f47 _flush _FF_MSGBANNER 16920->16925 16921->16902 16927 14001a458 free 45 API calls 16921->16927 16922->16921 16923->16925 16924 140021fa9 LCMapStringA 16929 140021fd1 16924->16929 16930 140021fd5 16924->16930 16925->16915 16925->16924 16927->16902 16928->16902 16928->16917 16929->16915 16932 14001a458 free 45 API calls 16929->16932 16931 14002463c __initmbctable 60 API calls 16930->16931 16931->16929 16932->16915 16988 14001977c 16989 14001c6a8 _getptd 45 API calls 16988->16989 16990 14001979e 16989->16990 16991 14001c6a8 _getptd 45 API calls 16990->16991 16992 1400197ae 16991->16992 16993 14001c6a8 _getptd 45 API calls 16992->16993 16994 1400197be 16993->16994 16997 14001fd14 16994->16997 16998 14001c6a8 _getptd 45 API calls 16997->16998 16999 14001fd3d 16998->16999 17001 14001fda8 16999->17001 17002 14001fe3b 16999->17002 17016 1400197f3 16999->17016 17000 14001fe04 17006 14001fe28 17000->17006 17010 14001fe0d 17000->17010 17001->17000 17004 14001fdca 17001->17004 17001->17016 17007 14001fe5b 17002->17007 17002->17016 17051 140019668 17002->17051 17019 14001e9b8 17004->17019 17042 1400196d0 17006->17042 17013 14001fe95 17007->17013 17007->17016 17054 140019680 17007->17054 17014 14001fdee 17010->17014 17015 14001e118 __CxxFrameHandler 50 API calls 17010->17015 17013->17016 17057 14001f794 17013->17057 17025 14001eca4 17014->17025 17015->17014 17017 14001e118 __CxxFrameHandler 50 API calls 17017->17014 17020 14001e9da 17019->17020 17021 14001e9df 17019->17021 17022 14001e118 __CxxFrameHandler 50 API calls 17020->17022 17023 14001e118 __CxxFrameHandler 50 API calls 17021->17023 17024 14001e9f1 17021->17024 17022->17021 17023->17024 17024->17014 17024->17017 17127 14001ea4c 17025->17127 17028 140019668 __CxxFrameHandler 45 API calls 17029 14001ecde 17028->17029 17030 14001c6a8 _getptd 45 API calls 17029->17030 17040 14001eceb __CxxFrameHandler 17030->17040 17031 14001edef 17032 14001c6a8 _getptd 45 API calls 17031->17032 17033 14001edf4 17032->17033 17035 14001ee02 17033->17035 17036 14001c6a8 _getptd 45 API calls 17033->17036 17034 14001e118 __CxxFrameHandler 50 API calls 17034->17040 17037 14001ee17 __CxxFrameHandler 17035->17037 17038 14001e118 __CxxFrameHandler 50 API calls 17035->17038 17036->17035 17037->17016 17038->17037 17039 140019668 45 API calls __CxxFrameHandler 17039->17040 17040->17031 17040->17034 17040->17039 17131 140019698 17040->17131 17134 14001957c 17042->17134 17046 14001c6a8 _getptd 45 API calls 17047 140019705 17046->17047 17047->17046 17048 140019744 17047->17048 17049 14001eca4 __CxxFrameHandler 50 API calls 17048->17049 17050 140019763 17049->17050 17050->17016 17052 14001c6a8 _getptd 45 API calls 17051->17052 17053 140019671 17052->17053 17053->17007 17055 14001c6a8 _getptd 45 API calls 17054->17055 17056 140019689 17055->17056 17056->17013 17058 14001ea44 __GetUnwindTryBlock 50 API calls 17057->17058 17059 14001f7e7 17058->17059 17060 14001957c __GetUnwindTryBlock 51 API calls 17059->17060 17061 14001f7fc 17060->17061 17145 14001eabc 17061->17145 17064 14001f834 17066 14001eabc __GetUnwindTryBlock 51 API calls 17064->17066 17065 14001f814 __CxxFrameHandler 17148 14001ea80 17065->17148 17067 14001f832 17066->17067 17069 14001e118 __CxxFrameHandler 50 API calls 17067->17069 17075 14001f84d 17067->17075 17069->17075 17070 14001fca4 17071 14001fc41 __CxxFrameHandler 17070->17071 17073 14001fcb4 17070->17073 17074 14001fce8 17070->17074 17072 14001c6a8 _getptd 45 API calls 17071->17072 17076 14001fc7b 17072->17076 17199 14001f550 17073->17199 17078 14001e0f4 __CxxFrameHandler 49 API calls 17074->17078 17075->17070 17079 14001c6a8 _getptd 45 API calls 17075->17079 17082 14001fa0a 17075->17082 17080 14001fc89 17076->17080 17087 14001e118 __CxxFrameHandler 50 API calls 17076->17087 17081 14001fced 17078->17081 17086 14001f891 17079->17086 17080->17016 17216 140023e9c 17081->17216 17082->17070 17083 14001fa48 17082->17083 17085 14001fbcd 17083->17085 17173 1400198fc 17083->17173 17085->17071 17091 140019668 __CxxFrameHandler 45 API calls 17085->17091 17094 14001fbf8 17085->17094 17086->17080 17090 14001c6a8 _getptd 45 API calls 17086->17090 17087->17080 17092 14001f8a3 17090->17092 17091->17094 17093 14001c6a8 _getptd 45 API calls 17092->17093 17096 14001f8af 17093->17096 17094->17071 17095 14001fc0f 17094->17095 17097 140019668 __CxxFrameHandler 45 API calls 17094->17097 17100 14001eea0 __CxxFrameHandler 50 API calls 17095->17100 17151 1400196b4 17096->17151 17097->17095 17098 140019668 __CxxFrameHandler 45 API calls 17117 14001fa81 17098->17117 17101 14001fc26 17100->17101 17101->17071 17104 14001957c __GetUnwindTryBlock 51 API calls 17101->17104 17102 140019680 45 API calls __CxxFrameHandler 17102->17117 17103 14001f8cc __CxxFrameHandler 17106 14001e118 __CxxFrameHandler 50 API calls 17103->17106 17108 14001f8e3 17103->17108 17104->17071 17105 14001f917 17107 14001c6a8 _getptd 45 API calls 17105->17107 17106->17108 17109 14001f91c 17107->17109 17108->17105 17110 14001e118 __CxxFrameHandler 50 API calls 17108->17110 17109->17082 17111 14001c6a8 _getptd 45 API calls 17109->17111 17110->17105 17112 14001f92e 17111->17112 17113 14001c6a8 _getptd 45 API calls 17112->17113 17115 14001f93a 17113->17115 17154 14001eea0 17115->17154 17117->17085 17117->17098 17117->17102 17178 14001eb34 17117->17178 17192 14001f48c 17117->17192 17119 14001f9b3 17120 14001e0f4 __CxxFrameHandler 49 API calls 17119->17120 17121 14001f9b8 __CxxFrameHandler 17120->17121 17164 140023e28 17121->17164 17122 140019668 45 API calls __CxxFrameHandler 17123 14001f94c __CxxFrameHandler 17122->17123 17123->17082 17123->17119 17123->17121 17123->17122 17128 14001ea63 17127->17128 17129 14001ea6e 17127->17129 17130 14001e9b8 __CxxFrameHandler 50 API calls 17128->17130 17129->17028 17130->17129 17132 14001c6a8 _getptd 45 API calls 17131->17132 17133 1400196a6 17132->17133 17133->17040 17135 14001ea44 __GetUnwindTryBlock 50 API calls 17134->17135 17138 1400195b0 17135->17138 17136 140019633 17139 14001ea44 17136->17139 17137 1400195e5 RtlLookupFunctionEntry 17137->17138 17138->17136 17138->17137 17140 14001e9b8 17139->17140 17141 14001e9df 17140->17141 17142 14001e118 __CxxFrameHandler 50 API calls 17140->17142 17143 14001e9f1 17141->17143 17144 14001e118 __CxxFrameHandler 50 API calls 17141->17144 17142->17141 17143->17047 17144->17143 17146 14001957c __GetUnwindTryBlock 51 API calls 17145->17146 17147 14001eacf 17146->17147 17147->17064 17147->17065 17149 14001957c __GetUnwindTryBlock 51 API calls 17148->17149 17150 14001ea9a 17149->17150 17150->17067 17152 14001c6a8 _getptd 45 API calls 17151->17152 17153 1400196c2 17152->17153 17153->17103 17155 14001eec7 17154->17155 17160 14001eed1 17154->17160 17156 14001e118 __CxxFrameHandler 50 API calls 17155->17156 17158 14001eecc 17156->17158 17157 14001ef53 17157->17123 17159 14001e0f4 __CxxFrameHandler 49 API calls 17158->17159 17159->17160 17160->17157 17161 140019680 45 API calls __CxxFrameHandler 17160->17161 17162 140019668 __CxxFrameHandler 45 API calls 17160->17162 17163 14001eb34 __CxxFrameHandler 45 API calls 17160->17163 17161->17160 17162->17160 17163->17160 17165 14001f9e7 17164->17165 17166 140023e4f _FF_MSGBANNER 17164->17166 17170 140024004 17165->17170 17167 1400206ec malloc 45 API calls 17166->17167 17168 140023e60 17167->17168 17168->17165 17169 140022840 _FF_MSGBANNER 45 API calls 17168->17169 17169->17165 17172 14002402b __initmbctable 17170->17172 17171 140024072 RaiseException 17171->17082 17172->17171 17174 14001ea44 __GetUnwindTryBlock 50 API calls 17173->17174 17175 140019930 17174->17175 17176 14001e118 __CxxFrameHandler 50 API calls 17175->17176 17177 14001993b 17175->17177 17176->17177 17177->17117 17179 14001eb5f 17178->17179 17181 14001eb67 17178->17181 17180 140019668 __CxxFrameHandler 45 API calls 17179->17180 17180->17181 17182 140019668 __CxxFrameHandler 45 API calls 17181->17182 17184 14001eb86 17181->17184 17190 14001ebe3 __CxxFrameHandler 17181->17190 17182->17184 17183 14001eba2 17186 140019680 __CxxFrameHandler 45 API calls 17183->17186 17184->17183 17185 140019668 __CxxFrameHandler 45 API calls 17184->17185 17184->17190 17185->17183 17187 14001ebb6 17186->17187 17188 14001ebcf 17187->17188 17189 140019668 __CxxFrameHandler 45 API calls 17187->17189 17187->17190 17191 140019680 __CxxFrameHandler 45 API calls 17188->17191 17189->17188 17190->17117 17191->17190 17193 14001957c __GetUnwindTryBlock 51 API calls 17192->17193 17194 14001f4c9 17193->17194 17195 14001f4ef 17194->17195 17222 14001f3dc 17194->17222 17197 140019668 __CxxFrameHandler 45 API calls 17195->17197 17198 14001f4f4 __CxxFrameHandler 17197->17198 17198->17117 17200 14001f581 17199->17200 17201 14001f77c 17199->17201 17202 14001c6a8 _getptd 45 API calls 17200->17202 17201->17071 17203 14001f586 17202->17203 17204 14001f5e6 17203->17204 17205 14001c6a8 _getptd 45 API calls 17203->17205 17204->17201 17206 14001f5f9 17204->17206 17208 14001e118 __CxxFrameHandler 50 API calls 17204->17208 17207 14001f5a5 17205->17207 17209 1400198fc __CxxFrameHandler 50 API calls 17206->17209 17252 14001c534 EncodePointer 17207->17252 17208->17206 17213 14001f62e 17209->17213 17213->17201 17214 140019668 45 API calls __CxxFrameHandler 17213->17214 17215 14001f48c __CxxFrameHandler 51 API calls 17213->17215 17214->17213 17215->17213 17217 140023ec5 _FF_MSGBANNER 17216->17217 17221 14001fcfe 17216->17221 17218 1400206ec malloc 45 API calls 17217->17218 17217->17221 17219 140023edf 17218->17219 17220 140022840 _FF_MSGBANNER 45 API calls 17219->17220 17219->17221 17220->17221 17221->17016 17223 14001f3f8 17222->17223 17231 14001f1b4 17223->17231 17225 14001f409 17226 14001f449 17225->17226 17227 14001f40e 17225->17227 17228 140019680 __CxxFrameHandler 45 API calls 17226->17228 17230 14001f421 __AdjustPointer 17226->17230 17229 140019680 __CxxFrameHandler 45 API calls 17227->17229 17227->17230 17228->17230 17229->17230 17230->17195 17232 14001f1e4 17231->17232 17234 14001f1ec 17231->17234 17233 140019668 __CxxFrameHandler 45 API calls 17232->17233 17233->17234 17235 140019668 __CxxFrameHandler 45 API calls 17234->17235 17236 14001f209 17234->17236 17249 14001f269 __AdjustPointer __initmbctable 17234->17249 17235->17236 17237 14001f28d 17236->17237 17241 14001f247 __CxxFrameHandler 17236->17241 17236->17249 17238 14001f2f8 17237->17238 17243 14001f297 __CxxFrameHandler 17237->17243 17239 14001f302 17238->17239 17240 140019680 __CxxFrameHandler 45 API calls 17238->17240 17245 14001f316 __CxxFrameHandler 17239->17245 17248 14001f35b __CxxFrameHandler 17239->17248 17240->17239 17242 14001e118 __CxxFrameHandler 50 API calls 17241->17242 17241->17249 17242->17249 17244 14001e118 __CxxFrameHandler 50 API calls 17243->17244 17243->17249 17244->17249 17246 14001e118 __CxxFrameHandler 50 API calls 17245->17246 17245->17249 17246->17249 17247 14001e118 __CxxFrameHandler 50 API calls 17247->17249 17250 14001f382 __CxxFrameHandler 17248->17250 17251 140019680 __CxxFrameHandler 45 API calls 17248->17251 17249->17225 17250->17247 17250->17249 17251->17250 17271 140023f84 17274 140024b84 17271->17274 17275 14001a91c _lock 45 API calls 17274->17275 17278 140024b97 17275->17278 17280 14001a458 free 45 API calls 17278->17280 17281 140024be0 17278->17281 17282 140024bcb 17278->17282 17279 14001a458 free 45 API calls 17279->17281 17280->17282 17283 14001a81c LeaveCriticalSection 17281->17283 17282->17279 17299 140024d86 17300 140024da2 17299->17300 17301 140024d98 17299->17301 17303 14001a81c LeaveCriticalSection 17301->17303 14913 140018f98 14914 14001a91c _lock 45 API calls 14913->14914 14915 140018fc6 14914->14915 14916 140018fed DecodePointer 14915->14916 14922 1400190a9 _initterm 14915->14922 14918 14001900a DecodePointer 14916->14918 14916->14922 14917 1400190df 14920 14001910a 14917->14920 14931 14001a81c LeaveCriticalSection 14917->14931 14929 14001902e 14918->14929 14922->14917 14934 14001a81c LeaveCriticalSection 14922->14934 14923 1400190f8 14924 140018e0c malloc GetModuleHandleW GetProcAddress 14923->14924 14927 140019100 ExitProcess 14924->14927 14926 14001904d DecodePointer 14933 14001c534 EncodePointer 14926->14933 14929->14922 14929->14926 14930 140019062 DecodePointer DecodePointer 14929->14930 14932 14001c534 EncodePointer 14929->14932 14930->14929 17705 14001c6cc 17706 14001c6d5 17705->17706 17734 14001c7f6 17705->17734 17707 14001c6f0 17706->17707 17708 14001a458 free 45 API calls 17706->17708 17709 14001c6fe 17707->17709 17710 14001a458 free 45 API calls 17707->17710 17708->17707 17711 14001c70c 17709->17711 17712 14001a458 free 45 API calls 17709->17712 17710->17709 17713 14001c71a 17711->17713 17714 14001a458 free 45 API calls 17711->17714 17712->17711 17715 14001c728 17713->17715 17717 14001a458 free 45 API calls 17713->17717 17714->17713 17716 14001c736 17715->17716 17718 14001a458 free 45 API calls 17715->17718 17719 14001c747 17716->17719 17720 14001a458 free 45 API calls 17716->17720 17717->17715 17718->17716 17721 14001c75f 17719->17721 17722 14001a458 free 45 API calls 17719->17722 17720->17719 17723 14001a91c _lock 45 API calls 17721->17723 17722->17721 17725 14001c769 17723->17725 17728 14001a458 free 45 API calls 17725->17728 17729 14001c797 17725->17729 17728->17729 17737 14001a81c LeaveCriticalSection 17729->17737
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CloseDelete
    • String ID: AppAffinity$AppDirectory$AppEnvironment$AppEnvironmentExtra$AppKillProcessTree$AppNoConsole$AppParameters$AppPriority$AppRedirectHook$AppRestartDelay$AppRotateBytes$AppRotateBytesHigh$AppRotateDelay$AppRotateFiles$AppRotateOnline$AppRotateSeconds$AppStderr$AppStdin$AppStdout$AppStopMethodConsole$AppStopMethodSkip$AppStopMethodThreads$AppStopMethodWindow$AppThrottle$AppTimestampLog$Application$CopyAndTruncate$CreationDisposition$FlagsAndAttributes$ShareMode
    • API String ID: 453069226-2212462884
    • Opcode ID: d6f40d484542d60e602315e057a830b834a1cf69aa439974fe36276ad11cd41d
    • Instruction ID: 5f1e44c56ca19a9d09426f40c55942bea94d1b5e1f951be96c332341e708dae6
    • Opcode Fuzzy Hash: d6f40d484542d60e602315e057a830b834a1cf69aa439974fe36276ad11cd41d
    • Instruction Fuzzy Hash: 27524AB5214B4281FA66DB27B841BE93361B74D7D8F84512BBF0A076B5DF78CA48C720

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 267 14000a2e0-14000a2f7 call 140001d10 270 14000a2f9 call 140017cc0 267->270 271 14000a2fe-14000a30a call 14000a050 call 140007a90 267->271 270->271 277 14000a317-14000a387 call 140018170 PathQuoteSpacesW GetModuleFileNameW * 2 PathQuoteSpacesW 271->277 278 14000a30c-14000a316 call 140009b30 271->278 283 14000a38d-14000a398 call 140009bf0 277->283 284 14000a73f-14000a752 TlsAlloc 277->284 278->277 294 14000a39a-14000a3ce call 1400194c0 call 140009b30 283->294 295 14000a3cf-14000a3e1 call 140009b50 283->295 285 14000a754 call 14000b870 284->285 286 14000a759-14000a767 GetStdHandle 284->286 285->286 289 14000a7f2-14000a803 call 140009fb0 call 140009b30 286->289 290 14000a76d-14000a79f StartServiceCtrlDispatcherW 286->290 292 14000a7a1-14000a7ac GetLastError 290->292 293 14000a7ea-14000a7f1 call 140009b30 290->293 299 14000a7ae-14000a7bf call 140009fb0 call 140009b30 292->299 300 14000a7c0-14000a7e9 call 140002430 call 1400025f0 call 140009b30 292->300 293->289 294->295 312 14000a3e3-14000a3f8 call 1400129d0 call 140009b30 295->312 313 14000a3f9-14000a40b call 140009b50 295->313 299->300 300->293 312->313 326 14000a426-14000a438 call 140009b50 313->326 327 14000a40d-14000a425 call 1400129d0 call 140009b30 313->327 335 14000a43a-14000a44d call 1400129d0 326->335 336 14000a46d-14000a47f call 140009b50 326->336 327->326 344 14000a457-14000a46c call 1400129d0 call 140009b30 335->344 345 14000a44f-14000a456 call 140009b30 335->345 342 14000a481-14000a499 call 1400129d0 call 140009b30 336->342 343 14000a49a-14000a4ac call 140009b50 336->343 342->343 355 14000a4c7-14000a4d9 call 140009b50 343->355 356 14000a4ae-14000a4c6 call 1400129d0 call 140009b30 343->356 344->336 345->344 364 14000a4f4-14000a506 call 140009b50 355->364 365 14000a4db-14000a4f3 call 1400129d0 call 140009b30 355->365 356->355 373 14000a524-14000a536 call 140009b50 364->373 374 14000a508-14000a523 call 140012550 call 140009b30 364->374 365->364 380 14000a551-14000a563 call 140009b50 373->380 381 14000a538-14000a550 call 1400129d0 call 140009b30 373->381 374->373 389 14000a565-14000a56c 380->389 390 14000a59f-14000a5b1 call 140009b50 380->390 381->380 393 14000a586-14000a599 call 14000b870 call 140013b00 call 140009b30 389->393 394 14000a56e-14000a585 call 14000a180 call 140009b30 389->394 399 14000a5b7-14000a5c9 call 140009b50 390->399 400 14000a6cc-14000a6de call 140010470 390->400 416 14000a59e 393->416 394->393 399->400 413 14000a5cf-14000a5e1 call 140009b50 399->413 411 14000a705-14000a70a 400->411 412 14000a6e0-14000a6e7 400->412 414 14000a736-14000a73e call 140009b30 411->414 415 14000a70c 411->415 412->411 417 14000a6e9-14000a6eb 412->417 413->400 423 14000a5e7-14000a5f9 call 140009b50 413->423 414->284 420 14000a710-14000a734 415->420 416->390 417->411 422 14000a6ed-14000a704 call 14000a180 call 140009b30 417->422 420->414 420->420 422->411 423->400 431 14000a5ff-14000a611 call 140009b50 423->431 431->400 434 14000a617-14000a629 call 140009b50 431->434 434->400 437 14000a62f-14000a641 call 140009b50 434->437 440 14000a643-14000a656 call 140011a80 call 140009b30 437->440 441 14000a657-14000a669 call 140009b50 437->441 440->441 447 14000a66b-14000a67e call 140011db0 call 140009b30 441->447 448 14000a67f-14000a691 call 140009b50 441->448 447->448 448->284 455 14000a697-14000a69e 448->455 457 14000a6b8-14000a6cb call 140012090 call 140009b30 455->457 458 14000a6a0-14000a6b7 call 14000a180 call 140009b30 455->458 457->400 458->457
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ConsoleWindow$Process$FileHandleModuleNameOutputPathQuoteSpaces$AllocCtrlCurrentDispatcherErrorLastServiceStartStationThread_snwprintf_s
    • String ID: "C:\Program Files (x86)\IDmelon\Accesskey\nssm.exe"$%s %s %s %s$2.24-101-g897c7ad$2017-04-26$64-bit$NSSM$continue$dump$edit$get$install$list$pause$processes$remove$reset$restart$rotate$set$start$status$statuscode$stop$unset
    • API String ID: 3367203220-4093838077
    • Opcode ID: 0cc89f18b1057b5a72a2ee583f9768e88b6792957dfbdf81a853be53e10b8232
    • Instruction ID: 475713a89709ce93db3c9404fee735fe112960effc50d923b9116429dcfb75de
    • Opcode Fuzzy Hash: 0cc89f18b1057b5a72a2ee583f9768e88b6792957dfbdf81a853be53e10b8232
    • Instruction Fuzzy Hash: F1E16CB0600A4686FB16FB73F9657E923A1EB497D8F404426BB194B2F6EF78C945C340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 467 140012160-140012173 468 140012182-1400121c0 467->468 469 140012175-140012181 467->469 470 1400121c2-1400121c5 468->470 471 1400121d7 468->471 472 1400121c7-1400121cd 470->472 473 1400121cf-1400121d5 470->473 474 1400121dd-1400121ea 471->474 472->474 473->474 475 1400121ec-140012208 call 140018170 474->475 476 14001220d-14001222b 474->476 475->476 478 140012231-140012246 call 140001140 476->478 479 14001238d-140012390 476->479 486 140012367-140012379 call 140001780 478->486 487 14001224c-140012277 GetProcessHeap HeapAlloc 478->487 481 140012392-140012399 479->481 482 1400123a1-1400123b1 call 140001a60 479->482 481->482 488 1400123b3-1400123b6 482->488 489 1400123bb-1400123ca call 140001ad0 482->489 500 14001237b-140012382 486->500 501 14001235d-140012362 486->501 490 1400122a3-1400122ba call 140018230 487->490 491 140012279-14001229e call 140017f4c call 1400026b0 487->491 493 1400122bc-14001230e ChangeServiceConfigW 488->493 489->493 507 1400123d0-1400123d8 489->507 490->493 508 14001251b-140012548 491->508 503 140012314-14001231c 493->503 504 140012413-14001241b 493->504 500->482 510 140012384-14001238b 500->510 501->508 505 140012337-140012358 GetLastError call 140002430 call 140017f4c call 1400026b0 503->505 506 14001231e-140012331 GetProcessHeap HeapFree 503->506 511 140012436-14001243d 504->511 512 14001241d-140012430 GetProcessHeap HeapFree 504->512 505->501 506->505 516 1400123f3-14001240e call 140017f4c call 1400026b0 507->516 517 1400123da-1400123ed GetProcessHeap HeapFree 507->517 510->482 513 14001245e-14001246a 511->513 514 14001243f-140012458 call 14000f500 511->514 512->511 521 140012471-14001247c call 14000fce0 513->521 522 14001246c-14001246f 513->522 514->501 514->513 516->508 517->516 526 140012481-1400124b0 ChangeServiceConfig2W 521->526 522->521 522->526 530 1400124e2-1400124e5 526->530 531 1400124b2-1400124bb GetLastError 526->531 536 1400124e7-1400124ee call 14000d2d0 530->536 537 140012519 530->537 531->530 534 1400124bd-1400124dd call 140002430 call 1400025f0 531->534 534->530 540 1400124f3-1400124f5 536->540 537->508 542 140012511-140012514 call 140011130 540->542 543 1400124f7-14001250f call 140017f4c call 1400026b0 540->543 542->537 543->508
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocProcess_snwprintf_s
    • String ID: LocalSystem$canon$edit_service()
    • API String ID: 3659976305-2564672073
    • Opcode ID: c2f84ec46b8393c74ca8ca84993f5637c0292e65ffba0c481b9bd538b89089a5
    • Instruction ID: e3b5c0a1dd0221c7c68a33bde828070b828dc71daee6d23759004c629932d6ba
    • Opcode Fuzzy Hash: c2f84ec46b8393c74ca8ca84993f5637c0292e65ffba0c481b9bd538b89089a5
    • Instruction Fuzzy Hash: ACA17E72204B8192EB26DB22E4443DA73A1F788BD4F444126FB99477A5DF39C965C700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: FormatHeapMessage$AllocDefaultLangProcessUser_snwprintf_s
    • String ID: system error %lu
    • API String ID: 1301441402-1824642319
    • Opcode ID: aaa1bbfdd9c70fa5ff9d64c30cbb850859592f88a9e14e0967e5c3d2bea55925
    • Instruction ID: 8ac30a1a1620e7ed145e822f26d1194f441ec5727b48fbd65988fd17af8cf97c
    • Opcode Fuzzy Hash: aaa1bbfdd9c70fa5ff9d64c30cbb850859592f88a9e14e0967e5c3d2bea55925
    • Instruction Fuzzy Hash: 60118271614B8182E721DF62F814796B791FB8C7A9F004238AB9943BE4EF3CC5488B00

    Control-flow Graph

    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3fecfab8ebf54e75fb7e5ea40beadd711431b0205b0aaf5941a53d812bb5c10a
    • Instruction ID: 7bc4927bec7be680e73558176a6a3dd42dc0bfe2cbad2d4f784c91d458048ab8
    • Opcode Fuzzy Hash: 3fecfab8ebf54e75fb7e5ea40beadd711431b0205b0aaf5941a53d812bb5c10a
    • Instruction Fuzzy Hash: 02416D71204A8086E766EB22F4453DE73A4FB88BD0F544125FBAE87BA6EF3DC5558700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport_snwprintf_s
    • String ID: EventMessageFile$NSSM$SYSTEM\CurrentControlSet\Services\EventLog\Application\%s$TypesSupported$create_messages()$eventlog registry
    • API String ID: 3915943028-129066941
    • Opcode ID: 38f3f3b6c8bfc54d669350a2e0a1a664d129324a3bdfb289b21d3487b642f25c
    • Instruction ID: 65ade5d21c82d8a5f2cf4e8821feba2f506391910815b1a365cbf720ff84dd66
    • Opcode Fuzzy Hash: 38f3f3b6c8bfc54d669350a2e0a1a664d129324a3bdfb289b21d3487b642f25c
    • Instruction Fuzzy Hash: 0E416271204B8186E721CB62F4917DA73A5F78C7A4F404315F79947AA8DB3CC509CB00

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport_snwprintf_s
    • String ID: AppExit$NSSM_REG_EXIT$create_exit_action()
    • API String ID: 3915943028-2079778180
    • Opcode ID: 72daa3fbc5d415ad54047c881a5534a5db6ebd6bceb6f11fdf2c9258942a3b44
    • Instruction ID: ccaac05e6ae8247f9b9043b8869667f207f6f4575daf8edcbf1287825eb9e7ed
    • Opcode Fuzzy Hash: 72daa3fbc5d415ad54047c881a5534a5db6ebd6bceb6f11fdf2c9258942a3b44
    • Instruction Fuzzy Hash: E6415F71208B8186EB61CB62F8857DAB3A5F78C794F440226BB9D43BA9DF78C545CB00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: DecodePointer$_initterm$ExitProcess_lock
    • String ID:
    • API String ID: 2551688548-0
    • Opcode ID: ec79b0a8b6d411056a24b8aba7a4874d8e85f0765a7b56a25bc0f7be61cd2043
    • Instruction ID: c03ffe64fd4b435e30c5ae8a24083b9de1078ef0a929f37934195ca75bf9864d
    • Opcode Fuzzy Hash: ec79b0a8b6d411056a24b8aba7a4874d8e85f0765a7b56a25bc0f7be61cd2043
    • Instruction Fuzzy Hash: 6F416D31216A9085FA539B17F8443D96295F78C7C4F144429FB4D4B7BAEF3AC992C740

    Control-flow Graph

    APIs
      • Part of subcall function 0000000140010290: GetProcessHeap.KERNEL32(?,?,?,?,?,0000000140004171), ref: 0000000140010296
      • Part of subcall function 0000000140010290: RtlAllocateHeap.NTDLL(?,?,?,?,?,0000000140004171), ref: 00000001400102AA
    • _snwprintf_s.LIBCMT ref: 0000000140013B41
    • _snwprintf_s.LIBCMT ref: 0000000140013BC9
      • Part of subcall function 00000001400026B0: _vfwprintf_p.LIBCMT ref: 00000001400026E1
      • Part of subcall function 00000001400026B0: LocalFree.KERNELBASE(?,?,?,00000000,0000000140001065), ref: 00000001400026E9
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap_snwprintf_s$AllocateFreeLocalProcess_vfwprintf_p
    • String ID: pre_install_service()$service
    • API String ID: 1864752748-3337766052
    • Opcode ID: a4fe2850516496a6d6bef16b651254128269590410b47283ba75cfab8d25e80a
    • Instruction ID: 1f3a638b6378999b6819d25118dd32754412a06506d8dd69f99bcf8c10b9a7c2
    • Opcode Fuzzy Hash: a4fe2850516496a6d6bef16b651254128269590410b47283ba75cfab8d25e80a
    • Instruction Fuzzy Hash: 9051C272614A8582EA12EB26E4013DA6365F7487F4F455322BFBA5B7E6DF39C542C300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 711 140019ff0-14001a036 GetStartupInfoA call 14001a34c 714 14001a038-14001a03b 711->714 715 14001a040-14001a059 711->715 716 14001a2bb-14001a2dc 714->716 717 14001a05b-14001a096 715->717 718 14001a09e-14001a0a4 715->718 717->717 721 14001a098 717->721 719 14001a1f3-14001a1f6 718->719 720 14001a0aa-14001a0b2 718->720 723 14001a1f9-14001a20b 719->723 720->719 722 14001a0b8-14001a0d3 720->722 721->718 724 14001a166 722->724 725 14001a0d9 722->725 726 14001a219-14001a241 GetStdHandle 723->726 727 14001a20d-14001a211 723->727 730 14001a16d-14001a173 724->730 728 14001a0e0-14001a0f3 call 14001a34c 725->728 731 14001a243-14001a246 726->731 732 14001a28d-14001a291 726->732 727->726 729 14001a213-14001a217 727->729 745 14001a0f5-14001a112 728->745 746 14001a15e-14001a164 728->746 734 14001a298-14001a2a2 729->734 730->719 735 14001a175-14001a179 730->735 731->732 736 14001a248-14001a254 GetFileType 731->736 732->734 734->723 739 14001a2a8-14001a2b6 SetHandleCount 734->739 740 14001a1e6-14001a1f1 735->740 741 14001a17b-14001a17f 735->741 736->732 737 14001a256-14001a25f 736->737 743 14001a261-14001a265 737->743 744 14001a267-14001a26a 737->744 739->716 740->719 740->735 741->740 742 14001a181-14001a186 741->742 742->740 747 14001a188-14001a18d 742->747 748 14001a270-14001a281 call 14001e5e4 743->748 744->748 749 14001a26c 744->749 750 14001a114-14001a14d 745->750 751 14001a155-14001a15a 745->751 746->730 752 14001a19d-14001a1d5 call 14001e5e4 747->752 753 14001a18f-14001a19b GetFileType 747->753 760 14001a283-14001a286 748->760 761 14001a288-14001a28b 748->761 749->748 750->750 755 14001a14f 750->755 751->728 756 14001a15c 751->756 762 14001a1d7-14001a1dc 752->762 763 14001a1de-14001a1e1 752->763 753->740 753->752 755->751 756->730 760->734 761->716 762->740 763->716
    APIs
    • GetStartupInfoA.KERNEL32 ref: 000000014001A015
      • Part of subcall function 000000014001A34C: Sleep.KERNEL32(?,?,?,000000014001C657,?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63), ref: 000000014001A391
    • GetFileType.KERNEL32 ref: 000000014001A192
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: FileInfoSleepStartupType
    • String ID:
    • API String ID: 1527402494-0
    • Opcode ID: 5b4f25ddc331ad848b09e89fc693490d3fec4779a9e2ba7ae0bc686f3b222f91
    • Instruction ID: 7a3fca090f6ba9f5ab9e1a2497757437a20a6ef231ed88d5b265d648ccddedd5
    • Opcode Fuzzy Hash: 5b4f25ddc331ad848b09e89fc693490d3fec4779a9e2ba7ae0bc686f3b222f91
    • Instruction Fuzzy Hash: 3F916F31604A8085E7528B2AD84879937A5F30B7F4F658B25EB794B3F1DB7EC886C311

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CommandInitializeLine_cinit
    • String ID:
    • API String ID: 2063639010-0
    • Opcode ID: ecf82f526bca1e36555f0eff5cfb9770f1d094e6865a6b65b2518921b59a087b
    • Instruction ID: 49bd52d0a6cb84c4fc261c0c752a8ca64d3d73b004f0ff5055fbb52a34e6a74c
    • Opcode Fuzzy Hash: ecf82f526bca1e36555f0eff5cfb9770f1d094e6865a6b65b2518921b59a087b
    • Instruction Fuzzy Hash: 6B41113160474186F763ABA7A4913E932A1AB9D3C4F54043DBB458F2F7DB3AC941C711

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 826 140010290-1400102b6 GetProcessHeap RtlAllocateHeap 827 1400102b8-1400102db call 1400025f0 826->827 828 1400102de-1400102e3 826->828 827->828
    APIs
    • GetProcessHeap.KERNEL32(?,?,?,?,?,0000000140004171), ref: 0000000140010296
    • RtlAllocateHeap.NTDLL(?,?,?,?,?,0000000140004171), ref: 00000001400102AA
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$HeapSource$AllocateDeregisterProcessRegisterReport
    • String ID: alloc_nssm_service()$service
    • API String ID: 3449932736-2157636798
    • Opcode ID: 340dcb3ea64f2eaa611f07df5ba2ae7dbefa44cddf1a4083a5f2c707a3498489
    • Instruction ID: 68c9e48bc270ec39d5ec3dc1802da48655ef9d9f8276d5f31e599d5297850325
    • Opcode Fuzzy Hash: 340dcb3ea64f2eaa611f07df5ba2ae7dbefa44cddf1a4083a5f2c707a3498489
    • Instruction Fuzzy Hash: 5EE0D834611B9982FF029F62A4143DA6390A74D784F480029EE894B375EF3CC9498B00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ConsoleProcessWindow$CurrentFreeThread
    • String ID:
    • API String ID: 3525601419-0
    • Opcode ID: 29e15103fe5f831a4dd6db545d7f1efa3da3bd332465f4f0af65380b46d4571c
    • Instruction ID: 8be19064b400df3bdc88df37d5e9ee8f6c9001a69cbb9b9d9eb637b770bdfd16
    • Opcode Fuzzy Hash: 29e15103fe5f831a4dd6db545d7f1efa3da3bd332465f4f0af65380b46d4571c
    • Instruction Fuzzy Hash: 9CE0E675A11581D3EE56AF23B8453D923A0BB9CB81FC45019F7464B674EF3CD9498710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 837 14000b770-14000b796 838 14000b798-14000b7c6 RegCreateKeyExW 837->838 839 14000b7cd-14000b7ec RegOpenKeyExW 837->839 840 14000b827-14000b843 838->840 841 14000b7c8-14000b7cb 838->841 839->840 842 14000b7ee-14000b7f6 839->842 843 14000b7fd-14000b822 GetLastError call 140002430 call 1400025f0 841->843 842->843 844 14000b7f8-14000b7fb 842->844 843->840 844->840 844->843
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CreateErrorLastOpen
    • String ID:
    • API String ID: 2883820896-0
    • Opcode ID: 426f83eaa0c046e117805a459ac9e79b35227a8f246da0bf843b4684c48776b8
    • Instruction ID: 07820c114393a1c3651ebc684bf4408ed366b49354d521bc99e9e45516614059
    • Opcode Fuzzy Hash: 426f83eaa0c046e117805a459ac9e79b35227a8f246da0bf843b4684c48776b8
    • Instruction Fuzzy Hash: 6E21A176600B4186E761CF6BB89476A72A5F788BD4F584234EF88437B5CF38C811C704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 848 14000ee10-14000ee29 OpenSCManagerW 849 14000ee4a-14000ee4e 848->849 850 14000ee2b-14000ee31 848->850 851 14000ee33-14000ee43 call 1400025f0 850->851 852 14000ee48 850->852 851->852 852->849
    APIs
    • OpenSCManagerW.ADVAPI32(?,?,?,?,00000001400133C9), ref: 000000014000EE20
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterManagerOpenRegisterReport
    • String ID: ServicesActive
    • API String ID: 2921005559-3071072050
    • Opcode ID: f8b1cc4c245f662c5fbfc86ec2cd82fe25e88d529c2b183d9024c7d0f0ce16cb
    • Instruction ID: 7bf288e408de665aed5aeb23dc28e3206f15ed75b00312d32a24d07a7a484b57
    • Opcode Fuzzy Hash: f8b1cc4c245f662c5fbfc86ec2cd82fe25e88d529c2b183d9024c7d0f0ce16cb
    • Instruction Fuzzy Hash: 19E0C2F07116D041FBAB9733A8957E91191530E380F88142EB6091B2E1E53DC4895700
    APIs
    • GetEnvironmentStringsW.KERNEL32(?,?,00000001,0000000140019F3F), ref: 000000014002056C
    • FreeEnvironmentStringsW.KERNEL32(?,?,00000001,0000000140019F3F), ref: 00000001400205C3
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free
    • String ID:
    • API String ID: 3328510275-0
    • Opcode ID: 52b48ba027309c268b512042e826b0040b0b68e810d38ab844d28889a68a6781
    • Instruction ID: 27a3e792f96817a0e8cf10094a7cce5f9e20a5dc5851357d12ae0bf73b465cf9
    • Opcode Fuzzy Hash: 52b48ba027309c268b512042e826b0040b0b68e810d38ab844d28889a68a6781
    • Instruction Fuzzy Hash: 82018B32705B5085EE616F63A55539B67A0E74CFC0F4C8425FF49077A6EA3CC9C18740

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ErrorLastValue
    • String ID:
    • API String ID: 1151882462-0
    • Opcode ID: f126e78fb2dcacfabb8a301fae63ef6e246f4beabb4efec4ad6e6b4439e68fb8
    • Instruction ID: 83cb7a815068fcf4ab2de7cbf73c3f9a6832888872b2b956c7e89c07b6edc9bc
    • Opcode Fuzzy Hash: f126e78fb2dcacfabb8a301fae63ef6e246f4beabb4efec4ad6e6b4439e68fb8
    • Instruction Fuzzy Hash: 93012B7170468042E7118B3AF450B9BA260F789BF8F584324FFAA43BE5DA3CC9414700
    APIs
      • Part of subcall function 0000000140002530: GetUserDefaultLangID.KERNELBASE(?,?,?,?,?,?,00000000,00000001400026CE,?,?,?,00000000,0000000140001065), ref: 0000000140002538
      • Part of subcall function 0000000140002530: FormatMessageW.KERNELBASE ref: 0000000140002567
      • Part of subcall function 0000000140002530: FormatMessageW.KERNEL32 ref: 0000000140002599
      • Part of subcall function 0000000140002530: GetProcessHeap.KERNEL32 ref: 00000001400025A3
      • Part of subcall function 0000000140002530: HeapAlloc.KERNEL32 ref: 00000001400025B2
      • Part of subcall function 0000000140002530: _snwprintf_s.LIBCMT ref: 00000001400025D4
    • _vfwprintf_p.LIBCMT ref: 00000001400026E1
    • LocalFree.KERNELBASE(?,?,?,00000000,0000000140001065), ref: 00000001400026E9
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: FormatHeapMessage$AllocDefaultFreeLangLocalProcessUser_snwprintf_s_vfwprintf_p
    • String ID:
    • API String ID: 2711435474-0
    • Opcode ID: b9e2fb73056956266d8f65f75a8af008741aaaf4afbe52a6e07819eac5454351
    • Instruction ID: 6d7d810d7111ec690abced4b0f3e6a2a606c685bad1816cb6f56e965f88532a0
    • Opcode Fuzzy Hash: b9e2fb73056956266d8f65f75a8af008741aaaf4afbe52a6e07819eac5454351
    • Instruction Fuzzy Hash: FAE04F7260578042DD0ADB1779503A9A291AB8C7C1F484828BF8907755EF3CC6948740
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$CreateInformation
    • String ID:
    • API String ID: 1774340351-0
    • Opcode ID: edb88e91396a61cd8c355dff496fc69843bdaca4606bf3ee0219da364ff22c02
    • Instruction ID: 9ee7d56fb08d5f3afb1ad26f4d176171cdeb2e2a73566ed9e3bf0c6f6fa99c57
    • Opcode Fuzzy Hash: edb88e91396a61cd8c355dff496fc69843bdaca4606bf3ee0219da364ff22c02
    • Instruction Fuzzy Hash: 76E08675B22B9083F78ADB22E85979962A0F78C781F90502DFB49037A4DF3CC5558B00
    APIs
    • malloc.LIBCMT ref: 000000014001A2FF
      • Part of subcall function 00000001400206EC: _FF_MSGBANNER.LIBCMT ref: 000000014002071C
      • Part of subcall function 00000001400206EC: RtlAllocateHeap.NTDLL(?,?,00000000,000000014001A304,?,?,00000000,000000014001A895,?,?,00000000,000000014001A93F), ref: 0000000140020741
      • Part of subcall function 00000001400206EC: _errno.LIBCMT ref: 0000000140020765
      • Part of subcall function 00000001400206EC: _errno.LIBCMT ref: 0000000140020770
    • Sleep.KERNEL32(?,?,00000000,000000014001A895,?,?,00000000,000000014001A93F,?,?,?,?,?,?,00000000,000000014001C67C), ref: 000000014001A316
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno$AllocateHeapSleepmalloc
    • String ID:
    • API String ID: 4275769124-0
    • Opcode ID: d487568a586992d1fcb55698f8c4441f09e4e55957370627acfcf2ddf9cad006
    • Instruction ID: 4142fe8a63bf8884d36fe6fdc3d1457c7defd5a6f16963f854cf87769d59775e
    • Opcode Fuzzy Hash: d487568a586992d1fcb55698f8c4441f09e4e55957370627acfcf2ddf9cad006
    • Instruction Fuzzy Hash: 61F0F636205B8486EA469F17A8403AD72A1F79CBD0F140225FBA90B765CF3DCD928700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: EnvironmentVariable$_snwprintf_s$Event$HeapProcessSourceTime$AllocCriticalCurrentDeregisterEnterFileRegisterReportSectionSystem
    • String ID: "%s" %s$%lu$%s (%s/%s)$2.24-101-g897c7ad$2017-04-26$64-bit$NSSM_ACTION$NSSM_APPLICATION_PID$NSSM_APPLICATION_RUNTIME$NSSM_BUILD_DATE$NSSM_COMMAND_LINE$NSSM_CONFIGURATION$NSSM_DEADLINE$NSSM_EVENT$NSSM_EXE$NSSM_EXITCODE$NSSM_EXIT_COUNT$NSSM_HOOK_VERSION$NSSM_LAST_CONTROL$NSSM_PID$NSSM_RUNTIME$NSSM_SERVICE_DISPLAYNAME$NSSM_SERVICE_NAME$NSSM_START_COUNT$NSSM_START_REQUESTED_COUNT$NSSM_THROTTLE_COUNT$NSSM_TRIGGER$NSSM_VERSION$Pre$Start$h$hook$nssm_hook$nssm_hook()
    • API String ID: 1580475628-2341226502
    • Opcode ID: 294eb9d4a23a78c2de3f36ec37dab0aad2ddc9e726d8f4d6a7593e092b17f7c3
    • Instruction ID: 1c3f5b841a22e28915dda55d46f00e8888b02ddfce4e8b72b9f71ca216febfb4
    • Opcode Fuzzy Hash: 294eb9d4a23a78c2de3f36ec37dab0aad2ddc9e726d8f4d6a7593e092b17f7c3
    • Instruction Fuzzy Hash: 27323E71604A8691EB22DB22F8517DA7361F7887D4F80422AFB9D476B9DF3CCA49C710
    APIs
    • RegCloseKey.ADVAPI32(00000003,00000000,?,00000003,00000000,0000000140010A23), ref: 000000014000DE27
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Close
    • String ID: AppAffinity$AppDirectory$AppEnvironment$AppEnvironmentExtra$AppKillProcessTree$AppNoConsole$AppParameters$AppPriority$AppRedirectHook$AppRestartDelay$AppRotateBytes$AppRotateBytesHigh$AppRotateDelay$AppRotateFiles$AppRotateOnline$AppRotateSeconds$AppStopMethodConsole$AppStopMethodSkip$AppStopMethodThreads$AppStopMethodWindow$AppThrottle$AppTimestampLog$Application$NSSM
    • API String ID: 3535843008-3506916582
    • Opcode ID: a3178ec04ad4e68e416fe25619a2ffa94c5c1b4cf00600d989723d11c9e5fa88
    • Instruction ID: c7805839bb8358a959a768a10e243be2ff9b259aeb2623d0bf795c7c7b3a558e
    • Opcode Fuzzy Hash: a3178ec04ad4e68e416fe25619a2ffa94c5c1b4cf00600d989723d11c9e5fa88
    • Instruction Fuzzy Hash: D432B1F2208AC5C5EB22DF62B4417DA77A0F788BC8F84412AFB89576A9DB3CC545C711
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Free$Process$ErrorLastOpenService$ChangeCloseConfigHandleLocalManager_vfwprintf_p
    • String ID: %s: %s$%s: %s$%s\%s: %s$List$SYSTEM\CurrentControlSet\Control\ServiceGroupOrder$groups$set_service_dependencies()
    • API String ID: 717911963-3133791794
    • Opcode ID: 54557dc6fc8c01a7130147166d68acc7474a2c037710422b00090d6a8d766381
    • Instruction ID: d7ce32b5b10f061c7e7195f09d254de381534975a8cdc810ca296d842c87e0db
    • Opcode Fuzzy Hash: 54557dc6fc8c01a7130147166d68acc7474a2c037710422b00090d6a8d766381
    • Instruction Fuzzy Hash: B5E191B1601A4581EA22DB63B8147EA63A1FB8DBD4F448119FF5E43BB9EF38C945D700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: N$"%s" %s$%lu$E$Post$Pre$Start$command line$h$start_service
    • API String ID: 0-2674916716
    • Opcode ID: 61a6d97d03bd1b107dd6fa5df021d69fdc1368fe82631b5aaab015d8bca59c8c
    • Instruction ID: 023993fa0f7560711ba82d2caa2d9202a0fbac83a1b829d0283cea075c44361b
    • Opcode Fuzzy Hash: 61a6d97d03bd1b107dd6fa5df021d69fdc1368fe82631b5aaab015d8bca59c8c
    • Instruction Fuzzy Hash: 97E160B2504AD182E762DF22A4513DE73A0F788BD8F544226FB894B6AADF3CC545CB50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Message$Send$Item$EnvironmentFormatHeapTextVariable_snwprintf_s$AllocDefaultLangProcessUser
    • String ID: Change$NSSM_HOOK_%s_%s$Post$Pre$Resume
    • API String ID: 2959201675-3454526459
    • Opcode ID: 2f41eb6af505d12dd21b44215bfd44072d8710aa8027056f3b4481a60488a377
    • Instruction ID: 4d61490fa284bf38201bd411ba8695437f9e61230d5e4b6a083a814ca1fc796a
    • Opcode Fuzzy Hash: 2f41eb6af505d12dd21b44215bfd44072d8710aa8027056f3b4481a60488a377
    • Instruction Fuzzy Hash: 98717F71305A8192F766DB22F9247DA2361E78DBC8F501029FB4E07AB5DF39CD4A8701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID: U
    • API String ID: 921712934-4171548499
    • Opcode ID: 74c5f7fb8baae198cacb24aad5bbcbe68e136ebc3b0815143d4b2bb7719c7451
    • Instruction ID: 76fb5729cbaa013820f51bb000bfef4f3fcad7bac76d669b73782e902e55697a
    • Opcode Fuzzy Hash: 74c5f7fb8baae198cacb24aad5bbcbe68e136ebc3b0815143d4b2bb7719c7451
    • Instruction Fuzzy Hash: 3712023220478586EB228F66E4443EEB7A1F38CBC4F55411AFB8947AB6DB3DD945CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: File$ErrorHandleInformationLastTextUnicodeWrite
    • String ID: CopyFile()$MoveFile()
    • API String ID: 3620008457-2845297855
    • Opcode ID: d06a1913474329db8f6a3aa3d548f31daddee877e2bca60e31014723715ace4d
    • Instruction ID: 911a94780f45dd87590bef11f4ac37bd3019a58644ce44482c958d09773acbbb
    • Opcode Fuzzy Hash: d06a1913474329db8f6a3aa3d548f31daddee877e2bca60e31014723715ace4d
    • Instruction Fuzzy Hash: 95F159B2208A8196EB25DF22F5403DAB3A1F78DBD4F544119FB8943BA9DF38D954CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$ErrorLast$Process$FreeService$EnumNameServicesStatus$AllocDisplayOpen_snwprintf_s
    • String ID: ENUM_SERVICE_STATUS_PROCESS$canonical_name$open_service()
    • API String ID: 2015548786-1539203807
    • Opcode ID: 457023ee60d23c60c41332a15b72afbf33f55e71c4758a42e6d57e6a748a91cc
    • Instruction ID: 5ee9360cefee841a79e9959a14513cd3d11481ffbf4d78818340a009a2714b5b
    • Opcode Fuzzy Hash: 457023ee60d23c60c41332a15b72afbf33f55e71c4758a42e6d57e6a748a91cc
    • Instruction Fuzzy Hash: 79815D75205B8086EB52DB62F4443DAB7A1FB8DBD4F444129FB4A43BA9DF3CC9099B00
    APIs
    • LoadLibraryA.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023AC5
    • GetProcAddress.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023AE1
    • GetProcAddress.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B09
    • EncodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B12
    • GetProcAddress.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B28
    • EncodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B31
    • GetProcAddress.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B47
    • EncodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B50
    • GetProcAddress.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B6E
    • EncodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023B77
    • DecodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023BA9
    • DecodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023BB8
    • DecodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023C10
    • DecodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023C30
    • DecodePointer.KERNEL32(?,?,?,00000000,?,000000FC,00000000,000000014001DD80,?,?,?,?,?,000000014001DE14), ref: 0000000140023C49
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
    • API String ID: 3085332118-232180764
    • Opcode ID: 394c86fa8740025843811833a4a0878d79852cd341f95afa00973598f09dcfa6
    • Instruction ID: 963d9139185d25277fa7d6bff1b6dbe887c214cdc387d39ea297937161747b03
    • Opcode Fuzzy Hash: 394c86fa8740025843811833a4a0878d79852cd341f95afa00973598f09dcfa6
    • Instruction Fuzzy Hash: D4511630212B4080FE5BEB67B8557E962A5AB8DBC0F64043DBF4E077B5EE78D8818711
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ErrorHeapLast$EnumFreeProcessServicesStatus$AllocLocal_snwprintf_s_vfwprintf_p
    • String ID: %s$ENUM_SERVICE_STATUS_PROCESS$all$list_nssm_services()$nssm_service_t
    • API String ID: 1638472356-4196503671
    • Opcode ID: f4310e37fca4d66cae59513067b94a4934d94d266e052b314e4d01511460c31d
    • Instruction ID: 220fa191e2712f2fa40922eeb86950ca4a2caa5aec97ef5d5f917f65aa88fd44
    • Opcode Fuzzy Hash: f4310e37fca4d66cae59513067b94a4934d94d266e052b314e4d01511460c31d
    • Instruction Fuzzy Hash: 1E814A31204B8186EA26DB62F4403DA77A5FBCD7C4F44412AEB89477BAEF39C949C701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: File$Time$System$Handle$CloseErrorLast$CompareCopyCreateInformationMovePointerSleep
    • String ID: CopyFile()$CreateFile()$MoveFile()
    • API String ID: 3228394015-381917562
    • Opcode ID: 01af08144f5c24a7e0f72f2537b02be2019094e1b56a6c29d558042bc7711969
    • Instruction ID: 2c5f9a746a650ff16cd0eb76c04cc0088810d3ecae15e8d67c050bf747509107
    • Opcode Fuzzy Hash: 01af08144f5c24a7e0f72f2537b02be2019094e1b56a6c29d558042bc7711969
    • Instruction Fuzzy Hash: 94713D72204B8186E762DB62F8507DAB3A4F789BD4F541119FF8943AB9DF78C948CB00
    APIs
      • Part of subcall function 0000000140009FB0: GetConsoleWindow.KERNEL32 ref: 0000000140009FB8
      • Part of subcall function 0000000140009FB0: GetStdHandle.KERNEL32 ref: 0000000140009FC8
      • Part of subcall function 0000000140009FB0: GetProcessWindowStation.USER32 ref: 0000000140009FD3
      • Part of subcall function 0000000140002430: TlsGetValue.KERNEL32 ref: 0000000140002442
      • Part of subcall function 0000000140002430: LocalAlloc.KERNEL32(?,?,?,?,?,?,?,000000014000104C), ref: 0000000140002458
    • CloseServiceHandle.ADVAPI32 ref: 000000014001296C
      • Part of subcall function 0000000140002430: TlsSetValue.KERNEL32(?,?,?,?,?,?,?,000000014000104C), ref: 0000000140002481
      • Part of subcall function 0000000140002430: GetUserDefaultLangID.KERNEL32(?,?,?,?,?,?,?,000000014000104C), ref: 0000000140002487
      • Part of subcall function 0000000140002430: FormatMessageW.KERNEL32 ref: 00000001400024B1
      • Part of subcall function 0000000140002430: FormatMessageW.KERNEL32 ref: 00000001400024DE
      • Part of subcall function 0000000140002430: _snwprintf_s.LIBCMT ref: 00000001400024FF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: FormatHandleMessageValueWindow_errno$AllocCloseConsoleDefaultLangLocalProcessServiceStationUser_snwprintf_s
    • String ID: %s$%s: %s$%s: %s: %s$AppThrottle
    • API String ID: 3091485450-1444196156
    • Opcode ID: ad12e137b0566e539ec48c87203486ce3c3dfc246e838f177d5758311995c6fa
    • Instruction ID: 6cfbc6d17aabad81b5b106fe63f1999e49cdb119c4a97786fe8d2ec62f0a0950
    • Opcode Fuzzy Hash: ad12e137b0566e539ec48c87203486ce3c3dfc246e838f177d5758311995c6fa
    • Instruction Fuzzy Hash: 68B1A53160578582FA26AB63B5447EE67A1BB8CBC4F401029FF4A0B7B6EF3AC5158740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Service$ErrorEventLast$CreateCriticalHeapInitializeProcessRegisterSectionSource$AllocAllocateCloseCtrlCurrentDeregisterDisplayHandleHandlerLocalNameReportSleepStatusThreadTimerValueWaitable_snwprintf_s
    • String ID: NSSM$debug$service->name$service_main()
    • API String ID: 1666988295-3121758583
    • Opcode ID: 232ef101459a34ba4e97bc38d354e551541c59c984acad53f48cefa515037594
    • Instruction ID: 391d97ab9eb6af0e6816f0a333b294f2bc5ca0cf5282711f4ea3fa88c4337364
    • Opcode Fuzzy Hash: 232ef101459a34ba4e97bc38d354e551541c59c984acad53f48cefa515037594
    • Instruction Fuzzy Hash: 43A18F71A04B8086F752DF37A8017DA77A0FB4D7C8F48062AAB598B3B5DF398905CB50
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: String$free$ByteCharMultiWidemalloc$ErrorLast
    • String ID:
    • API String ID: 1837315383-0
    • Opcode ID: bcf4e56cdb41816d9ab4cf6d17006c74b5e0cdac7c2592137a90cf9d59c2fbdf
    • Instruction ID: d87029fe98a7cd502051614993c32973fbf8f1b99cdc22530c100499747c406a
    • Opcode Fuzzy Hash: bcf4e56cdb41816d9ab4cf6d17006c74b5e0cdac7c2592137a90cf9d59c2fbdf
    • Instruction Fuzzy Hash: 54F1B1326006808AEB628F66D8407DD77E1F79CBE8F544629FB5A57BE8DB38CD418700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess$AllocCommandExecuteLineLocalShell_snwprintf_s_vfwprintf_p
    • String ID: "$GetCommandLine()$elevate()$p$runas
    • API String ID: 568333785-2664397508
    • Opcode ID: 783b1db419e6da8296bc21220930b56356767060dd0a3c5355d5f8fa1b9bd47e
    • Instruction ID: 2077ac3bbf38e24c34af6bbde4a8a7d20c8c22cec92f61cf467793f99d6e06a8
    • Opcode Fuzzy Hash: 783b1db419e6da8296bc21220930b56356767060dd0a3c5355d5f8fa1b9bd47e
    • Instruction Fuzzy Hash: 96315C71615B9582E7129B22B8047EA33A1F7897E4F404229FB69437E9DF3DC905C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ThreadToken$AdjustCurrentOpenPrivileges$CloseErrorHandleImpersonateLastLookupPrivilegeSelfValue
    • String ID: SeDebugPrivilege
    • API String ID: 2095247420-2896544425
    • Opcode ID: 3e7152db20e3f8e3e4ac19a98164bd4134ace9dbb4197a0a704cf1b4ed9552ec
    • Instruction ID: 1f60dc984ff7cd1ee9279a057587273100a33775c52be9d20afd9c1c22f79b8e
    • Opcode Fuzzy Hash: 3e7152db20e3f8e3e4ac19a98164bd4134ace9dbb4197a0a704cf1b4ed9552ec
    • Instruction Fuzzy Hash: 42310672608B8482EB51DF26F44478AB7A0F789B94F400219F78A43AB8DF3CD549CB40
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$ErrorLastSource$AllocCloseCreateDeregisterHandleLocalRegisterReportSnapshotToolhelp32Value
    • String ID:
    • API String ID: 3638057332-0
    • Opcode ID: 736b111b100a646399828fc1beca10fc05defdbe9cab0c2b345cb83a7c5a2b91
    • Instruction ID: d4a25d63226701a5820217a3ec4a756d52cdc905e9f9b02ee8c88e4c8cc5a9cb
    • Opcode Fuzzy Hash: 736b111b100a646399828fc1beca10fc05defdbe9cab0c2b345cb83a7c5a2b91
    • Instruction Fuzzy Hash: 7F417E7261468086E781DB36F54079A77A1E78DBD4F400229FB9A97BA9EF3CC841CB40
    APIs
    • GetModuleFileNameA.KERNEL32(?,?,?,?,?,000000014001DE14,?,?,?,?,0000000140020721,?,?,00000000,000000014001A304), ref: 000000014001DC7B
    • GetStdHandle.KERNEL32(?,?,?,?,?,000000014001DE14,?,?,?,?,0000000140020721,?,?,00000000,000000014001A304), ref: 000000014001DD87
    • WriteFile.KERNEL32 ref: 000000014001DDC1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: File$HandleModuleNameWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 3784150691-4022980321
    • Opcode ID: 76b32cf82c17dd4405aab22500cf80e41e04892a9192f50629b7580b2b5dfafe
    • Instruction ID: 4619fa3bf99482af2e3b2e7abf25445da3b72f923f0fd6b82687fc6d9c2ecd06
    • Opcode Fuzzy Hash: 76b32cf82c17dd4405aab22500cf80e41e04892a9192f50629b7580b2b5dfafe
    • Instruction Fuzzy Hash: C351FD31310A8242FB26DBA7E9557EA3252B79C7C8F54462ABF494BAF6CF3DC544C200
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
    • String ID:
    • API String ID: 3778485334-0
    • Opcode ID: 2c73cabdacd67ecc1ab47cb5ea7a511d34c178d29615d86a7b68e056a520e744
    • Instruction ID: 68ad1d73d9e93cc6001284d5fa1a39834dd5386839cfa0cf077785c591060cfe
    • Opcode Fuzzy Hash: 2c73cabdacd67ecc1ab47cb5ea7a511d34c178d29615d86a7b68e056a520e744
    • Instruction Fuzzy Hash: B231F231105F808AEB629B62F8543DA73A1F78C3D4F60452AEB8E43B75DF38C4948B00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 3895584640-0
    • Opcode ID: de36e9be98680906f13d6fdec89071b2ed5335f68037e9720c0431ee17c4b1d6
    • Instruction ID: c1f587e2613b7e2320280e204ff58a8efa348b9f757dde8eac3d56b3eb560925
    • Opcode Fuzzy Hash: de36e9be98680906f13d6fdec89071b2ed5335f68037e9720c0431ee17c4b1d6
    • Instruction Fuzzy Hash: D35186726047C04AF7729F66E0503EEB790E3897D0F588119F79947AE5DE78CC818B16
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 1269745586-0
    • Opcode ID: db0e8556fbde31411f20dd6a3de043652d6dc213d7a28bc9c9def38311efb816
    • Instruction ID: dbf51be08b14eccf182f8a2a6019e3681ceeefd0d48998f919ae06a8e142e91c
    • Opcode Fuzzy Hash: db0e8556fbde31411f20dd6a3de043652d6dc213d7a28bc9c9def38311efb816
    • Instruction Fuzzy Hash: 0A314972208B8182EB259B66F4443DAB3A4F79C784F500129ABCD43AA9EF7CC548CF00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Resource$Find$CreateDefaultDialogErrorIndirectLangLastLoadParamUser
    • String ID:
    • API String ID: 940021595-0
    • Opcode ID: fed401cc8e8f5612569b6891206cde108573bd67a878dd979692201b7d3e6802
    • Instruction ID: 9944d1bd91ac6ef74c3327299d60d6f918d01a8079eaa409e9ba49cf5d91b016
    • Opcode Fuzzy Hash: fed401cc8e8f5612569b6891206cde108573bd67a878dd979692201b7d3e6802
    • Instruction Fuzzy Hash: F601887570578082EB165B63B80479AA360BB4CFC0F18843DAF89437B4DF3CD8418750
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno$DecodePointer
    • String ID:
    • API String ID: 2310398763-0
    • Opcode ID: 9931ccc4ea3a3858abefdf71ca0561b1e710505d0c46915268689c3ffa0de49b
    • Instruction ID: 44ef4eb01c81118c6643f99bc6a2e946d05f9bc6aed31f978ef6c775e81dc10f
    • Opcode Fuzzy Hash: 9931ccc4ea3a3858abefdf71ca0561b1e710505d0c46915268689c3ffa0de49b
    • Instruction Fuzzy Hash: 1631E332B1065442F3279B3BA5827EE6552A78C794F588219FB250FBFACF3AC441C700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: AllocateCheckFreeInitializeMembershipToken
    • String ID:
    • API String ID: 3429775523-0
    • Opcode ID: 3be228cc09c29312831331bff11f0d4ef4207261988248bd0618be56e79fc0d1
    • Instruction ID: 48eee273634d74207520e7cdaf30b75688e279164638d9c4aace6fd17198c53c
    • Opcode Fuzzy Hash: 3be228cc09c29312831331bff11f0d4ef4207261988248bd0618be56e79fc0d1
    • Instruction Fuzzy Hash: 1211F872618B808AE752CB26F45434BBBE0F399784F54005AE7C987B69DB3DD109CF40
    APIs
    • RtlCaptureContext.KERNEL32 ref: 0000000140023D5F
    • SetUnhandledExceptionFilter.KERNEL32 ref: 0000000140023DA5
    • UnhandledExceptionFilter.KERNEL32 ref: 0000000140023DB0
      • Part of subcall function 000000014001DBB8: GetModuleFileNameA.KERNEL32(?,?,?,?,?,000000014001DE14,?,?,?,?,0000000140020721,?,?,00000000,000000014001A304), ref: 000000014001DC7B
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextFileModuleName
    • String ID:
    • API String ID: 2731829486-0
    • Opcode ID: 1772c0e6350e5a06dade1ac13ce35099e640e8ea5e04fc13367c51db8d1894a0
    • Instruction ID: 46ba363e4b0eae91f713770cd299bb224122c89c83ee0360e1bb8fbde21d07a9
    • Opcode Fuzzy Hash: 1772c0e6350e5a06dade1ac13ce35099e640e8ea5e04fc13367c51db8d1894a0
    • Instruction Fuzzy Hash: DD014C35214A8481F6669762F4543DA73A1FB8D385F440129BB8E0BAFADF3DC905CB11
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 06faa0f0bb2dc971177e39b3f6ed31a2957b8d98190a0f00278e0934fa454d68
    • Instruction ID: b5e575d4c44cd20b866f75d5ef2225df689e7b31d630515f6afed79aa59475fa
    • Opcode Fuzzy Hash: 06faa0f0bb2dc971177e39b3f6ed31a2957b8d98190a0f00278e0934fa454d68
    • Instruction Fuzzy Hash: 36E06D31618A8085FB32D722E4513CA2750A79D798F800216FB8D476F5DE3CC6098B00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 114d92dcbf7d2c8af530ca3185321c199e066624115f7fe8c2d49beb1dc33ef1
    • Instruction ID: a7c7f3dcdb102532dc9973edfc0c04c9e05a3ec38676fa0d26270a69678edde2
    • Opcode Fuzzy Hash: 114d92dcbf7d2c8af530ca3185321c199e066624115f7fe8c2d49beb1dc33ef1
    • Instruction Fuzzy Hash: E7B01230B12840C1D705AB33EC863C012A07F5C340FD00858D20DC2131EA3C89EBC700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Free$HeapMemory$Process$Authority$AllocClose$ComputerErrorIdentifierInitializeLastLocalName_vfwprintf_p
    • String ID: %s\%s$LSA_UNICODE_STRING$NT Service\$SID$expanded$username_sid$username_sid()
    • API String ID: 69952446-4149950637
    • Opcode ID: 92efc2b86d5c6147075e5e9320d55aa18b01e5cf5b5004848248b986e7ef1e03
    • Instruction ID: 50195b4bb22f38393f53dc6e2ddd160500ea8e110de682d4c5e502559bc3d69a
    • Opcode Fuzzy Hash: 92efc2b86d5c6147075e5e9320d55aa18b01e5cf5b5004848248b986e7ef1e03
    • Instruction Fuzzy Hash: 53E14E75204A8082EA12EB63E4507DA67A1FBCDBD4F444125FB4E477BADF39C946C700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 0b0a0ae3fdfc1ed0fa13838e4ad93de12d14e6b930d1803b0b0efe21a5381680
    • Instruction ID: 8d2492f42c3375f3df4473a04d93de8bff90f0277a39e01c48f8c640fe808fed
    • Opcode Fuzzy Hash: 0b0a0ae3fdfc1ed0fa13838e4ad93de12d14e6b930d1803b0b0efe21a5381680
    • Instruction Fuzzy Hash: 59417432A1158883FA57BB77C8563EC1320ABCAB84F444231BB5D6F6B7CEB5C8459360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CloseErrorHandleLast$Event_snwprintf_s$NextProcessProcess32Source$AllocCodeCreateDeregisterExitLocalOpenRegisterReportSnapshotToolhelp32Value
    • String ID: %lu$AppStopMethodSkip$NSSM
    • API String ID: 3491791553-153837258
    • Opcode ID: 0c7385911431ca271a527a88f3baef0bf870f7267b49319b7ae97b48872975ef
    • Instruction ID: 228514648ff0bd046f16d9da10956bf1708be2c3e3f6d233c5a9c556325b648d
    • Opcode Fuzzy Hash: 0c7385911431ca271a527a88f3baef0bf870f7267b49319b7ae97b48872975ef
    • Instruction Fuzzy Hash: 33B149B1204B8486EB25DB62E4543DA73A0F78DBD8F800215FB99477AADF3DCA058B41
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: dependencies$native_set_dependongroup
    • API String ID: 0-409972118
    • Opcode ID: 739a02f57c687493ff17d25acbd0d647586937320d629fc731b6e7eb5aacb352
    • Instruction ID: 03521c866b4c7cfe6bf2b1022ff6480705ab1916cd7ea62ef3b9d3751cacd87a
    • Opcode Fuzzy Hash: 739a02f57c687493ff17d25acbd0d647586937320d629fc731b6e7eb5aacb352
    • Instruction Fuzzy Hash: 62716C71604B8082EA269B77B8143DA67A1FB8DBD4F044129FB99477B9DF3DC944CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$Free$Alloc
    • String ID: dependencies$native_set_dependonservice
    • API String ID: 3689955550-2849880886
    • Opcode ID: e09cbeb6ba163b7733074487d8c5ea57c5f9c57d39f7d7db8b5e54c9bc97f286
    • Instruction ID: 4c18f0a9f8906bac8d29316d0d99a19f8ca38918d160cccc75a1141df60495ad
    • Opcode Fuzzy Hash: e09cbeb6ba163b7733074487d8c5ea57c5f9c57d39f7d7db8b5e54c9bc97f286
    • Instruction Fuzzy Hash: 53714B71604B8082EA269B77A8143DA67A1FB8DBD4F444129FB89477B9DF3DC845CB40
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess$CloseHandle$CriticalDeleteSection$ServiceUnregisterWait
    • String ID:
    • API String ID: 721818521-0
    • Opcode ID: 8b1967781c819801c2282c7234f9428b6f988098830cbf00d7948db7f41d6083
    • Instruction ID: e9855117271ec644d348db211c8dcb89f8f0867333612b95edce9907f1671582
    • Opcode Fuzzy Hash: 8b1967781c819801c2282c7234f9428b6f988098830cbf00d7948db7f41d6083
    • Instruction Fuzzy Hash: 2D413D74601E90C2EB56DBB395183E963A1BF8DFD5F084138AF4A57778DE3889448710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$EventProcess$AllocSource$CloseDeregisterFreeHandleRegisterReport
    • String ID: await_hook_threads$await_hook_threads()$data$retain
    • API String ID: 2142993808-1900669911
    • Opcode ID: d01ba2fbf3bcc440b567fc7c1a7f886c0b57a6a8111ab25369b635bf27e9f7c9
    • Instruction ID: 780427434044c61dd547f03e7bf771bfcca09c03c361e120a64a7bde647cd176
    • Opcode Fuzzy Hash: d01ba2fbf3bcc440b567fc7c1a7f886c0b57a6a8111ab25369b635bf27e9f7c9
    • Instruction Fuzzy Hash: 2A6178B6601A8086EA16DF23F8503EA73A5F78CBC4F548129EF8E53764DF39C9128700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: canon$lsa_canon$username_sid
    • API String ID: 0-3165952623
    • Opcode ID: 61a4d28acd9b3c91b8a6b98856a030ccb66226a499a1cfe347736c4baa40fbbe
    • Instruction ID: 2a8286567617ec90dd27cdb103d0c73c0caae6ca0e22823ef32155b10df1f8e5
    • Opcode Fuzzy Hash: 61a4d28acd9b3c91b8a6b98856a030ccb66226a499a1cfe347736c4baa40fbbe
    • Instruction Fuzzy Hash: 51516176610A8582EA02EF66E4117DA6364FBC8BD4F444026FF4D47BAAEE39C586C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process_snwprintf_s$AllocFreeMessage$Format$DefaultFileLangLocalNameOpenSendUser
    • String ID: :%s:
    • API String ID: 293816848-1112191061
    • Opcode ID: 724d6725c9227211ad7173d27c787d1fbc941b97eaedc79ecfb1e8cb120bc382
    • Instruction ID: f4c02c16514924a05df0f0130103984169df6d8ae751033e802da1f55740790b
    • Opcode Fuzzy Hash: 724d6725c9227211ad7173d27c787d1fbc941b97eaedc79ecfb1e8cb120bc382
    • Instruction Fuzzy Hash: 85616B71604A8082E761DB66F8043DA62A1FB8D7F4F504329BBBA47BE9DF3CC5458B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$BaseEntryExceptionFunctionImageLookupRaiseThrow
    • String ID: bad exception$csm$csm$csm
    • API String ID: 2351602029-820278400
    • Opcode ID: 94f2d7a7ac3fbf0c7e408cc05698066adc522e88fcd38db2d59bce62785e5561
    • Instruction ID: 4ff304013d71e1c421c352ba0f3210a58c520cabd4eb8e9e99b64509a02ee7b9
    • Opcode Fuzzy Hash: 94f2d7a7ac3fbf0c7e408cc05698066adc522e88fcd38db2d59bce62785e5561
    • Instruction Fuzzy Hash: 95E1A27220478086EA72AB27A1403ED77A0F74CBC4F444525FF890BBAACF39D591D741
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140011585), ref: 00000001400136EC
    • GetExitCodeProcess.KERNEL32 ref: 000000014001370B
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140011585), ref: 0000000140013740
    • _snwprintf_s.LIBCMT ref: 0000000140013779
    • EnterCriticalSection.KERNEL32 ref: 0000000140013947
    • LeaveCriticalSection.KERNEL32 ref: 000000014001396B
      • Part of subcall function 000000014000AA80: GetProcessTimes.KERNEL32 ref: 000000014000AAA2
      • Part of subcall function 000000014000AA80: GetLastError.KERNEL32 ref: 000000014000AAAC
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
      • Part of subcall function 0000000140011450: UnregisterWait.KERNEL32 ref: 000000014001148E
      • Part of subcall function 0000000140011450: SetServiceStatus.ADVAPI32 ref: 0000000140011526
      • Part of subcall function 0000000140011450: EnterCriticalSection.KERNEL32 ref: 00000001400115A5
      • Part of subcall function 0000000140011450: LeaveCriticalSection.KERNEL32 ref: 00000001400115CE
      • Part of subcall function 0000000140011450: SetServiceStatus.ADVAPI32 ref: 0000000140011610
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CriticalSection$Event$EnterLeaveProcessServiceSourceStatusTime$CloseCodeDeregisterErrorExitFileHandleLastRegisterReportSystemTimesUnregisterWait_snwprintf_s
    • String ID: %lu$Exit$Post$`
    • API String ID: 3610551520-1249451036
    • Opcode ID: 642cab63ffa1f930bf2db4ea8372a97cdcc443e84d7dfb65cdf66ffba4770686
    • Instruction ID: 9c6898da4b82adcd527d375305501d490671b7e5d756c49b4bab06ebdae18802
    • Opcode Fuzzy Hash: 642cab63ffa1f930bf2db4ea8372a97cdcc443e84d7dfb65cdf66ffba4770686
    • Instruction Fuzzy Hash: FFB17C76604BC582E722DF22E4513DB73A4F789B88F540126FF890B6A9DF39C949CB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Process$AffinityCurrentMask
    • String ID: All
    • API String ID: 1231390398-55916349
    • Opcode ID: eff96e4369339bbba2c319400aa00bee1043dd448a0f535bee212858d1ac3183
    • Instruction ID: 89333b989c272c6900fa0fe1462a190d1688c94fb8f165d787664ba4dc7caf2a
    • Opcode Fuzzy Hash: eff96e4369339bbba2c319400aa00bee1043dd448a0f535bee212858d1ac3183
    • Instruction Fuzzy Hash: 1B716172204B80C1EA62EB63E4403DA63A5FB8DBD4F444125FF9E8B7A9EF38C5458700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: SeServiceLogonRight
    • API String ID: 0-347471591
    • Opcode ID: 1ca323ff7544cbea062a316e85ed950d70d80caaa4b078221830f27f3448ad9d
    • Instruction ID: a0f944345680951f5638d9c7f8e84b06276241971c720b1fbeca9eec54f8535e
    • Opcode Fuzzy Hash: 1ca323ff7544cbea062a316e85ed950d70d80caaa4b078221830f27f3448ad9d
    • Instruction Fuzzy Hash: 8051307260464082E612EB26B4517DB66A1F7C97D0F550125FF5E87BB6DE38C942C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcessTime$CloseFileHandleObjectSingleSystemWait
    • String ID: hook
    • API String ID: 2152274456-2757247829
    • Opcode ID: 09c5df5f2420748436591441a970fd3aa0a79a693a197f012b347bfb45edf898
    • Instruction ID: d1e46cd8051026dbb071bf6fa3c4f2d243ea7f00bf048e6cb1231a60534f5b15
    • Opcode Fuzzy Hash: 09c5df5f2420748436591441a970fd3aa0a79a693a197f012b347bfb45edf898
    • Instruction Fuzzy Hash: 3C4134B6601B8486EB16CF66E84435967A1FB88FD8F144119EF4A53768DF38C896CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Event$ProcessSource$AllocDeregisterFreeQueryRegisterReportValue
    • String ID: get_string()
    • API String ID: 4130051898-896229945
    • Opcode ID: f432ba425df1c334af0d5d8bc6cf21bbf44c8f1dc0a7f0ab12c867f88ba37124
    • Instruction ID: e01773196815c225b165d9e20bffeedce6d82feaaa2e36e89eb2a6d238022399
    • Opcode Fuzzy Hash: f432ba425df1c334af0d5d8bc6cf21bbf44c8f1dc0a7f0ab12c867f88ba37124
    • Instruction Fuzzy Hash: 9F416AB1204A8186F722DB63B8543EA6691F78DBC4F444028FF8943BBADF3CC5458B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CreateErrorFileLast
    • String ID: AppStderr$AppStdout$stderr$stderr_si$stdout$stdout_si
    • API String ID: 1214770103-3145564883
    • Opcode ID: 8bc41217d2cab0aac7e5492a8b28b5557a478992bb3363fedfbb000bcd89686d
    • Instruction ID: 84f8d01f0d4a39fbc827c3b2a16233fbc00f92dc2afb04cd47d387f1aa36e1d9
    • Opcode Fuzzy Hash: 8bc41217d2cab0aac7e5492a8b28b5557a478992bb3363fedfbb000bcd89686d
    • Instruction Fuzzy Hash: 06E11AB26046C1CAD761CF35E4417DA77A4F348B98F48463AEF8C4B6A9DB38C945CB20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID: AppEnvironment
    • API String ID: 3859560861-948859433
    • Opcode ID: bf727592a83bd657103b9efa741edc9865e88ac5b80f902545c4b4d6b6b03db5
    • Instruction ID: 1f537f8a4e15fb6a063128440b77b0ff2ca1e7455b8185a5c21f445aa25c8dd6
    • Opcode Fuzzy Hash: bf727592a83bd657103b9efa741edc9865e88ac5b80f902545c4b4d6b6b03db5
    • Instruction Fuzzy Hash: 4871A676604A80C2EA62EB63B4443DA67A0FB8DBD5F544215FF998B6F8DF39C845C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap_snwprintf_s$Process$AllocFreeObjectServiceSingleStatusWait
    • String ID: %lu$%s()
    • API String ID: 3601813699-699940799
    • Opcode ID: 0ffba0166ba33d02090c299909e839c505018103f0bb2f8e7f4f694d868e91e3
    • Instruction ID: 69971400c90e31b65b72574bdd09145e1363e6fa122ccb17f487d7069af77f90
    • Opcode Fuzzy Hash: 0ffba0166ba33d02090c299909e839c505018103f0bb2f8e7f4f694d868e91e3
    • Instruction Fuzzy Hash: 17514B76204B8186E6618B62A4503DA73A5F7887E4F50031AEFBD477E9DF39C509C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: QueryValue
    • String ID: All$affinity$setting_get_affinity
    • API String ID: 3660427363-3501811323
    • Opcode ID: 36e189c61de046a56e77c0e4f0c4d51a8d75b56e4cf18c7dacff24821600d77c
    • Instruction ID: d992f5cfb115b4e69d8ec94212e49f6658679346330c533de7153ebc08c68e82
    • Opcode Fuzzy Hash: 36e189c61de046a56e77c0e4f0c4d51a8d75b56e4cf18c7dacff24821600d77c
    • Instruction Fuzzy Hash: 7B516171608A8082EB22DB66F4503DAA7A1F78DBD4F544125FB8947BB9DF3DC4858B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
    • String ID: SERVICE_CONFIG_DESCRIPTION$get_service_description()
    • API String ID: 2527037045-119971955
    • Opcode ID: 87cfc007ee1f7d47041ce5e3710580b357c85b779c488430ea12dfe6e7cffaa3
    • Instruction ID: ce23d3445b3d502cfd1cee6f423eb33bdad80a8a01337122df70ec9d9f023edb
    • Opcode Fuzzy Hash: 87cfc007ee1f7d47041ce5e3710580b357c85b779c488430ea12dfe6e7cffaa3
    • Instruction Fuzzy Hash: 08418E75600B8182EA22EBA3F8007EA67A1BB8DBD4F444129BF4947BB6DF3CC545D700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Message$FormatHeap$AllocDefaultFreeLangLocalProcessUser_snwprintf_s_wcsftime_l
    • String ID: NSSM$P$The message which was supposed to go here is missing!$The message which was supposed to go here is too big!$e
    • API String ID: 2747969056-1535976118
    • Opcode ID: 58946c53e902570074538918f1f58bb95ea40b455ed7411fed5f342a362d9c8f
    • Instruction ID: e0aea5a5f9581d4066fd1c3e1683cd6cd46946633892eee8657d269f664f3205
    • Opcode Fuzzy Hash: 58946c53e902570074538918f1f58bb95ea40b455ed7411fed5f342a362d9c8f
    • Instruction Fuzzy Hash: 63316E75215B8186EB629B62F8947DA7364FB8C7D4F804129FB8943BA5DF3CC949CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterRegisterReport_snwprintf_s
    • String ID: %s%s$CopyAndTruncate$CreationDisposition$FlagsAndAttributes$ShareMode$get_createfile_parameters()
    • API String ID: 3081108292-1260861110
    • Opcode ID: c099c9cb19559e2fdbbafae6862631fb2bc145655e25f918de2c2d4a7a0ce256
    • Instruction ID: e75d1d6abf4a235fca88e6547070dcd46e2f06ec00b428c63354f5bbf43e8fee
    • Opcode Fuzzy Hash: c099c9cb19559e2fdbbafae6862631fb2bc145655e25f918de2c2d4a7a0ce256
    • Instruction Fuzzy Hash: B2817BB1204A8586E762DB22F850BDA7754F74C7E8F844316FFA9876E5EB38C646C700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Window$ConsoleHandleProcessStation
    • String ID: %s: %lu: %s$%s: %s
    • API String ID: 2390998093-150483647
    • Opcode ID: dd4fb859678dd9658312077e5fb5972b1ddeae43dbb5eb2bda94efda359b6f6e
    • Instruction ID: 935a7045af60d552a4a1b6eb069eef078a932ada1a95a9807a014f2b4c9f0a51
    • Opcode Fuzzy Hash: dd4fb859678dd9658312077e5fb5972b1ddeae43dbb5eb2bda94efda359b6f6e
    • Instruction Fuzzy Hash: BF618F31204B8582EA26EB52F4443DA73A4FB8DBC4F404225FB990BBA6EF39C556C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$CreateErrorLastProcess$AllocFreeHandleInformationPipeThread
    • String ID: create_logging_thread()$logger
    • API String ID: 3682172063-2332508298
    • Opcode ID: 6ce080337fbdde164dd771dbbd35574d1c3cc7e9e503ab1a96137a68f46eed7a
    • Instruction ID: 0f708c83b6d6882e8b311f25b1277f2bd71e346d58eaf93934f5f47650e512b5
    • Opcode Fuzzy Hash: 6ce080337fbdde164dd771dbbd35574d1c3cc7e9e503ab1a96137a68f46eed7a
    • Instruction Fuzzy Hash: 9E514B76205B9086E7A1CB63B95079A77A0F78CBC0F44402AEF8983B69DF38D565CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
    • String ID: SERVICE_CONFIG_DELAYED_AUTO_START_INFO$SERVICE_DELAYED_AUTO_START_INFO$get_service_startup()
    • API String ID: 2527037045-1869567720
    • Opcode ID: 69fb2d42e2d91f1c685f588ffc0fe427bfee43e353695e8c5bf8aefcc2d855ce
    • Instruction ID: 38db9a9ae14d872f97fdc1de8561fc73ac50b2242696658d995bfcb454e7631e
    • Opcode Fuzzy Hash: 69fb2d42e2d91f1c685f588ffc0fe427bfee43e353695e8c5bf8aefcc2d855ce
    • Instruction Fuzzy Hash: 9A417C36604A9186EB12DB66F4043DAB7A0FB8DBC4F444425FB8947BB9EF79C945C700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: get_service_dependencies()$lpDependencies
    • API String ID: 0-219018013
    • Opcode ID: 68ce330cffe9adf813eb05897d5185dfa0d7afdf617ecf9cd4df69588dddc146
    • Instruction ID: 0b794208b03b107e37140d15cab82f7c2ac1332d20ef532040e36ff5cb6e1006
    • Opcode Fuzzy Hash: 68ce330cffe9adf813eb05897d5185dfa0d7afdf617ecf9cd4df69588dddc146
    • Instruction Fuzzy Hash: B1617EB6601A4486EB12DF66E4107A977A4F74CFD8F448015EF4943BB9DF38C896EB00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: free$_lock$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1575098132-0
    • Opcode ID: 900ce2037cdb037113a81b253223c54e735500e579220bc9ff7a13c552b12bce
    • Instruction ID: 3f2e47c94607781c5668a653277a2e80905b3f9df4bd34b8ef35c317ec6b371a
    • Opcode Fuzzy Hash: 900ce2037cdb037113a81b253223c54e735500e579220bc9ff7a13c552b12bce
    • Instruction Fuzzy Hash: C931613171658046FE57ABA39051BF81350AFCEBD4F481625BB1E0F6E6CF7AC8419721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Close$Value_snwprintf_s$DeleteErrorLast
    • String ID: %s$Default
    • API String ID: 3208764733-3635391725
    • Opcode ID: f968c3f3b5bbd221de3442cd771249ba592d43d4f0135544e74485d0ad2b4540
    • Instruction ID: 7f3500c77af8523e0b9688c3565e21f73e6fccc2fc3eb3fe9c18069a2d6bb7bc
    • Opcode Fuzzy Hash: f968c3f3b5bbd221de3442cd771249ba592d43d4f0135544e74485d0ad2b4540
    • Instruction Fuzzy Hash: 36719F71205A8481FB62AF63A8507DA6390BB8DBE4F441225BF2A4B7F5EF39C545C700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: kill_console
    • API String ID: 0-1600766264
    • Opcode ID: 24588610c75a006a5ec3907880273b6228820f287f5c7304aec0ead17864109a
    • Instruction ID: 4e94d8b513b1f5e7ee0762e412180e31d9f0e4f8997cd7f6d5a9da43dfda367a
    • Opcode Fuzzy Hash: 24588610c75a006a5ec3907880273b6228820f287f5c7304aec0ead17864109a
    • Instruction Fuzzy Hash: ED517CB1204A8086E756DB67B5043EA73A0FB4D7C4F444129FF9A877A9EF3CC9608344
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID: %s$LocalSystem$SERVICE_INTERACTIVE_PROCESS$SERVICE_WIN32_OWN_PROCESS
    • API String ID: 3859560861-1492594695
    • Opcode ID: fffd49694891c048e89e9d27ed4e9e083eab7d1e701e1650eb288d6d3e09bb87
    • Instruction ID: 91411cd37f94a30d779ec4d0d885fcc79ea8ecf7b1daad06c6b59b3cb524fe1d
    • Opcode Fuzzy Hash: fffd49694891c048e89e9d27ed4e9e083eab7d1e701e1650eb288d6d3e09bb87
    • Instruction Fuzzy Hash: D8516E71600A8581EA22EB63F8147DA36A0FB9DBE4F544129BF5D8B7E5EF38C945C310
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %c%s$dump$setting_dump_environment
    • API String ID: 0-3189341153
    • Opcode ID: 9a0f11384646d509be77c744bea4d997d78b4229cb7c4b37e1591e935d434a64
    • Instruction ID: a88404555512558ecfb639f2472b13f1a2d02313ba6e537b4a6dd30e16b3868c
    • Opcode Fuzzy Hash: 9a0f11384646d509be77c744bea4d997d78b4229cb7c4b37e1591e935d434a64
    • Instruction Fuzzy Hash: FC418672605B8086E7529B22B8407CA73A0FB4DBE4F448215FF59477A8DF38C546C740
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %c%s$dump$setting_dump_dependon
    • API String ID: 0-3641056368
    • Opcode ID: 57a2d30268ecd36bb96e0013271ec2899ae4f714c99f68fd30a59840ab665ad2
    • Instruction ID: 5b2c56ca74a4f11c5f493cda54f30b86cc1eab8f828d8a41247e1b07d06811aa
    • Opcode Fuzzy Hash: 57a2d30268ecd36bb96e0013271ec2899ae4f714c99f68fd30a59840ab665ad2
    • Instruction Fuzzy Hash: AB415E72605B8086E7529F62B8003DA77A4F789BE4F454216FF99477A8DF39C986C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocErrorFileFreeLastModuleName_snwprintf_s
    • String ID: % 8lu %s%s$???$[WOW64]
    • API String ID: 2935443209-3245662266
    • Opcode ID: cbb4cfd1420a93e7b420b7677ccf895b67e377104a8596a3b37561e861a92888
    • Instruction ID: e0c9e3d2c961057911ea44f832aeb7ed931542fe1b8e416e59bf97ed6bf11b92
    • Opcode Fuzzy Hash: cbb4cfd1420a93e7b420b7677ccf895b67e377104a8596a3b37561e861a92888
    • Instruction Fuzzy Hash: 05319A71301A8592EB16DB62E8507DA63A0FB8CBC4F444126FB5D877A8EF3CC946C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$AllocHeapSource$DeregisterEnvironmentErrorExpandLastLocalProcessRegisterReportStringsValue
    • String ID: ExpandEnvironmentStrings()$expand_environment_string
    • API String ID: 834161584-2090451141
    • Opcode ID: 1a857a85fd842b27e93463c536bdb97f0d9aefa233d789fc1baff957dccea033
    • Instruction ID: 58318641a1031420995e21b4a8e777d6e14e3e5644aac21f61b35d74fcd66aa2
    • Opcode Fuzzy Hash: 1a857a85fd842b27e93463c536bdb97f0d9aefa233d789fc1baff957dccea033
    • Instruction Fuzzy Hash: F1317175704A9042FB519B77B81039A62A1BB8DBC8F480139FF899776EEE3DC9414700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$ConfigErrorLastProcessQueryService$AllocFree
    • String ID: QUERY_SERVICE_CONFIG$query_service_config()
    • API String ID: 2921672788-976127789
    • Opcode ID: 6385d850b7c4583b6f4ff08a7ab95c0a91cc1a175e4f964d4c8b666ba4b27812
    • Instruction ID: 12ef63c7e0ec9709d506b3c2b775e2798cffe3e90e480b8a1bef477be83b5080
    • Opcode Fuzzy Hash: 6385d850b7c4583b6f4ff08a7ab95c0a91cc1a175e4f964d4c8b666ba4b27812
    • Instruction Fuzzy Hash: E0215E75604A9082EB02DBA7F8043DAA7A0BB8DBC4F444429FF4E43B79DE7CC9459B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree
    • String ID: append_to_double_null()$key$newdn
    • API String ID: 756756679-3598718664
    • Opcode ID: e8c0b0ba8166b1c5237778d83a4dddeaf43343473c6732b3d22e86108212e6b8
    • Instruction ID: a8659a9f761dcd48a20ea0bbf3106ddecff7fc8e2851ddb4a1a6f8d7a32dd65c
    • Opcode Fuzzy Hash: e8c0b0ba8166b1c5237778d83a4dddeaf43343473c6732b3d22e86108212e6b8
    • Instruction Fuzzy Hash: CF7180B6615A8081E662DB26B41079AB7A0FB4DBE4F448215FF6953BE8EB3CC545C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree
    • String ID: key$newdn$remove_from_double_null()
    • API String ID: 756756679-180665911
    • Opcode ID: dec6ef9297f2f528877f7eddd1e9d4dee81437ed94269273f5d5e12274e4d5bc
    • Instruction ID: 8c6053ef598a717a1cf223f2861525f2768c9fab3b540323a4fd1412df3eeb5f
    • Opcode Fuzzy Hash: dec6ef9297f2f528877f7eddd1e9d4dee81437ed94269273f5d5e12274e4d5bc
    • Instruction Fuzzy Hash: 03619D76722A9485E622DF26B8047D9B7E0F749BD4F488219EF59037E8DF38C985C300
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %c%u
    • API String ID: 0-883269693
    • Opcode ID: dae4665bc3affedc8ddc6640690ef829aa088a68563d45def97606a5a0a477d5
    • Instruction ID: e75947337f5fd74baf7b6f5cfe7824060c4155299e81c8694041bf6305fe6a32
    • Opcode Fuzzy Hash: dae4665bc3affedc8ddc6640690ef829aa088a68563d45def97606a5a0a477d5
    • Instruction Fuzzy Hash: 6C51D072215AC596E7A1CF26F4483DA73A0F78C7E8F548229EB5957BE8DB38C105CB00
    APIs
    • RegQueryValueExW.ADVAPI32 ref: 000000014000BC24
      • Part of subcall function 0000000140002430: TlsGetValue.KERNEL32 ref: 0000000140002442
      • Part of subcall function 0000000140002430: LocalAlloc.KERNEL32(?,?,?,?,?,?,?,000000014000104C), ref: 0000000140002458
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$SourceValue$AllocDeregisterLocalQueryRegisterReport
    • String ID: get_environment()
    • API String ID: 3592804690-3013924771
    • Opcode ID: d57cb4b6c5f1898b49630d35002a849a514446ed12f956d7628af7b00dca0aac
    • Instruction ID: 391c77f4bcccafbf38fb0bab5bbf8670fbb79554e73f50bd891dca26f0d5cfbd
    • Opcode Fuzzy Hash: d57cb4b6c5f1898b49630d35002a849a514446ed12f956d7628af7b00dca0aac
    • Instruction Fuzzy Hash: A9515CB6204B9082E721DF62A8547DE72A5F74DBC8F44812AFF89477A9EF38C9158700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CriticalSection_snwprintf_s$EnterLeaveObjectServiceSingleSleepStatusTimerWaitWaitable
    • String ID: %lu
    • API String ID: 109876818-685833217
    • Opcode ID: a44a97c43d17e4cb705c039e0ed849eaca5a340843a244270a44aae3fcf5a655
    • Instruction ID: e17d187198e1d2c556d4b600b8acea85b7155cc02b68ccfbb8bdb977714c94d3
    • Opcode Fuzzy Hash: a44a97c43d17e4cb705c039e0ed849eaca5a340843a244270a44aae3fcf5a655
    • Instruction Fuzzy Hash: 2B51DC72A04A80D7E7698F22E5553DE7360F388794F40032AF7AD876E5DB39D969CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$CloseDeregisterQueryRegisterReportValue_snwprintf_s
    • String ID: %s\%s$AppEvents$hook registry$set_hook()
    • API String ID: 2341694245-1670097391
    • Opcode ID: b442a7b8d74010f362647dca0de7b108b6b00fa7208d0fa25c58233f39fd3f26
    • Instruction ID: 6d0862f9470687456da518464cbe15381b9a51efbdc411d03d7a1f67d58250b0
    • Opcode Fuzzy Hash: b442a7b8d74010f362647dca0de7b108b6b00fa7208d0fa25c58233f39fd3f26
    • Instruction Fuzzy Hash: 9041B17131468059EB62CB23B891BEA6291B74DBE4F84032ABF6E47BE5DF3CC5459310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: FormatMessageValue$AllocDefaultLangLocalUser_snwprintf_s
    • String ID: <out of memory for error message>$system error %lu
    • API String ID: 2253289489-3923297632
    • Opcode ID: c57cf59de28d07db67d5877a0ca59d18a7d4958fae7d58dbe770bbd656636a06
    • Instruction ID: a577034a7231977c6e80a66ab4d1eee538ee20579c78fea223c5835cb28133ac
    • Opcode Fuzzy Hash: c57cf59de28d07db67d5877a0ca59d18a7d4958fae7d58dbe770bbd656636a06
    • Instruction Fuzzy Hash: 7E21327160478186E7229F26F8547A66291FB8C7E8F444238EB99477E4EF3CC8548704
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$Free$Alloc
    • String ID: canon$native_set_dependon
    • API String ID: 3689955550-866904565
    • Opcode ID: 1a41d593f63f6d53f7ef41eee8dd95d892469f4ce90a1465bab3fee54d794e47
    • Instruction ID: 3417812ee75a08193b20f1fd53a885790022d951d8f5cc66eb521b80143630f7
    • Opcode Fuzzy Hash: 1a41d593f63f6d53f7ef41eee8dd95d892469f4ce90a1465bab3fee54d794e47
    • Instruction Fuzzy Hash: 8B81947260468086E762DF66A8003DA73A1F74DBE4F548229FF9947BE9DF39C9468700
    APIs
    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 0000000140024692
    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400246B1
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 0000000140024756
    • malloc.LIBCMT ref: 000000014002476D
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400247B5
    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400247F0
    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014002482C
    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014002486C
    • free.LIBCMT ref: 000000014002487A
    • free.LIBCMT ref: 000000014002489C
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ByteCharMultiWide$Infofree$malloc
    • String ID:
    • API String ID: 1309074677-0
    • Opcode ID: 87be4e84dfff67e6a5404b062bacef3d47c9d24ad15316017cadb552b82724b7
    • Instruction ID: 0861bc031b95cbac96e7ade4b626951d0e31202a9991f2a15cb32f64d4bc2cc4
    • Opcode Fuzzy Hash: 87be4e84dfff67e6a5404b062bacef3d47c9d24ad15316017cadb552b82724b7
    • Instruction Fuzzy Hash: 6761A232214A8086E7268F27A8403ED76D5F789BE8F544629FB6A47BF4DF78C9458600
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ErrorLastOpenProcess_snwprintf_s
    • String ID: %lu
    • API String ID: 1004745324-685833217
    • Opcode ID: 90df853b17baf89f81b51910ebc5fb765af783191756ca6429a8faba2c2f6cee
    • Instruction ID: 96f1c24e96412612cb91f2ad7393678c3340066f9dc9d26303ae69a5e6fb9e68
    • Opcode Fuzzy Hash: 90df853b17baf89f81b51910ebc5fb765af783191756ca6429a8faba2c2f6cee
    • Instruction Fuzzy Hash: 38318071204A8182EB25DB26F41179E73A0FB4D7D4F444225BB8A876B9DF3CC545C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Event$ProcessSource$AllocDeregisterFreeRegisterReport_snwprintf_s
    • String ID: 0x%08x$control code$log_service_control()
    • API String ID: 4005908332-2089045330
    • Opcode ID: 4b21c5b224168c7e7b4499695bab61fcf9293932d0e1ac05f85688a7a5bfa71c
    • Instruction ID: ffd804206bfe6ad337dc71d2b961a3d269193d7c685cb79a6a520c7edc326c17
    • Opcode Fuzzy Hash: 4b21c5b224168c7e7b4499695bab61fcf9293932d0e1ac05f85688a7a5bfa71c
    • Instruction Fuzzy Hash: CB219E74605B9582F716CB57B8403E963A0E78C7D8F44422AFF99477AAEB3DC9868700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: a77eea8c151e190d82b6f428cf3663883c0e4f19f30549a310c13090e96925bf
    • Instruction ID: ba48b5ff12f0f3a38f4112c7b4e794e919eaded4b65ab0df7ef7b43739d5b6dd
    • Opcode Fuzzy Hash: a77eea8c151e190d82b6f428cf3663883c0e4f19f30549a310c13090e96925bf
    • Instruction Fuzzy Hash: D941083261268486FF579FA3C4557EC23A0AB9EBC4F480535EB1D1F6A5CF7AC8918320
    APIs
    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 0000000140022178
    • GetLastError.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 000000014002218A
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 00000001400221EA
    • malloc.LIBCMT ref: 0000000140022256
    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 00000001400222A0
    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 00000001400222B7
    • free.LIBCMT ref: 00000001400222C8
    • GetStringTypeA.KERNEL32(?,?,?,?,?,?,00000008,00000001400223EA), ref: 0000000140022345
    • free.LIBCMT ref: 0000000140022355
      • Part of subcall function 000000014002463C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 0000000140024692
      • Part of subcall function 000000014002463C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400246B1
      • Part of subcall function 000000014002463C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400247B5
      • Part of subcall function 000000014002463C: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00000001400247F0
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLastmalloc
    • String ID:
    • API String ID: 3804003340-0
    • Opcode ID: e91ada0d3418bd2f4ec09be758e20b385c78253fc2d9f4ca109f82a3e7e5caae
    • Instruction ID: d53383f59eec4462090a64fdbba06e0d248b67d1e792285d37ae28196ec31423
    • Opcode Fuzzy Hash: e91ada0d3418bd2f4ec09be758e20b385c78253fc2d9f4ca109f82a3e7e5caae
    • Instruction Fuzzy Hash: 1A61A4326006809AEB229F66D4407DC77A6F74CBE8F540A29FF1957BE8DB78CD458340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: EnvironmentVariable$Heap$FreeProcess
    • String ID: =$=
    • API String ID: 3778319993-2054292070
    • Opcode ID: 7bf4f98abe447227e6e460fd7a3f549218de6e97ff0865786475516afd98c878
    • Instruction ID: f6e392f159df02a5c0d1aa5861e7932fb23e5242deca1ebcea39a171da841de7
    • Opcode Fuzzy Hash: 7bf4f98abe447227e6e460fd7a3f549218de6e97ff0865786475516afd98c878
    • Instruction Fuzzy Hash: 98217676B0464081EB67AF23B4003EAA3B4FB99FC4F189025FB45436B5EB78C896C301
    APIs
    • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,00000000,0000000140010A23), ref: 000000014000CF9C
    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,00000000,0000000140010A23), ref: 000000014000CFA9
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CloseQueryValue
    • String ID: %lu$AppExit
    • API String ID: 3356406503-2506947422
    • Opcode ID: 91cce3c04103fca208db0ba8ea57d72feedcf25d7159b3a3e563298903852ca5
    • Instruction ID: e4ede004e4c372926661c22df9dbebd0d94544826e947ded5c53d602466b7697
    • Opcode Fuzzy Hash: 91cce3c04103fca208db0ba8ea57d72feedcf25d7159b3a3e563298903852ca5
    • Instruction Fuzzy Hash: 66217172226B4586EB52CB22B440BEA63A1EB4DBE4F541235BF4D477B5EB38C4458701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocFreeLocalProcess_snwprintf_s_vfwprintf_p
    • String ID: %s\%s$NT Service$name$virtual_account
    • API String ID: 1628691493-1293189587
    • Opcode ID: db52c54a1bd37a6a99ec5c8299a3637e23c77f5368cde7bf9e39c4659f78377e
    • Instruction ID: 847d56988c11ccff595402cc5be1d1d2c3e50c9f6037e04ff214d1465cb41b48
    • Opcode Fuzzy Hash: db52c54a1bd37a6a99ec5c8299a3637e23c77f5368cde7bf9e39c4659f78377e
    • Instruction Fuzzy Hash: E3112B35604A9591EA01DB66B5003CAA7A0E789BF8F944326EF6C03BF8DE38C5468700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno
    • String ID:
    • API String ID: 2918714741-0
    • Opcode ID: 982cf5645eaff3f93709234b792b80570c945d66980feefcdc7db2932bc7bba4
    • Instruction ID: f44b4c5ca08c131a72ac2aeda0961a669f3265e00c911aa11d5fdcb0036162f4
    • Opcode Fuzzy Hash: 982cf5645eaff3f93709234b792b80570c945d66980feefcdc7db2932bc7bba4
    • Instruction Fuzzy Hash: 1E31B036605A0085FA329B63A5403DE7294F78CBE4F544211FFA90B7F5CB7AC680CB61
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno
    • String ID:
    • API String ID: 2918714741-0
    • Opcode ID: d8e2f75bd4eec119b7a74162acb909693bf6366b45e2778bd4c6527078f16033
    • Instruction ID: 458bbcd361950d94f00f622139773638d49f6eb722cf8fc22553e0bf105d927e
    • Opcode Fuzzy Hash: d8e2f75bd4eec119b7a74162acb909693bf6366b45e2778bd4c6527078f16033
    • Instruction Fuzzy Hash: 1141AEB550874085FE669B6399803DD73A4A79DBE4F594216FB6A0B7F6CB3AC400CB01
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 9996c40566fb5828d46623c4ffa25a2266b36484e3f6297649932163638dfe60
    • Instruction ID: 9b1ae2692c7aa1f797c30d2a7736f9f56704421511a9f923b1d78b963cf8b70d
    • Opcode Fuzzy Hash: 9996c40566fb5828d46623c4ffa25a2266b36484e3f6297649932163638dfe60
    • Instruction Fuzzy Hash: 88319E32610A5085E7139FA7A8417ED7555A7C8BF0F554719FF3A0B7E2CB3988428B04
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: b7646aed9a6597f5178b7b5b15324365973a83a7cbee41c92b9d46bd9732982a
    • Instruction ID: 0ddb69c9fbd17f45a9d6bfcdc64467eb0070a41d15bfb506f601218df6432c84
    • Opcode Fuzzy Hash: b7646aed9a6597f5178b7b5b15324365973a83a7cbee41c92b9d46bd9732982a
    • Instruction Fuzzy Hash: 8831CF32A1025086F3135FB7A8427DE7659A7C9BE0F594619FB254B7F2CB39C8128B04
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 090d77a67de7c985594c94a79ab8a345aab91e021a788556be9dfe15f8f47d1c
    • Instruction ID: ac8746d5d8e92a8110249d21505def07f870fd1ce60ee0340a01ca48d51c1f4b
    • Opcode Fuzzy Hash: 090d77a67de7c985594c94a79ab8a345aab91e021a788556be9dfe15f8f47d1c
    • Instruction Fuzzy Hash: 9631B63261069486F313AF77A8417ED7A55A7C9BD0FAA4619FB250B7F2CF39C8058B04
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: SERVICE_FILE_SYSTEM_DRIVER$SERVICE_INTERACTIVE_PROCESS$SERVICE_KERNEL_DRIVER$SERVICE_WIN32_OWN_PROCESS$SERVICE_WIN32_SHARE_PROCESS$SERVICE_WIN32_SHARE_PROCESS|SERVICE_INTERACTIVE_PROCESS
    • API String ID: 0-2402770260
    • Opcode ID: 16b709bc6346c575211078ab4dfa56cc102608930ce32e59cc0a2d25995df4d4
    • Instruction ID: 23a8490cfe90f1c2a308090e366f6a85ca121b180c663b3a352cc601f3572310
    • Opcode Fuzzy Hash: 16b709bc6346c575211078ab4dfa56cc102608930ce32e59cc0a2d25995df4d4
    • Instruction Fuzzy Hash: 01217C75524680C1F6678B67A804BE86271AB5C7D0FD51502FF0E5BAF0CB39CE889301
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %lu$%s set %s %s %s$%s set %s %s %s %s
    • API String ID: 0-1795435707
    • Opcode ID: 7eaeb9f95fd18fb7197ea1527400dc4321b66208a513659367c1991a4ac879e3
    • Instruction ID: 054e451fad24e7065109f3f0b029d0dd47eea46ddc6e4fcf6589d200fc340022
    • Opcode Fuzzy Hash: 7eaeb9f95fd18fb7197ea1527400dc4321b66208a513659367c1991a4ac879e3
    • Instruction Fuzzy Hash: C251C2B1618A8052FB32DB26A4517DA2290F7497F8F901322FF794BAF9DB39C641C700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno
    • String ID:
    • API String ID: 2918714741-0
    • Opcode ID: 8845e350c9dea3cf5267cdca4f8cdd242e0faa8e4b5157f2ade3c82d791c144e
    • Instruction ID: ab451d4fd270bb3903f805b9d7dd5fa572604a2d19d0fe20b2da734d15af6b17
    • Opcode Fuzzy Hash: 8845e350c9dea3cf5267cdca4f8cdd242e0faa8e4b5157f2ade3c82d791c144e
    • Instruction Fuzzy Hash: 8631D232B1064082F723AFB799467EE2656ABD97D0F19421DFB250B6F2CF78C8018744
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd$ExceptionRaise
    • String ID: csm
    • API String ID: 2255768072-1018135373
    • Opcode ID: faddf5dcd7db62c195a203077242433b8dd42f1278d6c606382e79f7e625ce9f
    • Instruction ID: e8565f7666dcd684ddfdf79a9db708bd8ef6147b54f82e3b1904922039863616
    • Opcode Fuzzy Hash: faddf5dcd7db62c195a203077242433b8dd42f1278d6c606382e79f7e625ce9f
    • Instruction Fuzzy Hash: D7315032200780C2E662DF12E008BEE7365F79DBE1F454226EF5A0B7A5CB36C845CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _snwprintf_s$ExtensionFindPathSystemTime
    • String ID: %s%s$-%04u%02u%02uT%02u%02u%02u.%03u%s
    • API String ID: 3012895273-3937541175
    • Opcode ID: 04bf656ff3656d3b29a7e1c79b75fe1ba97853567e5a848dceba71563a3bc1b0
    • Instruction ID: ef619b30c47574710df53ad96ff4b3ed88230155163be6427908ee86fe4bb24b
    • Opcode Fuzzy Hash: 04bf656ff3656d3b29a7e1c79b75fe1ba97853567e5a848dceba71563a3bc1b0
    • Instruction Fuzzy Hash: 8F219F72214A9096E7619F16F84179AB3A4F7887E0F504325BFA807AE8EB3CC521CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterRegisterReport_snwprintf_s
    • String ID: %s\%s$AppEvents$get_hook()$hook registry
    • API String ID: 3081108292-1702643787
    • Opcode ID: 1a6e9feb4cc426e37fdb4580ac0202121e0b5c3df63c35c9d4901585fb099b56
    • Instruction ID: 186230ca1ad757ef69455b0b81aec2deb29fe0d21a35ae0f365b12cc6bbcffb9
    • Opcode Fuzzy Hash: 1a6e9feb4cc426e37fdb4580ac0202121e0b5c3df63c35c9d4901585fb099b56
    • Instruction Fuzzy Hash: 90216D71208A8485FA22DB62F8557DA6350FB9C7D8F400226FB9D477AADB3CC5458B40
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 000000014001A85B
      • Part of subcall function 000000014001DBB8: GetModuleFileNameA.KERNEL32(?,?,?,?,?,000000014001DE14,?,?,?,?,0000000140020721,?,?,00000000,000000014001A304), ref: 000000014001DC7B
      • Part of subcall function 0000000140018E48: ExitProcess.KERNEL32 ref: 0000000140018E57
      • Part of subcall function 000000014001A2E0: malloc.LIBCMT ref: 000000014001A2FF
      • Part of subcall function 000000014001A2E0: Sleep.KERNEL32(?,?,00000000,000000014001A895,?,?,00000000,000000014001A93F,?,?,?,?,?,?,00000000,000000014001C67C), ref: 000000014001A316
    • _errno.LIBCMT ref: 000000014001A89D
    • _lock.LIBCMT ref: 000000014001A8B1
    • free.LIBCMT ref: 000000014001A8D3
    • _errno.LIBCMT ref: 000000014001A8D8
    • LeaveCriticalSection.KERNEL32(?,?,00000000,000000014001A93F,?,?,?,?,?,?,00000000,000000014001C67C,?,?,00000000,000000014001B8C5), ref: 000000014001A8FE
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfreemalloc
    • String ID:
    • API String ID: 1024173049-0
    • Opcode ID: 4b8126503065e6b48009ab2c06c44879dd52bdcb099693d6deae534223483fd6
    • Instruction ID: 808b59fbf07043b202a3597875559d9e6a470724fff9b57267105a538d5de662
    • Opcode Fuzzy Hash: 4b8126503065e6b48009ab2c06c44879dd52bdcb099693d6deae534223483fd6
    • Instruction Fuzzy Hash: 6A219031A1468082F667AB13A5043EE6394E78E7C4F544235FB4A4F7E6CF7DC8819740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree_snwprintf_s
    • String ID: value_from_string()
    • API String ID: 734457407-962593079
    • Opcode ID: 5d32141a8bc92d703f82d54b54d365e21bbe7b70d0b13f31b779d850a6f6be77
    • Instruction ID: 5240c5b56838f1c33d0c176e021e5deb61c2839be4d9d6ecac02f0754599868e
    • Opcode Fuzzy Hash: 5d32141a8bc92d703f82d54b54d365e21bbe7b70d0b13f31b779d850a6f6be77
    • Instruction Fuzzy Hash: B3213675201B8091E7129F62A81039AB7A0FB9DBE4F544729FFA9477F9DF39C5418700
    APIs
      • Part of subcall function 0000000140011330: GetProcessHeap.KERNEL32 ref: 0000000140011357
      • Part of subcall function 0000000140011330: HeapAlloc.KERNEL32 ref: 0000000140011366
    • SetServiceStatus.ADVAPI32 ref: 0000000140012A65
      • Part of subcall function 00000001400070A0: GetProcessHeap.KERNEL32 ref: 00000001400070DE
      • Part of subcall function 00000001400070A0: HeapAlloc.KERNEL32 ref: 00000001400070F0
    • CreateThread.KERNEL32 ref: 0000000140012AB6
    • GetLastError.KERNEL32 ref: 0000000140012AC1
      • Part of subcall function 0000000140002430: TlsGetValue.KERNEL32 ref: 0000000140002442
      • Part of subcall function 0000000140002430: LocalAlloc.KERNEL32(?,?,?,?,?,?,?,000000014000104C), ref: 0000000140002458
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
      • Part of subcall function 0000000140011450: UnregisterWait.KERNEL32 ref: 000000014001148E
      • Part of subcall function 0000000140011450: SetServiceStatus.ADVAPI32 ref: 0000000140011526
      • Part of subcall function 0000000140011450: EnterCriticalSection.KERNEL32 ref: 00000001400115A5
      • Part of subcall function 0000000140011450: LeaveCriticalSection.KERNEL32 ref: 00000001400115CE
      • Part of subcall function 0000000140011450: SetServiceStatus.ADVAPI32 ref: 0000000140011610
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocEventServiceStatus$CriticalProcessSectionSource$CreateDeregisterEnterErrorLastLeaveLocalRegisterReportThreadUnregisterValueWait
    • String ID: N$Pre$Stop
    • API String ID: 812145449-3371997690
    • Opcode ID: 9281fc33d314b76a1bf7a4864cfbc9a9ffee161a1aecb02412ce670d735580f2
    • Instruction ID: 6af4c4e2d9bea6531c1b1a8f5835dc278c3db49be028d9187f13332ad1a60afb
    • Opcode Fuzzy Hash: 9281fc33d314b76a1bf7a4864cfbc9a9ffee161a1aecb02412ce670d735580f2
    • Instruction Fuzzy Hash: D3215EB1A04A8186EB11DF32E8557DA7791F788788F48422AEB4D4B6A9DB7CC5058B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Window$ConsoleHandleProcessStation
    • String ID: 2.24-101-g897c7ad$2017-04-26$64-bit
    • API String ID: 2390998093-1554524045
    • Opcode ID: 40212cfdcf06d07a27e46ac9921e9abb250e1e9d96549386459e7f384bd3f580
    • Instruction ID: 208933ce03e1e4cdc7845d7d233c5fbd470caa9eac46f2f270bb13a7e74a878f
    • Opcode Fuzzy Hash: 40212cfdcf06d07a27e46ac9921e9abb250e1e9d96549386459e7f384bd3f580
    • Instruction Fuzzy Hash: 5B011A70201A4582FB16DB66B841BE563A0BB4C794F84052EBB5D476B0DF3DCA69C251
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Item$EnableWindow
    • String ID:
    • API String ID: 1115945535-0
    • Opcode ID: fdb9829a3620f13d7b2969ddaf86a420751a5d1716256729c1b6106c74bd120c
    • Instruction ID: c136e8dc2aac8da60112be9b768c9bef934fbc30f7073625e23f517483f65cae
    • Opcode Fuzzy Hash: fdb9829a3620f13d7b2969ddaf86a420751a5d1716256729c1b6106c74bd120c
    • Instruction Fuzzy Hash: 5A01B639705A9083EB169F63F85C3A66362BBCCBD1F10402AEB4A43775CE3CC8498211
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f544f8f627ae383a1768f01978c54afb7fcbded243f8772aacbfad5c93b319fe
    • Instruction ID: dd426357a1b9a04df74fbf9960fc75dfd2c65e8efc1bf2d2ec49ae87e7355242
    • Opcode Fuzzy Hash: f544f8f627ae383a1768f01978c54afb7fcbded243f8772aacbfad5c93b319fe
    • Instruction Fuzzy Hash: 9A415E76A14A80C2EB51AB23A4003DA67A1F78DBE4F584116FF4D5B7B8EF39C491CB40
    APIs
    • _getptd.LIBCMT ref: 000000014001BF9F
      • Part of subcall function 000000014001BC78: GetOEMCP.KERNEL32 ref: 000000014001BCA2
      • Part of subcall function 000000014001A2E0: malloc.LIBCMT ref: 000000014001A2FF
      • Part of subcall function 000000014001A2E0: Sleep.KERNEL32(?,?,00000000,000000014001A895,?,?,00000000,000000014001A93F,?,?,?,?,?,?,00000000,000000014001C67C), ref: 000000014001A316
    • free.LIBCMT ref: 000000014001C02B
      • Part of subcall function 000000014001A458: HeapFree.KERNEL32(?,?,00000000,000000014001C690,?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63), ref: 000000014001A46E
      • Part of subcall function 000000014001A458: _errno.LIBCMT ref: 000000014001A478
      • Part of subcall function 000000014001A458: GetLastError.KERNEL32(?,?,00000000,000000014001C690,?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63), ref: 000000014001A480
    • _lock.LIBCMT ref: 000000014001C063
    • free.LIBCMT ref: 000000014001C113
    • free.LIBCMT ref: 000000014001C143
    • _errno.LIBCMT ref: 000000014001C148
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
    • String ID:
    • API String ID: 2878544890-0
    • Opcode ID: 38aff8a93a219e004d4fb2decce731f2e1a6d6680dbde8491e10bca7deaa2c7b
    • Instruction ID: 9d870c3d51cdc4ff5d3e13d4a664bdaadccf0573858b57b63558978fb1287223
    • Opcode Fuzzy Hash: 38aff8a93a219e004d4fb2decce731f2e1a6d6680dbde8491e10bca7deaa2c7b
    • Instruction Fuzzy Hash: 3A51B23220068086E7579B67A4417E9B7A1F78DBD4F184216FB5A4B3F6CB7EC442C750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree
    • String ID: key$remove_from_environment_block()
    • API String ID: 756756679-4119166937
    • Opcode ID: 50cb34b2d45f5005c24813a1e0df2552c412c9d25a9998c01387e4aadb813f74
    • Instruction ID: 54bd58668acaa8a64a469b9de0776971d6101dcbc09bd55ad8906b7833b5f725
    • Opcode Fuzzy Hash: 50cb34b2d45f5005c24813a1e0df2552c412c9d25a9998c01387e4aadb813f74
    • Instruction Fuzzy Hash: E931A1B6201B9485EB12DF66B4047DA62A4F74CBE4F54422AFF59477A4DE3CCA86C304
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 42d7036cd358576f0070066cd22754db5c612962dedf37fce37ffe29802d89a7
    • Instruction ID: 3bc43f1e5b14f0690f46103c1f8670f803ed3e49879e2c6b4ee8c207eb9faa24
    • Opcode Fuzzy Hash: 42d7036cd358576f0070066cd22754db5c612962dedf37fce37ffe29802d89a7
    • Instruction Fuzzy Hash: C3316B76604A8182EB16EB62F4413EBB360F7887D4F440026EB8A07B65DF7DC98A8700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Event$ProcessSource$AllocDeregisterFreeRegisterReport
    • String ID: add_thread_handle()$hook_thread_t
    • API String ID: 2639727016-2774381828
    • Opcode ID: 07258aa41ff2d329225d4091da11a04ded088b26c61e4ebd4f05c7ccc6aded00
    • Instruction ID: ae4f56caa427e417652939ebecdf0274b2fcb006895382bd4350f4b80705e1a5
    • Opcode Fuzzy Hash: 07258aa41ff2d329225d4091da11a04ded088b26c61e4ebd4f05c7ccc6aded00
    • Instruction Fuzzy Hash: 392139B5200A9086EA16DFA3B990399B351B74DBC4F488439AF8957669DF3CD1528704
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide__initconout
    • String ID:
    • API String ID: 2210154019-0
    • Opcode ID: 49750729c7b7aba1964d5437bfb005b6ebdb22c5dff53d799c2bcbff44f50bda
    • Instruction ID: 6f037757feaa4c27bd12720e07a08ea325e095812da091d21dc5bf2b4c7a5843
    • Opcode Fuzzy Hash: 49750729c7b7aba1964d5437bfb005b6ebdb22c5dff53d799c2bcbff44f50bda
    • Instruction Fuzzy Hash: 5931FC32214A5086FB629B22E4583EA63A0F78D7F5F500319F769479F4DB7DC949CB01
    APIs
    • GetLastError.KERNEL32(?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63,?,?,?,?,00000000,000000014001818D), ref: 000000014001C62E
    • FlsGetValue.KERNEL32(?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63,?,?,?,?,00000000,000000014001818D), ref: 000000014001C63C
    • SetLastError.KERNEL32(?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63,?,?,?,?,00000000,000000014001818D), ref: 000000014001C694
      • Part of subcall function 000000014001A34C: Sleep.KERNEL32(?,?,?,000000014001C657,?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63), ref: 000000014001A391
    • FlsSetValue.KERNEL32(?,?,00000000,000000014001B8C5,?,?,?,?,0000000140018C63,?,?,?,?,00000000,000000014001818D), ref: 000000014001C668
    • free.LIBCMT ref: 000000014001C68B
    • GetCurrentThreadId.KERNEL32 ref: 000000014001C67C
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
    • String ID:
    • API String ID: 3106088686-0
    • Opcode ID: 744ae31ed2748b486f23b4531f5f32d18c4f8e80a7f5ef535a5c4d2a89bb2a02
    • Instruction ID: 0ffe949912e89fedb02e4494acd6bb79bd4d8b9ab6d6ef47e204af3708a6d54b
    • Opcode Fuzzy Hash: 744ae31ed2748b486f23b4531f5f32d18c4f8e80a7f5ef535a5c4d2a89bb2a02
    • Instruction Fuzzy Hash: 9C016734601B4186FB179F7794547E92391AB8CBD4F588228FB2A4B3F5EF3CD9458610
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: LocalSystem
    • API String ID: 0-3718507506
    • Opcode ID: 5c510378ff35a3638561cda51b730c846dcb0c7f476201026cba6af3d87a6302
    • Instruction ID: 4fab973e0ab3922536d0106af51d2d3be6949260d5916859e64fc5ce486037cb
    • Opcode Fuzzy Hash: 5c510378ff35a3638561cda51b730c846dcb0c7f476201026cba6af3d87a6302
    • Instruction Fuzzy Hash: 6E618031305B8481FA62DB27A8007DB66E4BB8DBE4F584625BF6D4BBE5EF39C4418700
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %s
    • API String ID: 0-620797490
    • Opcode ID: 99855a48316195b93616fbf83ab77e05beff4dc8f3728702d7539ec089a948fa
    • Instruction ID: 432093541ee24ec42a9dad4126288decd4c7b585e2e55cd77d9abcda1cabd02e
    • Opcode Fuzzy Hash: 99855a48316195b93616fbf83ab77e05beff4dc8f3728702d7539ec089a948fa
    • Instruction Fuzzy Hash: 5E51C072210B8086FB229B22A8407DA66A5F78DBD4F540225FF5D4BBF6DF39C941C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ErrorFileLastSystemTimeWrite_snwprintf_s
    • String ID: %04u-%02u-%02u %02u:%02u:%02u.%03u:
    • API String ID: 3358128232-1268504407
    • Opcode ID: 545cec81cc804d73d1d6c1551bfbb854dad7939054364ccafffc5018a4443183
    • Instruction ID: 7bdd17979279be81dc0a40d8893366271bb910dda1fa186fda7c8216b1e1685a
    • Opcode Fuzzy Hash: 545cec81cc804d73d1d6c1551bfbb854dad7939054364ccafffc5018a4443183
    • Instruction Fuzzy Hash: C231787220879486E7618F26F4407AAB7A0F389BD4F404216FFD943AA8DB3CC559CF00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 481ea5d7f3c29c63cf85197afd43e9c94bbba3eedf21573157349b5057f42bfd
    • Instruction ID: 77ca1b70bd230a49568464f667e52b8287626ed6f347ef5051490fb47eb780d6
    • Opcode Fuzzy Hash: 481ea5d7f3c29c63cf85197afd43e9c94bbba3eedf21573157349b5057f42bfd
    • Instruction Fuzzy Hash: 7A019933600444A2FB53EBA3D45A7F91361A7DDBC5F880505BB1E9B5B1CEBAD8809721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _snwprintf_s
    • String ID: SYSTEM\CurrentControlSet\Services\%s$SYSTEM\CurrentControlSet\Services\%s\Parameters$SYSTEM\CurrentControlSet\Services\%s\Parameters\%s
    • API String ID: 2338360151-2857344572
    • Opcode ID: 955eb0ba2272fd79fd9059f76f52419cdc5c8a2953150d37e1f3236c5638c1eb
    • Instruction ID: 3b4812ba213ef710f57529e59cf52b854acbe9ee47b84ed3b9b00befb1747d54
    • Opcode Fuzzy Hash: 955eb0ba2272fd79fd9059f76f52419cdc5c8a2953150d37e1f3236c5638c1eb
    • Instruction Fuzzy Hash: CBF01C7A90578092E562EBA674517C533A4B79A3F4F901309FEBC037F5DB388655C600
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd
    • String ID: MOC$csm
    • API String ID: 3186804695-1389381023
    • Opcode ID: bf3a03d5970d1dd3e1fb6bd408ba9de5847db261f06e21d03137f6bf29761363
    • Instruction ID: 392b93139b50625e4f00c751eea5d7909c54f268b14a004c93ea04d22c7197c5
    • Opcode Fuzzy Hash: bf3a03d5970d1dd3e1fb6bd408ba9de5847db261f06e21d03137f6bf29761363
    • Instruction Fuzzy Hash: 75E04F36911180C6E7272B66C4453EC36E0FB9C789F86A060A3444B3A3CBBEC4818A52
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CriticalSectionServiceStatus$EnterLeaveUnregisterWait
    • String ID:
    • API String ID: 750648178-0
    • Opcode ID: da6eaf891d5f39c178a9daca24e1f4e62401406960aaf2683fab0f1a6af88cc5
    • Instruction ID: 64d843524deb2b9263129e994287159644b8f218d23b3c23ad896588e56a0bad
    • Opcode Fuzzy Hash: da6eaf891d5f39c178a9daca24e1f4e62401406960aaf2683fab0f1a6af88cc5
    • Instruction Fuzzy Hash: 26519AB6904B86C6E769DB22F4513DBB7A4F3887C8F040215EB9A073A5DB7DD949CB00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$ByteCharMultiProcessWide$AllocFree
    • String ID:
    • API String ID: 1621643742-0
    • Opcode ID: c6716c944c1ee476e8fa47434dc82bb4148891a779e4bc662eaca591434aa38c
    • Instruction ID: 73261801b5f655ca270de00b92cee958fb11958522fdb0b445105a0a4ffb2315
    • Opcode Fuzzy Hash: c6716c944c1ee476e8fa47434dc82bb4148891a779e4bc662eaca591434aa38c
    • Instruction Fuzzy Hash: E9216235605B8081E7219F67B81079AABE5FB4D7E4F044229EF99477E9DF38C4508600
    APIs
    • DecodePointer.KERNEL32(?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001DE91
    • DecodePointer.KERNEL32(?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001DEA0
    • EncodePointer.KERNEL32(?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001DF1D
      • Part of subcall function 000000014001A3D0: realloc.LIBCMT ref: 000000014001A3FB
      • Part of subcall function 000000014001A3D0: Sleep.KERNEL32(?,?,00000000,000000014001DF0D,?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001A417
    • EncodePointer.KERNEL32(?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001DF2C
    • EncodePointer.KERNEL32(?,?,?,000000014001DF79,?,?,?,?,0000000140018F3E), ref: 000000014001DF38
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
    • String ID:
    • API String ID: 1310268301-0
    • Opcode ID: 83f6c6dcc442b54386dccdd7f702393c51a61e551925173b3f35c03b413daf19
    • Instruction ID: 30a756f2d09cec3d8e83d99eff3647af459344b6da25205903a0852a7dfdaa83
    • Opcode Fuzzy Hash: 83f6c6dcc442b54386dccdd7f702393c51a61e551925173b3f35c03b413daf19
    • Instruction Fuzzy Hash: 9B21683131169480EA12AB63F9453DAB392B78DBC0F54583AFB4E4F776EE79D5828304
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: 75444d69a368e4496316f745fd35ff06dd85ac79cfc29b2ce87d2832b74a9499
    • Instruction ID: c44fe957979a91557bf25453a9036a81366d3cea9cc272b65acdfdfda9ee0274
    • Opcode Fuzzy Hash: 75444d69a368e4496316f745fd35ff06dd85ac79cfc29b2ce87d2832b74a9499
    • Instruction Fuzzy Hash: 19114CB5605A8482EB129B73A8043DA67A1FB8DBD0F444029FF4E47768DF3CC9498A40
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$FreeProcess
    • String ID:
    • API String ID: 3859560861-0
    • Opcode ID: 06e58962aa168ef4b9cce3fa7573b8739e7680e84b76f287644083a05431860a
    • Instruction ID: 4df9a403a91ae1dd2fec2ef8b09f26153c7cc104d93c3de734a30b221c7b6cbb
    • Opcode Fuzzy Hash: 06e58962aa168ef4b9cce3fa7573b8739e7680e84b76f287644083a05431860a
    • Instruction Fuzzy Hash: 2E114CB5605A8482EB11DB73A8003DA67A1FBCDBD0F448126FF4E57768DF3DC9498A40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID: hStdError$hStdOutput$stderr_pipe$stdout_pipe
    • API String ID: 2962429428-3965950600
    • Opcode ID: b1431f8af12d8aa5b37c11219322e77cfc5415b162553f20b9ad0d1acf7a8f2b
    • Instruction ID: 132c92118f196b348bc52cac29ee2af79761ecaa20d4e8a20d920413e6b7f2b4
    • Opcode Fuzzy Hash: b1431f8af12d8aa5b37c11219322e77cfc5415b162553f20b9ad0d1acf7a8f2b
    • Instruction Fuzzy Hash: EA11C6B171094186EF96CF67F4457E92360FB4CBC8F844125AF5D831A5DF78C8918B00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Item$HeapText$_snwprintf_s$AllocProcess$FreeLocal
    • String ID:
    • API String ID: 65965981-0
    • Opcode ID: 21198b540a65345ed7fdc7f0815551f0124c4edbe3ffc441835e824b3edb693a
    • Instruction ID: 8c88ce8c025d37f4d5b0e8d3153f6582234e056b6c9f906e17911e81f835f57e
    • Opcode Fuzzy Hash: 21198b540a65345ed7fdc7f0815551f0124c4edbe3ffc441835e824b3edb693a
    • Instruction Fuzzy Hash: 4B11EFB161968182E7619B12F1547EE6311F789BC4F801125FF4E17AA9CF7CC54A8740
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Item$HeapText$_snwprintf_s$AllocProcess$FreeLocal
    • String ID:
    • API String ID: 65965981-0
    • Opcode ID: bc93de3db2f9f1020f2827c5b2bfaff67fd16c43bba92efd12e0b4febac6b628
    • Instruction ID: 4cb8385e7472ac1fff0796a63c3a7a682bee92a1d82b4e4757a1f87387902318
    • Opcode Fuzzy Hash: bc93de3db2f9f1020f2827c5b2bfaff67fd16c43bba92efd12e0b4febac6b628
    • Instruction Fuzzy Hash: 84111E717196C182EB669B16F158BEE6311F789BC4F801026FE4A17F99CF3CC64A8700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: c8f6b24ac6350ff6811d1f2cfc27df22994d1d3946078b9506eb196b374217da
    • Instruction ID: 10193c4157f05475708f448b1d2e75a923b46d7bcfff4b871662ec0ac0004df7
    • Opcode Fuzzy Hash: c8f6b24ac6350ff6811d1f2cfc27df22994d1d3946078b9506eb196b374217da
    • Instruction Fuzzy Hash: F9011331226B408AEB928F22E85439A6360F74DBD0F446624FF9E47BB4DB38CD958700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Item$EnableWindow
    • String ID:
    • API String ID: 1115945535-0
    • Opcode ID: fc1f00d6f8de915c0cf1fecaaa3dab29ec18d70c3be1c09bf97593c02900dbf0
    • Instruction ID: 5f5d2ebedf604e459dbdf9e4e943f0f8c65e70048bbde8dab10ac2dd5ce16191
    • Opcode Fuzzy Hash: fc1f00d6f8de915c0cf1fecaaa3dab29ec18d70c3be1c09bf97593c02900dbf0
    • Instruction Fuzzy Hash: 9BF09878B01A1082E7169F63F89C3962361B78CBD1F50402AEB4A53374CD3C888A8210
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd$CallTranslator
    • String ID: MOC
    • API String ID: 3569367362-624257665
    • Opcode ID: 984ef666c86ff0f26ee1dd0a56a556fdf105fcc5e21237e672a10548b4838afa
    • Instruction ID: 1981bdcadb06ce4bdc8508a6749bf47e27913e4d16f9d5307a86893b0f960b5a
    • Opcode Fuzzy Hash: 984ef666c86ff0f26ee1dd0a56a556fdf105fcc5e21237e672a10548b4838afa
    • Instruction Fuzzy Hash: 7861C172204BC096EB21CB16E0807EDB3A1F788BC8F044612FB8E4BAA9DF79C155C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CodeEnumExitProcessWindows
    • String ID: kill_process
    • API String ID: 1667765206-4017559064
    • Opcode ID: ec2725fd4d17deee3c6892182f4ec3b674e3a84b23fc252c11801733192f8160
    • Instruction ID: 870ed4e6a64c2b2717d87909e2c3c6a9de5bae361eb89f1ed30753fe3d390e05
    • Opcode Fuzzy Hash: ec2725fd4d17deee3c6892182f4ec3b674e3a84b23fc252c11801733192f8160
    • Instruction Fuzzy Hash: 62315AB620068182EB92CF27E4443ED67E0F78DBCCF484015EF885B6A9DB38C895CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Process$CreateErrorLastTerminate
    • String ID: h
    • API String ID: 391916801-2439710439
    • Opcode ID: f0eea5fc8340ddcc071df88f9cb943006310234530f1304aabdf6978d6f4de95
    • Instruction ID: d870a3890a1a428991c6d2e8576a3997bb0424cf396cd575bfeec439b2630230
    • Opcode Fuzzy Hash: f0eea5fc8340ddcc071df88f9cb943006310234530f1304aabdf6978d6f4de95
    • Instruction Fuzzy Hash: 89116072614AC086DB608B25F44539FB3E5FBC8794F544129A78D87B69EF7CC055CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterRegisterReport
    • String ID: nssm
    • API String ID: 3235303502-2602286837
    • Opcode ID: 7df15c659b1a9ede9e7b78cde8095a5092b846815cd3347651fe12293546a120
    • Instruction ID: e50ceca6900d08032080260d0135b37eb9bb60d2fd49f87d05c207e38d1b7918
    • Opcode Fuzzy Hash: 7df15c659b1a9ede9e7b78cde8095a5092b846815cd3347651fe12293546a120
    • Instruction Fuzzy Hash: FD11C672614B8082DB61CB15B440799B3A4FBA97E9F144229EBA917FA4DF3CC464CB00
    APIs
    • _snwprintf_s.LIBCMT ref: 0000000140008240
    • RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,?,00000000,0000000140004197), ref: 0000000140008278
      • Part of subcall function 00000001400025F0: RegisterEventSourceW.ADVAPI32 ref: 0000000140002613
      • Part of subcall function 00000001400025F0: ReportEventW.ADVAPI32 ref: 0000000140002688
      • Part of subcall function 00000001400025F0: DeregisterEventSource.ADVAPI32 ref: 0000000140002691
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeleteDeregisterRegisterReportValue_snwprintf_s
    • String ID: %s%s$delete_createfile_parameter()
    • API String ID: 1919654809-3045456684
    • Opcode ID: 175380935694bc14b7af4e0a0e91dce587c67f0dfa4100bd6f875a10a037d859
    • Instruction ID: 00e2f90206eeac15bc4beae9a7c9104b7a997fd30bc8a4e903547ee1ab7b090e
    • Opcode Fuzzy Hash: 175380935694bc14b7af4e0a0e91dce587c67f0dfa4100bd6f875a10a037d859
    • Instruction Fuzzy Hash: C8016171204B8186EA61CB26F8517DA72A0F74C7D4F540229BBAD876E5DF3CC5098700
    APIs
    • GetModuleHandleW.KERNEL32(?,?,000000FF,0000000140018E55,?,?,00000028,0000000140020735,?,?,00000000,000000014001A304,?,?,00000000,000000014001A895), ref: 0000000140018E1B
    • GetProcAddress.KERNEL32(?,?,000000FF,0000000140018E55,?,?,00000028,0000000140020735,?,?,00000000,000000014001A304,?,?,00000000,000000014001A895), ref: 0000000140018E30
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 1646373207-1276376045
    • Opcode ID: 33c6d0fe48477ca3b6b91b462d7bf832c94a3ce6636cad9f835ac117e0bb2d2e
    • Instruction ID: 7fd0a63c8c4db595e634ee2cb220929ad1125e220e7f5ed1595a97e86bb7ad7d
    • Opcode Fuzzy Hash: 33c6d0fe48477ca3b6b91b462d7bf832c94a3ce6636cad9f835ac117e0bb2d2e
    • Instruction Fuzzy Hash: 88E0627071174592FE1B6BA3B8943E412917B5C7C1F48152D9E5E0B3B0EF389D59C310
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd$BaseImage
    • String ID:
    • API String ID: 2482573191-0
    • Opcode ID: 2237048bf79284b0269ed9c29fe75178a274c15cdf13b4d9d56bc2e72612f190
    • Instruction ID: 43c81dbebb5e7642f9f0f2e393759842062bb8c55fdd15a841d76fd40ecc4635
    • Opcode Fuzzy Hash: 2237048bf79284b0269ed9c29fe75178a274c15cdf13b4d9d56bc2e72612f190
    • Instruction Fuzzy Hash: B241877220158185EA26A727E4457EDA794BB8DFD8F558121FF194B7F2CF36C482C701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocProcess
    • String ID: get_service_username()$username
    • API String ID: 1617791916-1118073074
    • Opcode ID: c429dc061a9a6cf9038fc22e94fa89e910a21fbdcc0c89adca4798bb4a11ac5d
    • Instruction ID: 0cb368d2c87889caaf96027648e82f4ecc8631b9f2301991adb876be56352873
    • Opcode Fuzzy Hash: c429dc061a9a6cf9038fc22e94fa89e910a21fbdcc0c89adca4798bb4a11ac5d
    • Instruction Fuzzy Hash: 8C218E35311F9181EB52EB66A4007D963A0FB4DBD4F145115FFA9477AADF39C5918300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$AllocFreeLocalProcess_vfwprintf_p
    • String ID: canon$prepend_service_group_identifier()
    • API String ID: 3711101700-1763787916
    • Opcode ID: 70bfe6c4fdbcecd35eb41ec2717ce9fd15992a348f7a4d2acb1872022e334d37
    • Instruction ID: 507826b590544fc3c42e086d7e5ceacec4a2a22e150a68cdd10baf9fbc5d2281
    • Opcode Fuzzy Hash: 70bfe6c4fdbcecd35eb41ec2717ce9fd15992a348f7a4d2acb1872022e334d37
    • Instruction Fuzzy Hash: 43219F76211A4185EB12EF66F4403EA73A0FB4CBE4F489125FF5947BA5DE3CC9868300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree_errno
    • String ID: ****$NT Service
    • API String ID: 3082395346-2413771068
    • Opcode ID: 52f29cefcd2ae25377bfd57735bacb64c6185ee46865f8d51834da5f558f6643
    • Instruction ID: 542743ef18242b98f181da6a0e2a201551074ef330fba52be6967c975ec7fa0b
    • Opcode Fuzzy Hash: 52f29cefcd2ae25377bfd57735bacb64c6185ee46865f8d51834da5f558f6643
    • Instruction Fuzzy Hash: 4D210832209B8482EA229B63F4407DA73A4F78DBD8F484115FF9D47BA9DF79C6458B01
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: CurrentProcess$DuplicateErrorHandleLast
    • String ID:
    • API String ID: 3907606552-0
    • Opcode ID: a1a1746b7a1b8be94718e7fd56a79bcc54c5f9d3e77d580c70b2e15733a3a24d
    • Instruction ID: 063db28a99952865a7c583c334f68a92e69e6d162e6800a70cf4d12b91e85143
    • Opcode Fuzzy Hash: a1a1746b7a1b8be94718e7fd56a79bcc54c5f9d3e77d580c70b2e15733a3a24d
    • Instruction Fuzzy Hash: D1118FB1604B8086E761DF13B80079AB3B0FB99BC4F544129FF8943769DB3CD5458A44
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: File$CreateErrorLastPointer
    • String ID:
    • API String ID: 2723331319-0
    • Opcode ID: c08339b1e22f32e2d1c44a12ee1b47e332aaf4369c88baee9192c0904b562b12
    • Instruction ID: 04b0ddcd3c0c213606b494fe1a6ff36e368d780fa48891c1d5ff22db1412f183
    • Opcode Fuzzy Hash: c08339b1e22f32e2d1c44a12ee1b47e332aaf4369c88baee9192c0904b562b12
    • Instruction Fuzzy Hash: 3A016DB170478082EB519B67B85579A6290BB8CBF4F044328BFB9477E9DB7CCA404B00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: DecodePointer_errno_flush_freebuf
    • String ID:
    • API String ID: 1889905870-0
    • Opcode ID: 658a91a57760e8bfdda30ba3aa02c586fb4cbff4a2ea938cc334cdc9ad90d10b
    • Instruction ID: dd73d03f2c1ea2f4e6da5caa570c6c82c2ded73eed670ef386c6a809164821d1
    • Opcode Fuzzy Hash: 658a91a57760e8bfdda30ba3aa02c586fb4cbff4a2ea938cc334cdc9ad90d10b
    • Instruction Fuzzy Hash: 0401D432B1474042FB17AB7794513ED62515BDD7E8F280328BB524B5F7CE39CC818240
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Window$Rect$DesktopMove
    • String ID:
    • API String ID: 2894293738-0
    • Opcode ID: 6c793aff5eefccb5bb44ad8668e35a694a0f6c32e109282dd85a116bf074420f
    • Instruction ID: 9b88486dfa801f3ea56ee834c5fc61d219d0278a4a683ae30dfced5db79f75a2
    • Opcode Fuzzy Hash: 6c793aff5eefccb5bb44ad8668e35a694a0f6c32e109282dd85a116bf074420f
    • Instruction Fuzzy Hash: 940121723255418BEB65CF3AB4087597BA1F789BC5F485118BF4A93768DF3CD8048B04
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$HeapSource$AddressAllocDeregisterErrorFreeLastLocalProcProcessRegisterReportValue
    • String ID:
    • API String ID: 905504245-0
    • Opcode ID: d5408b3ffb354c67e7c82357409d565c31efe8536ff850fba44303473ab1db3e
    • Instruction ID: 68001dc37862e947b6face855cca3149977c74e6503e290e37182dcd7bd8c4ea
    • Opcode Fuzzy Hash: d5408b3ffb354c67e7c82357409d565c31efe8536ff850fba44303473ab1db3e
    • Instruction Fuzzy Hash: 58019EB5604B9082E7059B67E80039E63A0FB8DBC4F544428FF8C47B69EF3CC9118B00
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: e500c259cdb1fa6dcf6b2e184e15fca3845d434d9491e58f95f4bba58c537ff6
    • Instruction ID: 94aae76b054f4c278dc94295e20dd2d585d9ec13bd88ad299c4b3e6ab06a23ff
    • Opcode Fuzzy Hash: e500c259cdb1fa6dcf6b2e184e15fca3845d434d9491e58f95f4bba58c537ff6
    • Instruction Fuzzy Hash: 09014F7261064485FB176B66C9913E926629B98BF5F548349FB2A0B3F2CB394815CA10
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: MessageSend$Item$EnvironmentTextVariable_snwprintf_s
    • String ID:
    • API String ID: 2263371560-0
    • Opcode ID: 1e261de19b2049f26f316e4d274318e75987586aff01661f23e1450ee786f346
    • Instruction ID: a487d99df9754013241ce58257599312179a340a947fd995e23cf4898c0dcb84
    • Opcode Fuzzy Hash: 1e261de19b2049f26f316e4d274318e75987586aff01661f23e1450ee786f346
    • Instruction Fuzzy Hash: EFF06DB471145042FB62D773F579BEA2251978DBC4F81102AAE0A0BFA5CD3D84C94700
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: MessageSend$Item$EnvironmentTextVariable_snwprintf_s
    • String ID:
    • API String ID: 2263371560-0
    • Opcode ID: 321d717a814a89acfc3efa5d88a05e77f0a26d3068045a377efcac5b98d509ea
    • Instruction ID: b8c1a0b79c580c7536ba96cf28a415a1f70d0243cf03293b484bff3c148e4e38
    • Opcode Fuzzy Hash: 321d717a814a89acfc3efa5d88a05e77f0a26d3068045a377efcac5b98d509ea
    • Instruction Fuzzy Hash: 07F05E7871154042FB629773B979BDA225197CDBC4F811029AE4A0BFA5DD3C848A4700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: c278b547bf228ec2d41bf35c1773a0c57779f941625d245b0e0dc3692df98d56
    • Instruction ID: d9d2eefccdb791b5da5f69efa20d78588aa8d92e6e4a8d7ac5f61f1dcab05ab9
    • Opcode Fuzzy Hash: c278b547bf228ec2d41bf35c1773a0c57779f941625d245b0e0dc3692df98d56
    • Instruction Fuzzy Hash: 4F518F3220428086EB669E27A4407FD76E1F749BD8F044125FB995BBFACB39C891DB01
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID:
    • String ID: %s
    • API String ID: 0-620797490
    • Opcode ID: 66f9b83034cdc10779a5e0043ec0466502995d1837e5eb2a52bbf968e27da1c1
    • Instruction ID: d0e6f41c41585116152e02a184c3a1f58e4f54184c66c8a72e5feecc0c09d718
    • Opcode Fuzzy Hash: 66f9b83034cdc10779a5e0043ec0466502995d1837e5eb2a52bbf968e27da1c1
    • Instruction Fuzzy Hash: 45518F31711B4486EA67AF23B8403DB6690AB89BD4F580525BF5A4F7F5EF39C442C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: ItemText
    • String ID: remove()$service
    • API String ID: 3367045223-1317115628
    • Opcode ID: d6c1eab33e552a1d51edc14813662fb88a674c685bc921d8b2703708ddee48ca
    • Instruction ID: 884b68b2361b9accba3a5647830a6bbb3516d37918a4cefed32121cd93be4a21
    • Opcode Fuzzy Hash: d6c1eab33e552a1d51edc14813662fb88a674c685bc921d8b2703708ddee48ca
    • Instruction Fuzzy Hash: 7B319FB571855181FB16DB2BF1553EE5361E78ABC0F990021FF490BBAADA3ECA428704
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterQueryRegisterReportValue_snwprintf_s
    • String ID: %lu
    • API String ID: 4171705784-685833217
    • Opcode ID: 252649570bab39624b2f3eb7c4793306f44bec8960cf66e6758a799e215959da
    • Instruction ID: b465ed42436ed88bcde89125f5b67bdb6df87cfb18eb5e921029c2ca6c48ad98
    • Opcode Fuzzy Hash: 252649570bab39624b2f3eb7c4793306f44bec8960cf66e6758a799e215959da
    • Instruction Fuzzy Hash: EC2190B222578086E761CB52F45179AB7A0F388BD4F541225BF9E47BE9DB3CC545CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: EnvironmentVariable_snwprintf_s
    • String ID: %llu
    • API String ID: 709434441-507646796
    • Opcode ID: 62323e847072239d2dfe07a9b4d82c4042ae325b3561faaad9a455eb713a102c
    • Instruction ID: e467e5e73326f99c3117ac0c8c0fbe1bd46234100152dbfbcb59804b6ff9c8b8
    • Opcode Fuzzy Hash: 62323e847072239d2dfe07a9b4d82c4042ae325b3561faaad9a455eb713a102c
    • Instruction Fuzzy Hash: 581142F271568487EE55CF25F450399B3AAF78C7D0F40622ABB5A4BBA9DB38C445CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: EnvironmentVariable_snwprintf_s
    • String ID: NSSM_HOOK_%s_%s
    • API String ID: 709434441-2875243618
    • Opcode ID: 4ea9655dce0b04998aeefe81c93d88c27734ff9384fe505650afbcf47a32db9d
    • Instruction ID: cd584e5e7450ae50aa123f35cea241f8afa392f5509ff8d8e49b189544c92063
    • Opcode Fuzzy Hash: 4ea9655dce0b04998aeefe81c93d88c27734ff9384fe505650afbcf47a32db9d
    • Instruction Fuzzy Hash: 9311A5B1324A8441F622DB26E8517DA6254F78D7E8F805225BF9D876E5DE3CC286C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: Event$Source$DeregisterRegisterReport_snwprintf_s
    • String ID: %s%s$set_createfile_parameter()
    • API String ID: 3081108292-102671490
    • Opcode ID: db437f29594db4c845281d8ab962dddfa93ab2c9490456a63c896ed5cf6eaedd
    • Instruction ID: 36db2d84d5898f6ff56e4daee3153183d4249f022df8d192bd57ebdc47628223
    • Opcode Fuzzy Hash: db437f29594db4c845281d8ab962dddfa93ab2c9490456a63c896ed5cf6eaedd
    • Instruction Fuzzy Hash: 1101B172614A8042F622DB16F851BDA6354BB8C7E4F540325BFAC477E5DF38C50A8740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1818740881.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000003.00000002.1818717558.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818796143.0000000140026000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140030000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818819168.0000000140062000.00000004.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000003.00000002.1818869758.0000000140065000.00000002.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_140000000_nssm.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: f518a2f01546b2857537e82e835672f00eb15f2ecaa500e75dd14d18472aae28
    • Instruction ID: 3abc21f0dc36ef9efe3608e6f583550ad69bd6604c7f8c9ada24669edb6f4e5a
    • Opcode Fuzzy Hash: f518a2f01546b2857537e82e835672f00eb15f2ecaa500e75dd14d18472aae28
    • Instruction Fuzzy Hash: 480152322416418ADB72AF23C8503EC23A4E79DBCAF894129EF8D0B7A5DB31C994C305

    Execution Graph

    Execution Coverage:1.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0.7%
    Total number of Nodes:290
    Total number of Limit Nodes:74
    execution_graph 80495 7ffdf583de00 80496 7ffdf583e153 80495->80496 80498 7ffdf583de31 80495->80498 80511 7ffdf58383b0 80496->80511 80499 7ffdf58383b0 10 API calls 80498->80499 80505 7ffdf583de91 80498->80505 80500 7ffdf583df4b 80499->80500 80500->80505 80506 7ffdf583df90 80500->80506 80510 7ffdf583e0d8 80500->80510 80524 7ffdf58b32d0 10 API calls 80500->80524 80503 7ffdf583e120 80503->80505 80535 7ffdf58bef70 10 API calls 80503->80535 80506->80505 80525 7ffdf58aae80 10 API calls 80506->80525 80508 7ffdf583e066 80508->80505 80526 7ffdf58f20a0 80508->80526 80510->80505 80534 7ffdf58a92b0 10 API calls 80510->80534 80512 7ffdf5838430 80511->80512 80523 7ffdf58383ff 80511->80523 80513 7ffdf5838b25 80512->80513 80515 7ffdf5838438 80512->80515 80514 7ffdf58f20a0 10 API calls 80513->80514 80517 7ffdf5838b36 80514->80517 80516 7ffdf58f20a0 10 API calls 80515->80516 80515->80523 80522 7ffdf58384a4 80516->80522 80519 7ffdf58f20a0 10 API calls 80517->80519 80520 7ffdf5838bba 80517->80520 80517->80523 80518 7ffdf58f20a0 10 API calls 80518->80523 80519->80520 80520->80518 80520->80523 80521 7ffdf58f20a0 10 API calls 80521->80522 80522->80521 80522->80523 80523->80505 80524->80506 80525->80508 80527 7ffdf58f20aa 80526->80527 80531 7ffdf58a43e0 80526->80531 80530 7ffdf58f20b2 80527->80530 80527->80531 80528 7ffdf58a455d 80528->80510 80529 7ffdf58f20bf 80529->80510 80530->80529 80546 7ffdf58ecf90 80530->80546 80531->80528 80536 7ffdf58a56f0 80531->80536 80534->80503 80535->80505 80537 7ffdf58a5721 80536->80537 80538 7ffdf58a5817 80536->80538 80537->80538 80540 7ffdf58a5759 80537->80540 80541 7ffdf58a5774 80537->80541 80545 7ffdf58ecf90 9 API calls 80537->80545 80538->80540 80542 7ffdf58a5864 80538->80542 80557 7ffdf58a3440 80538->80557 80540->80531 80541->80538 80551 7ffdf593a9a0 80541->80551 80542->80540 80565 7ffdf5924970 9 API calls 80542->80565 80545->80541 80547 7ffdf58ecfc2 80546->80547 80548 7ffdf58ecfdd 80546->80548 80591 7ffdf582c0e0 80547->80591 80548->80529 80549 7ffdf58ecfd8 80549->80529 80553 7ffdf593a9e1 80551->80553 80566 7ffdf5826dd0 80553->80566 80554 7ffdf593aa7f new[] 80555 7ffdf593aaef 80554->80555 80571 7ffdf5827d80 80554->80571 80555->80538 80558 7ffdf58a346c 80557->80558 80562 7ffdf5827d80 8 API calls 80558->80562 80559 7ffdf58a349b 80561 7ffdf58a34f6 80559->80561 80563 7ffdf5827d80 8 API calls 80559->80563 80560 7ffdf58a34c2 80560->80561 80564 7ffdf5827d80 8 API calls 80560->80564 80561->80542 80562->80559 80563->80560 80564->80561 80565->80540 80580 7ffdf5923190 80566->80580 80568 7ffdf5826df8 80569 7ffdf5923190 GetSystemInfo 80568->80569 80570 7ffdf5826e99 new[] 80568->80570 80569->80570 80570->80554 80572 7ffdf5827e93 80571->80572 80574 7ffdf5827dce 80571->80574 80572->80554 80573 7ffdf5827de0 WriteFile 80573->80574 80574->80572 80574->80573 80575 7ffdf5827ee1 80574->80575 80575->80572 80576 7ffdf5827f21 80575->80576 80578 7ffdf5827f02 80575->80578 80590 7ffdf5935fe0 7 API calls 80576->80590 80589 7ffdf5935fe0 7 API calls 80578->80589 80581 7ffdf592319d 80580->80581 80583 7ffdf59231a4 new[] 80580->80583 80581->80568 80582 7ffdf5923421 80582->80568 80583->80582 80584 7ffdf5923190 GetSystemInfo 80583->80584 80585 7ffdf59233fb new[] 80584->80585 80585->80582 80587 7ffdf59235e0 GetSystemInfo 80585->80587 80588 7ffdf592361a 80587->80588 80588->80582 80589->80572 80590->80572 80593 7ffdf582c12e 80591->80593 80594 7ffdf582c2d0 CreateFileW 80593->80594 80596 7ffdf582c55e 80593->80596 80598 7ffdf582c4bd 80593->80598 80599 7ffdf59358b0 8 API calls new[] 80593->80599 80600 7ffdf58300b0 7 API calls 80593->80600 80594->80593 80601 7ffdf5935fe0 7 API calls 80596->80601 80598->80549 80599->80593 80600->80593 80601->80598 80602 7ffdf5845ec0 80603 7ffdf5845ef1 80602->80603 80605 7ffdf58460d7 80603->80605 80606 7ffdf58c2db0 80603->80606 80607 7ffdf58c2e09 80606->80607 80614 7ffdf58c2f79 80606->80614 80607->80614 80615 7ffdf58f7e30 80607->80615 80609 7ffdf58c2e35 80610 7ffdf58c3240 80609->80610 80612 7ffdf58c32b6 80609->80612 80609->80614 80610->80614 80619 7ffdf58f00c0 13 API calls 80610->80619 80612->80614 80620 7ffdf58bacf0 13 API calls 80612->80620 80614->80605 80616 7ffdf58f7e49 80615->80616 80618 7ffdf58f7e55 80615->80618 80621 7ffdf58e9c30 80616->80621 80618->80609 80619->80614 80620->80614 80622 7ffdf58e9c6c 80621->80622 80624 7ffdf58e9c79 80621->80624 80627 7ffdf58ea3c0 80622->80627 80625 7ffdf58e9ccd 80624->80625 80626 7ffdf58ea3c0 15 API calls 80624->80626 80625->80618 80626->80624 80638 7ffdf58e9d00 80627->80638 80629 7ffdf58ea477 80631 7ffdf58ea49e 80629->80631 80632 7ffdf58ea4d6 80629->80632 80647 7ffdf58bb920 80629->80647 80631->80624 80632->80631 80637 7ffdf58ea57c 80632->80637 80655 7ffdf5824460 15 API calls new[] 80632->80655 80635 7ffdf58ea7b2 80635->80637 80656 7ffdf58b91e0 15 API calls 80635->80656 80637->80631 80657 7ffdf58bc040 13 API calls 80637->80657 80639 7ffdf58e9d2a 80638->80639 80642 7ffdf58e9de1 80638->80642 80639->80629 80641 7ffdf58e9df5 80641->80629 80642->80641 80658 7ffdf58f7550 80642->80658 80643 7ffdf58ea04e 80643->80641 80645 7ffdf58ea131 80643->80645 80664 7ffdf5915d00 80643->80664 80667 7ffdf58ed8b0 12 API calls 80645->80667 80649 7ffdf58bb95b 80647->80649 80648 7ffdf58bb9b6 80648->80632 80649->80648 80651 7ffdf58bbb72 80649->80651 80777 7ffdf589d100 80649->80777 80782 7ffdf58a12d0 80649->80782 80787 7ffdf58a4220 12 API calls 80649->80787 80651->80648 80654 7ffdf58f20a0 10 API calls 80651->80654 80654->80648 80655->80635 80656->80637 80657->80631 80659 7ffdf58f75d4 new[] 80658->80659 80661 7ffdf58f774d 80659->80661 80663 7ffdf58f78a0 80659->80663 80668 7ffdf58b3370 80659->80668 80661->80643 80662 7ffdf5915d00 15 API calls 80662->80661 80663->80661 80663->80662 80725 7ffdf5912570 80664->80725 80666 7ffdf5915d15 80666->80645 80667->80641 80669 7ffdf58b34ed 80668->80669 80671 7ffdf58b3392 80668->80671 80669->80663 80670 7ffdf58bb920 13 API calls 80670->80671 80671->80669 80671->80670 80674 7ffdf58bc0a0 80671->80674 80680 7ffdf58bc150 80671->80680 80675 7ffdf58bc0c2 80674->80675 80679 7ffdf58bc0ee 80674->80679 80676 7ffdf58bc0e8 80675->80676 80697 7ffdf583aff0 12 API calls 80675->80697 80676->80679 80686 7ffdf58f0880 80676->80686 80679->80671 80682 7ffdf58bc1e1 80680->80682 80683 7ffdf58bc177 80680->80683 80682->80671 80685 7ffdf58bc1bc 80683->80685 80712 7ffdf58a4960 80683->80712 80685->80682 80716 7ffdf583e660 12 API calls 80685->80716 80687 7ffdf58f08aa 80686->80687 80693 7ffdf58f08c5 80686->80693 80688 7ffdf58f0922 80687->80688 80690 7ffdf58f09ed 80687->80690 80687->80693 80711 7ffdf58a42e0 10 API calls 80688->80711 80691 7ffdf58f0a2c 80690->80691 80694 7ffdf58f20a0 10 API calls 80690->80694 80691->80693 80698 7ffdf5924f90 80691->80698 80693->80679 80694->80691 80695 7ffdf58f0aec 80695->80693 80706 7ffdf58a58c0 80695->80706 80697->80676 80700 7ffdf5924fb2 80698->80700 80699 7ffdf5925147 80699->80695 80700->80699 80701 7ffdf59250f4 80700->80701 80705 7ffdf5827550 8 API calls 80700->80705 80701->80699 80702 7ffdf593a9a0 9 API calls 80701->80702 80702->80699 80703 7ffdf5925065 80703->80699 80704 7ffdf5827d80 8 API calls 80703->80704 80704->80701 80705->80703 80708 7ffdf58a58d9 80706->80708 80707 7ffdf58a5a1e 80707->80693 80708->80707 80709 7ffdf583b3f0 10 API calls 80708->80709 80710 7ffdf5827d80 8 API calls 80708->80710 80709->80708 80710->80708 80711->80693 80713 7ffdf58a4986 80712->80713 80714 7ffdf58a498c 80713->80714 80717 7ffdf582caa0 80713->80717 80714->80685 80716->80682 80718 7ffdf582cac3 80717->80718 80719 7ffdf582cad5 GetFileAttributesW 80718->80719 80722 7ffdf582cacb 80718->80722 80723 7ffdf582cb80 80719->80723 80724 7ffdf582caf3 80719->80724 80720 7ffdf582cb08 DeleteFileW 80720->80722 80720->80724 80721 7ffdf5935fe0 7 API calls 80721->80722 80722->80714 80723->80721 80723->80722 80724->80720 80724->80723 80726 7ffdf591258f 80725->80726 80727 7ffdf5912586 80725->80727 80741 7ffdf58413b0 80726->80741 80727->80666 80729 7ffdf59125bd 80733 7ffdf591261a 80729->80733 80738 7ffdf5912710 80729->80738 80762 7ffdf58fa0b0 12 API calls 80729->80762 80731 7ffdf59126d8 80732 7ffdf59126ee 80731->80732 80749 7ffdf5927d20 80731->80749 80732->80738 80740 7ffdf59126d0 80732->80740 80764 7ffdf58fa0b0 12 API calls 80732->80764 80733->80731 80734 7ffdf59126c6 80733->80734 80733->80740 80763 7ffdf58fa0b0 12 API calls 80734->80763 80738->80666 80740->80738 80765 7ffdf58fa0b0 12 API calls 80740->80765 80742 7ffdf58413e3 80741->80742 80743 7ffdf58413c9 80741->80743 80766 7ffdf5841570 80742->80766 80772 7ffdf59121e0 14 API calls 80743->80772 80747 7ffdf5841436 80747->80729 80748 7ffdf58413fa 80748->80747 80773 7ffdf5911f60 CloseHandle CloseHandle 80748->80773 80754 7ffdf5927d60 80749->80754 80750 7ffdf592856e 80751 7ffdf59285b9 80750->80751 80752 7ffdf58bc0a0 13 API calls 80750->80752 80759 7ffdf5927e4c 80750->80759 80753 7ffdf58bc150 12 API calls 80751->80753 80751->80759 80752->80750 80753->80751 80754->80750 80755 7ffdf5826dd0 GetSystemInfo 80754->80755 80756 7ffdf5927fd2 new[] 80754->80756 80754->80759 80755->80754 80756->80750 80757 7ffdf592805f 80756->80757 80758 7ffdf58bc0a0 13 API calls 80757->80758 80757->80759 80760 7ffdf5928287 80757->80760 80758->80757 80759->80732 80760->80759 80761 7ffdf58bc150 12 API calls 80760->80761 80761->80760 80762->80733 80763->80740 80764->80740 80765->80738 80767 7ffdf58416cf 80766->80767 80768 7ffdf5841584 80766->80768 80767->80748 80768->80767 80774 7ffdf5916600 CloseHandle CloseHandle 80768->80774 80775 7ffdf58bbd70 12 API calls 80768->80775 80776 7ffdf58bbf50 12 API calls 80768->80776 80772->80742 80773->80748 80774->80768 80775->80768 80776->80768 80788 7ffdf58f1bf0 80777->80788 80779 7ffdf589d111 80781 7ffdf589d242 80779->80781 80796 7ffdf58a4220 12 API calls 80779->80796 80781->80649 80783 7ffdf58a12e7 80782->80783 80784 7ffdf58a12df 80782->80784 80785 7ffdf58f20a0 10 API calls 80783->80785 80784->80649 80786 7ffdf58a1302 80785->80786 80786->80649 80787->80649 80791 7ffdf58f1e1d 80788->80791 80793 7ffdf58f1c20 80788->80793 80790 7ffdf58f1cbf 80790->80779 80790->80790 80791->80790 80804 7ffdf59180f0 GetSystemInfo 80791->80804 80792 7ffdf58f1dba 80792->80790 80792->80791 80797 7ffdf5827550 80792->80797 80793->80790 80793->80791 80793->80792 80803 7ffdf58a4d50 12 API calls 80793->80803 80796->80781 80799 7ffdf582757d 80797->80799 80798 7ffdf5827600 ReadFile 80798->80799 80802 7ffdf5827594 new[] 80798->80802 80799->80798 80800 7ffdf5827690 80799->80800 80799->80802 80805 7ffdf5935fe0 7 API calls 80800->80805 80802->80791 80803->80792 80804->80790 80805->80802 80806 7ffdf582a8e0 80807 7ffdf582a904 80806->80807 80809 7ffdf582a8fb 80806->80809 80807->80809 80816 7ffdf59020f0 80807->80816 80811 7ffdf582a98e 80812 7ffdf582ac6a 80811->80812 80813 7ffdf5915d00 15 API calls 80811->80813 80815 7ffdf59020f0 15 API calls 80811->80815 80820 7ffdf58eecc0 80811->80820 80824 7ffdf582bc70 15 API calls 80811->80824 80813->80811 80815->80811 80817 7ffdf5902103 80816->80817 80819 7ffdf5902108 80816->80819 80825 7ffdf582bc70 15 API calls 80817->80825 80819->80811 80821 7ffdf58eeceb 80820->80821 80822 7ffdf58eed3e 80820->80822 80821->80811 80822->80821 80823 7ffdf58f7550 15 API calls 80822->80823 80823->80822 80824->80811 80825->80819 80826 7ffdf5828a20 80827 7ffdf58eecc0 15 API calls 80826->80827 80828 7ffdf5828a47 80827->80828 80829 7ffdf5827730 80830 7ffdf5923190 GetSystemInfo 80829->80830 80833 7ffdf582774d new[] 80830->80833 80831 7ffdf58278cc 80833->80831 80834 7ffdf58a20f0 80833->80834 80835 7ffdf5923190 GetSystemInfo 80834->80835 80837 7ffdf58a2126 new[] 80835->80837 80839 7ffdf58a23a3 80837->80839 80841 7ffdf58a295b 80837->80841 80844 7ffdf58a21c7 80837->80844 80857 7ffdf58f20f0 GetSystemInfo new[] 80837->80857 80839->80844 80845 7ffdf58bdc60 80839->80845 80841->80831 80842 7ffdf58a24e4 80842->80844 80853 7ffdf5830830 80842->80853 80844->80841 80858 7ffdf58bf5e0 12 API calls 80844->80858 80849 7ffdf58bdcb0 new[] 80845->80849 80847 7ffdf58bdff7 80851 7ffdf58be082 80847->80851 80852 7ffdf5827550 8 API calls 80847->80852 80850 7ffdf58bddc4 80849->80850 80849->80851 80859 7ffdf58f0e30 80849->80859 80850->80842 80851->80850 80863 7ffdf58f05b0 12 API calls 80851->80863 80852->80851 80854 7ffdf583085c 80853->80854 80855 7ffdf58308a6 80854->80855 80864 7ffdf58261e0 GetSystemInfo 80854->80864 80855->80844 80857->80839 80858->80841 80860 7ffdf58f0eb9 new[] 80859->80860 80861 7ffdf58f1126 80860->80861 80862 7ffdf582c0e0 9 API calls 80860->80862 80861->80847 80862->80861 80863->80850 80864->80855

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 550 7ffdf582c0e0-7ffdf582c129 551 7ffdf582c12e-7ffdf582c1ab 550->551 552 7ffdf582c1ad-7ffdf582c1bc call 7ffdf59358b0 551->552 553 7ffdf582c1d2-7ffdf582c1e0 call 7ffdf5936e90 551->553 558 7ffdf582c82d-7ffdf582c850 call 7ffdf593fad0 552->558 559 7ffdf582c1c2-7ffdf582c1cd 552->559 560 7ffdf582c1e6-7ffdf582c208 553->560 561 7ffdf582c7ab-7ffdf582c7ae 553->561 559->553 562 7ffdf582c210-7ffdf582c22c 560->562 564 7ffdf582c7b0-7ffdf582c7b7 561->564 565 7ffdf582c828 561->565 573 7ffdf582c22e-7ffdf582c241 562->573 574 7ffdf582c277-7ffdf582c281 562->574 567 7ffdf582c818-7ffdf582c81f 564->567 568 7ffdf582c7b9-7ffdf582c7c3 564->568 565->558 569 7ffdf582c822 567->569 571 7ffdf582c7d2-7ffdf582c80d 568->571 572 7ffdf582c7c5 568->572 569->565 571->565 586 7ffdf582c80f-7ffdf582c816 571->586 572->571 577 7ffdf582c28b-7ffdf582c2a3 573->577 585 7ffdf582c243-7ffdf582c249 573->585 576 7ffdf582c283-7ffdf582c285 574->576 574->577 576->577 578 7ffdf582c4bd-7ffdf582c4c8 call 7ffdf5826c40 576->578 579 7ffdf582c2a5-7ffdf582c2aa 577->579 580 7ffdf582c2ac-7ffdf582c2b4 577->580 595 7ffdf582c4ce-7ffdf582c4d5 578->595 596 7ffdf582c554-7ffdf582c559 578->596 583 7ffdf582c2b7-7ffdf582c2cd 579->583 580->583 587 7ffdf582c2d0-7ffdf582c303 CreateFileW 583->587 589 7ffdf582c251-7ffdf582c254 585->589 590 7ffdf582c24b-7ffdf582c24f 585->590 586->569 593 7ffdf582c3be 587->593 594 7ffdf582c309-7ffdf582c30b 587->594 591 7ffdf582c25d-7ffdf582c275 589->591 592 7ffdf582c256-7ffdf582c25b 589->592 590->589 590->591 591->562 592->577 592->591 597 7ffdf582c3c2-7ffdf582c3c5 593->597 598 7ffdf582c30d-7ffdf582c31f 594->598 599 7ffdf582c361-7ffdf582c375 594->599 600 7ffdf582c544-7ffdf582c54b 595->600 601 7ffdf582c4d7-7ffdf582c4e1 595->601 596->558 603 7ffdf582c3c7-7ffdf582c3f0 call 7ffdf5835660 597->603 604 7ffdf582c3f5-7ffdf582c3f9 597->604 605 7ffdf582c321 598->605 606 7ffdf582c327-7ffdf582c34b call 7ffdf58300b0 598->606 619 7ffdf582c377-7ffdf582c37d 599->619 620 7ffdf582c3ba-7ffdf582c3bc 599->620 600->596 607 7ffdf582c4f0-7ffdf582c52b 601->607 608 7ffdf582c4e3 601->608 603->604 611 7ffdf582c3ff-7ffdf582c40f call 7ffdf5826c40 604->611 612 7ffdf582c595-7ffdf582c5a3 604->612 605->606 621 7ffdf582c34d 606->621 622 7ffdf582c353-7ffdf582c355 606->622 607->596 637 7ffdf582c52d-7ffdf582c53f 607->637 608->607 631 7ffdf582c411-7ffdf582c418 611->631 632 7ffdf582c489-7ffdf582c48e 611->632 615 7ffdf582c5b3-7ffdf582c5cc call 7ffdf5826c40 612->615 616 7ffdf582c5a5-7ffdf582c5b1 612->616 635 7ffdf582c5ce-7ffdf582c5d5 615->635 636 7ffdf582c646-7ffdf582c649 615->636 616->615 625 7ffdf582c38f-7ffdf582c392 619->625 626 7ffdf582c37f-7ffdf582c38d 619->626 620->597 621->622 627 7ffdf582c35d 622->627 628 7ffdf582c357-7ffdf582c35b 622->628 633 7ffdf582c39b-7ffdf582c3b5 625->633 634 7ffdf582c394-7ffdf582c399 625->634 626->625 626->633 627->599 628->593 628->627 640 7ffdf582c479-7ffdf582c480 631->640 641 7ffdf582c41a-7ffdf582c424 631->641 638 7ffdf582c55e-7ffdf582c590 call 7ffdf5935fe0 call 7ffdf58bf060 632->638 639 7ffdf582c494-7ffdf582c499 632->639 633->587 634->620 634->633 646 7ffdf582c5d7-7ffdf582c5e1 635->646 647 7ffdf582c636-7ffdf582c63d 635->647 643 7ffdf582c650 636->643 644 7ffdf582c64b-7ffdf582c64e 636->644 637->558 638->558 639->638 648 7ffdf582c49f-7ffdf582c4b8 639->648 645 7ffdf582c483 640->645 649 7ffdf582c433-7ffdf582c46e 641->649 650 7ffdf582c426 641->650 653 7ffdf582c657-7ffdf582c66c 643->653 644->653 645->632 654 7ffdf582c5f0-7ffdf582c62b 646->654 655 7ffdf582c5e3 646->655 652 7ffdf582c640 647->652 648->551 649->632 669 7ffdf582c470-7ffdf582c477 649->669 650->649 652->636 659 7ffdf582c66e 653->659 660 7ffdf582c672-7ffdf582c67a 653->660 654->636 674 7ffdf582c62d-7ffdf582c634 654->674 655->654 659->660 663 7ffdf582c780-7ffdf582c7a6 660->663 664 7ffdf582c680-7ffdf582c688 660->664 663->558 667 7ffdf582c68e 664->667 668 7ffdf582c77c 664->668 670 7ffdf582c690-7ffdf582c694 667->670 668->663 669->645 672 7ffdf582c6a8-7ffdf582c6ab 670->672 673 7ffdf582c696-7ffdf582c69a 670->673 672->670 673->672 675 7ffdf582c69c-7ffdf582c6a0 673->675 674->652 675->672 676 7ffdf582c6a2-7ffdf582c6a6 675->676 676->672 677 7ffdf582c6ad 676->677 678 7ffdf582c6b4-7ffdf582c6bb 677->678 678->678 679 7ffdf582c6bd-7ffdf582c6cd 678->679 679->668 680 7ffdf582c6d3-7ffdf582c6da 679->680 681 7ffdf582c6e0-7ffdf582c6e7 680->681 682 7ffdf582c6f0-7ffdf582c6fc 681->682 683 7ffdf582c6fe-7ffdf582c702 682->683 684 7ffdf582c709-7ffdf582c70c 682->684 683->682 685 7ffdf582c704-7ffdf582c707 683->685 686 7ffdf582c710 684->686 685->686 687 7ffdf582c717-7ffdf582c71e 686->687 687->687 688 7ffdf582c720-7ffdf582c72f 687->688 689 7ffdf582c75e-7ffdf582c761 688->689 690 7ffdf582c731-7ffdf582c734 688->690 689->668 691 7ffdf582c763-7ffdf582c77a call 7ffdf5897530 689->691 692 7ffdf582c736-7ffdf582c739 690->692 693 7ffdf582c73b 690->693 691->663 691->668 695 7ffdf582c750-7ffdf582c75a 692->695 696 7ffdf582c742-7ffdf582c749 693->696 695->681 698 7ffdf582c75c 695->698 696->696 697 7ffdf582c74b 696->697 697->695 698->668
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: CreateFile
    • String ID: delayed %dms for lock/sharing conflict at line %d$psow$winOpen
    • API String ID: 823142352-1266388144
    • Opcode ID: 294564a8028a632a24dace648262c53082131fb7504090ab2508b3d506ebc7ad
    • Instruction ID: ed0f38f8a5da3893da61e958ad3e69455ebeea8f7f575b5ed6017c222e999675
    • Opcode Fuzzy Hash: 294564a8028a632a24dace648262c53082131fb7504090ab2508b3d506ebc7ad
    • Instruction Fuzzy Hash: FC226C22B18B4A96FB588B15E864B396BA0FF45F94F44A236DD6D037E8DF3CE4448740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1954 7ffdf59235e0-7ffdf5923615 GetSystemInfo call 7ffdf5923190 1956 7ffdf592361a-7ffdf592361c 1954->1956 1957 7ffdf5923622-7ffdf5923628 1956->1957 1958 7ffdf59236ca-7ffdf59236d1 call 7ffdf5923190 1956->1958 1959 7ffdf592362e-7ffdf5923646 1957->1959 1960 7ffdf592362a-7ffdf592362c 1957->1960 1965 7ffdf59236d7-7ffdf59236dd 1958->1965 1966 7ffdf592379c-7ffdf59237a3 call 7ffdf5923190 1958->1966 1962 7ffdf5923658-7ffdf5923669 1959->1962 1972 7ffdf5923648-7ffdf592364b 1959->1972 1960->1962 1967 7ffdf5923674-7ffdf5923677 1962->1967 1968 7ffdf592366b-7ffdf5923672 1962->1968 1973 7ffdf59236df-7ffdf59236e1 1965->1973 1974 7ffdf59236e3-7ffdf59236fb 1965->1974 1981 7ffdf592386e-7ffdf5923875 call 7ffdf5923190 1966->1981 1982 7ffdf59237a9-7ffdf59237af 1966->1982 1969 7ffdf59236a7-7ffdf59236b8 1967->1969 1970 7ffdf5923679-7ffdf5923683 1967->1970 1968->1969 1969->1958 1978 7ffdf59236ba-7ffdf59236c1 1969->1978 1975 7ffdf5923696-7ffdf592369a 1970->1975 1976 7ffdf5923685-7ffdf5923688 1970->1976 1972->1962 1979 7ffdf592370d-7ffdf592371e 1973->1979 1974->1979 1987 7ffdf59236fd-7ffdf5923700 1974->1987 1975->1969 1985 7ffdf592369c-7ffdf59236a3 1975->1985 1976->1975 1980 7ffdf592368a-7ffdf5923694 1976->1980 1978->1958 1983 7ffdf5923730-7ffdf5923733 1979->1983 1984 7ffdf5923720-7ffdf592372e 1979->1984 1980->1975 1980->1976 2005 7ffdf5923940-7ffdf592394c 1981->2005 2006 7ffdf592387b-7ffdf5923881 1981->2006 1988 7ffdf59237b1-7ffdf59237b3 1982->1988 1989 7ffdf59237b5-7ffdf59237cd 1982->1989 1991 7ffdf5923735-7ffdf592373f 1983->1991 1992 7ffdf5923779-7ffdf5923780 1983->1992 1990 7ffdf5923763-7ffdf5923766 1984->1990 1985->1969 1987->1979 1994 7ffdf59237df-7ffdf59237f0 1988->1994 1989->1994 2010 7ffdf59237cf-7ffdf59237d2 1989->2010 1990->1992 1998 7ffdf5923768-7ffdf5923777 1990->1998 1995 7ffdf5923752-7ffdf5923756 1991->1995 1996 7ffdf5923741-7ffdf5923744 1991->1996 1999 7ffdf5923787-7ffdf592378a 1992->1999 2003 7ffdf5923802-7ffdf5923805 1994->2003 2004 7ffdf59237f2-7ffdf5923800 1994->2004 1995->1990 2002 7ffdf5923758-7ffdf592375f 1995->2002 1996->1995 2001 7ffdf5923746-7ffdf5923750 1996->2001 1998->1999 1999->1966 2007 7ffdf592378c-7ffdf5923793 1999->2007 2001->1995 2001->1996 2002->1990 2014 7ffdf5923807-7ffdf5923811 2003->2014 2015 7ffdf592384b-7ffdf5923852 2003->2015 2011 7ffdf5923835-7ffdf5923838 2004->2011 2008 7ffdf592394e-7ffdf592395f 2005->2008 2009 7ffdf5923960-7ffdf592397f 2005->2009 2012 7ffdf5923883-7ffdf5923885 2006->2012 2013 7ffdf5923887-7ffdf592389f 2006->2013 2007->1966 2010->1994 2011->2015 2016 7ffdf592383a-7ffdf5923849 2011->2016 2018 7ffdf59238b1-7ffdf59238c2 2012->2018 2013->2018 2028 7ffdf59238a1-7ffdf59238a4 2013->2028 2019 7ffdf5923824-7ffdf5923828 2014->2019 2020 7ffdf5923813-7ffdf5923816 2014->2020 2017 7ffdf5923859-7ffdf592385c 2015->2017 2016->2017 2017->1981 2025 7ffdf592385e-7ffdf5923865 2017->2025 2022 7ffdf59238d4-7ffdf59238d7 2018->2022 2023 7ffdf59238c4-7ffdf59238d2 2018->2023 2019->2011 2021 7ffdf592382a-7ffdf5923831 2019->2021 2020->2019 2027 7ffdf5923818-7ffdf5923822 2020->2027 2021->2011 2030 7ffdf592391d-7ffdf5923924 2022->2030 2031 7ffdf59238d9-7ffdf59238e3 2022->2031 2029 7ffdf5923907-7ffdf592390a 2023->2029 2025->1981 2027->2019 2027->2020 2028->2018 2029->2030 2034 7ffdf592390c-7ffdf592391b 2029->2034 2035 7ffdf592392b-7ffdf592392e 2030->2035 2032 7ffdf59238f6-7ffdf59238fa 2031->2032 2033 7ffdf59238e5-7ffdf59238e8 2031->2033 2032->2029 2037 7ffdf59238fc-7ffdf5923903 2032->2037 2033->2032 2036 7ffdf59238ea-7ffdf59238f4 2033->2036 2034->2035 2035->2005 2038 7ffdf5923930-7ffdf5923937 2035->2038 2036->2032 2036->2033 2037->2029 2038->2005
    APIs
    • GetSystemInfo.KERNEL32(?,?,?,?,00007FFDF5923421,?,?,?,?,00007FFDF58113AB), ref: 00007FFDF592360F
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 4f7a0fa851ad468300c0820e9a2cf3c48b89bc06903d9b8e6c916a86d47308c0
    • Instruction ID: de30f8b15001e14f37c810d7a3bf8b8d107bd50d43dabf6201f53475427ed053
    • Opcode Fuzzy Hash: 4f7a0fa851ad468300c0820e9a2cf3c48b89bc06903d9b8e6c916a86d47308c0
    • Instruction Fuzzy Hash: 34B1D065B0AB4F81FF5D8B55B870B3422A4BF45F84F5459BACD2D0A7E8EF2CE5818240

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: FileWrite
    • String ID: delayed %dms for lock/sharing conflict at line %d$winWrite1$winWrite2
    • API String ID: 3934441357-1808655853
    • Opcode ID: 50579209e13c0d188a9c80e9b678b0d7a88b1b9ad0d8ca593215720cc074c618
    • Instruction ID: abd39927918ef054f8c1ea394119215c746b227d890b8e06f06748f21a44da1f
    • Opcode Fuzzy Hash: 50579209e13c0d188a9c80e9b678b0d7a88b1b9ad0d8ca593215720cc074c618
    • Instruction Fuzzy Hash: 10419075B1874A82E7288B16E460F697BA5FB85F40F549136DEAC83BD8DF3CE8418710

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: File$AttributesDelete
    • String ID: delayed %dms for lock/sharing conflict at line %d$winDelete
    • API String ID: 2910425767-1405699761
    • Opcode ID: 999d1ba121ec2a82a5c60d5c34dcdcc3620227e88c38499f7fbdbc7c6c03f416
    • Instruction ID: 2862c8493a8016b93c6133bdba7a7265a5b83c7f2394b809a750067a9aca5183
    • Opcode Fuzzy Hash: 999d1ba121ec2a82a5c60d5c34dcdcc3620227e88c38499f7fbdbc7c6c03f416
    • Instruction Fuzzy Hash: 3E417C21B1870B82F7188B19F860A786BA1AF44F94F445632DD7D837E9DF2CE9458640

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1093 7ffdf5827550-7ffdf582757b 1094 7ffdf582757d-7ffdf5827592 1093->1094 1095 7ffdf58275cb-7ffdf58275f8 1093->1095 1096 7ffdf58275b4-7ffdf58275c8 call 7ffdf5940c30 1094->1096 1097 7ffdf5827594 call 7ffdf5940c30 1094->1097 1098 7ffdf5827600-7ffdf582762b ReadFile 1095->1098 1096->1095 1103 7ffdf5827599 1097->1103 1101 7ffdf5827631-7ffdf5827641 1098->1101 1102 7ffdf58276b8-7ffdf58276ba 1098->1102 1101->1102 1112 7ffdf5827643-7ffdf5827656 1101->1112 1105 7ffdf58276e8-7ffdf58276f1 1102->1105 1106 7ffdf58276bc-7ffdf58276e3 call 7ffdf5835660 1102->1106 1108 7ffdf582759b-7ffdf58275b3 1103->1108 1105->1103 1107 7ffdf58276f7-7ffdf582770c call 7ffdf5941040 1105->1107 1106->1105 1107->1108 1115 7ffdf5827690-7ffdf58276b3 call 7ffdf5935fe0 1112->1115 1116 7ffdf5827658-7ffdf582765e 1112->1116 1115->1108 1117 7ffdf5827660-7ffdf5827664 1116->1117 1118 7ffdf5827666-7ffdf5827669 1116->1118 1117->1118 1120 7ffdf5827672-7ffdf582768b 1117->1120 1118->1120 1121 7ffdf582766b-7ffdf5827670 1118->1121 1120->1098 1121->1115 1121->1120
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: FileRead
    • String ID: delayed %dms for lock/sharing conflict at line %d$winRead
    • API String ID: 2738559852-1843600136
    • Opcode ID: 54959c592f9b776378a38fea204404d265fd1426f5fd2a84a2b2b3749b4f4957
    • Instruction ID: e19bd9f6c864c6085c3068329823ac23f156dfdac113a5ef6c78e2886fb3c9c6
    • Opcode Fuzzy Hash: 54959c592f9b776378a38fea204404d265fd1426f5fd2a84a2b2b3749b4f4957
    • Instruction Fuzzy Hash: 3F41E532B18B0A86E7149F16E464EA9BBA5FB45F80F445136DE6D83BD8CF3CE5418780
    APIs
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID:
    • API String ID: 1239891234-0
    • Opcode ID: e0829758c8acea8a88bb22142360789a48b9e3a09f4b65a80001d06f088d6958
    • Instruction ID: 471be2a22f0b56728d427b55b10950e0a245c522ed13b5be9cc9315fe5d66f1d
    • Opcode Fuzzy Hash: e0829758c8acea8a88bb22142360789a48b9e3a09f4b65a80001d06f088d6958
    • Instruction Fuzzy Hash: 19318136708F8586DB248B24E8507AE73A0FB88B54F504136EA9D43B9DDF3CC645CB00
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7b09fb8bc32717e68df346f831d48fb96644a2980a655d8ed8fcf2c81cfa48b0
    • Instruction ID: 7b0872fbed60f490810981b13608696ddf2fbaa4661be654a1c984df7cea9631
    • Opcode Fuzzy Hash: 7b09fb8bc32717e68df346f831d48fb96644a2980a655d8ed8fcf2c81cfa48b0
    • Instruction Fuzzy Hash:
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: new[]
    • String ID: %s%c%s$:$:$?$\$winFullPathname1$winFullPathname2
    • API String ID: 4059295235-3840279414
    • Opcode ID: ada1d5f0f810558d137832d9d17ccea550533cbd4bee4c5a2ffc3a0b827115f0
    • Instruction ID: fb8092b4f830f3088b5b8ddb5b77a018eb680d2fd7e59e06930ea1ac5e01fde7
    • Opcode Fuzzy Hash: ada1d5f0f810558d137832d9d17ccea550533cbd4bee4c5a2ffc3a0b827115f0
    • Instruction Fuzzy Hash: B551AF21F1CA8A82FB199B61A434F792795AF44F88F484032DD6D477EADF6CE4858701
    APIs
    • try_get_function.LIBVCRUNTIME ref: 00007FFDF5946235
    • TlsSetValue.KERNEL32(?,?,00000000,00007FFDF5945CBA,?,?,00000000,00007FFDF59447ED,?,?,?,?,00007FFDF5941C37), ref: 00007FFDF594624C
    Strings
    Memory Dump Source
    • Source File: 00000021.00000002.3611379284.00007FFDF5811000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDF5810000, based on PE: true
    • Associated: 00000021.00000002.3611344179.00007FFDF5810000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612030322.00007FFDF594E000.00000002.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612185498.00007FFDF597D000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612258312.00007FFDF5980000.00000008.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612311932.00007FFDF5981000.00000004.00000001.01000000.0000000D.sdmpDownload File
    • Associated: 00000021.00000002.3612350548.00007FFDF5984000.00000002.00000001.01000000.0000000D.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_33_2_7ffdf5810000_Service.jbxd
    Similarity
    • API ID: Valuetry_get_function
    • String ID: FlsSetValue
    • API String ID: 738293619-3750699315
    • Opcode ID: 6c623e2a00096b0839e064d8c69010e4eef44c071450a3cda0d12956c4a57d8a
    • Instruction ID: 5ef60e56cae01d2c7811df4e1c190b14263920eb96f1e3208c6765eaf51a3b95
    • Opcode Fuzzy Hash: 6c623e2a00096b0839e064d8c69010e4eef44c071450a3cda0d12956c4a57d8a
    • Instruction Fuzzy Hash: 06E06565B0864A92FF1D9B50E424EB52222AF48F80F489136D53D466DCCF3CEE49C301

    Execution Graph

    Execution Coverage:7.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:1.2%
    Total number of Nodes:764
    Total number of Limit Nodes:21
    execution_graph 2057 7ff694616e6b 2058 7ff694616e7a _exit 2057->2058 2059 7ff694616e83 2057->2059 2058->2059 2060 7ff694616e98 2059->2060 2061 7ff694616e8c _cexit 2059->2061 2061->2060 2080 7ff6946149b0 2081 7ff694614a1f 2080->2081 2082 7ff6946149c5 2080->2082 2082->2081 2083 7ff694611a20 34 API calls 2082->2083 2084 7ff6946149fb 2083->2084 2084->2081 2085 7ff694614a0a 2084->2085 2086 7ff694614a21 2084->2086 2087 7ff694611094 4 API calls 2085->2087 2088 7ff694611094 4 API calls 2086->2088 2087->2081 2088->2081 1953 7ff694616cf0 1954 7ff694616d14 1953->1954 1955 7ff694616d26 1954->1955 1956 7ff694616d2f Sleep 1954->1956 1957 7ff694616d4b _amsg_exit 1955->1957 1959 7ff694616d57 1955->1959 1956->1954 1957->1959 1958 7ff694616dc6 _initterm 1961 7ff694616de3 _IsNonwritableInCurrentImage 1958->1961 1959->1958 1960 7ff694616dac 1959->1960 1959->1961 1967 7ff694611fd0 wcsrchr 1961->1967 1964 7ff694616e4c exit 1965 7ff694616e54 1964->1965 1965->1960 1966 7ff694616e5d _cexit 1965->1966 1966->1960 1968 7ff694612028 CharNextW 1967->1968 1970 7ff694612022 1967->1970 1968->1970 1969 7ff694612139 2002 7ff694611094 FormatMessageW 1969->2002 1970->1969 1971 7ff6946120de CharNextW 1970->1971 1972 7ff6946120f0 1970->1972 1971->1972 1972->1969 1973 7ff694612105 _wcsicmp 1972->1973 1975 7ff694612171 1972->1975 1973->1972 1984 7ff6946159f0 1975->1984 1977 7ff6946121f8 1978 7ff6946121ff 1977->1978 1982 7ff694612153 1977->1982 2009 7ff6946111c4 GetCurrentProcess OpenProcessToken 1978->2009 1980 7ff6946121c4 1981 7ff694611094 4 API calls 1980->1981 1981->1982 1982->1964 1982->1965 1985 7ff694615a2e 1984->1985 1999 7ff694615b1a 1984->1999 1986 7ff694615a37 LoadStringW 1985->1986 1985->1999 1988 7ff694615a5a LoadStringW 1986->1988 1986->1999 1990 7ff694615a80 LoadStringW 1988->1990 1988->1999 1991 7ff694615aa8 1990->1991 1990->1999 2016 7ff694611a20 1991->2016 1994 7ff694615b08 1998 7ff694611094 4 API calls 1994->1998 1995 7ff694615b1c 1996 7ff694615b3c 1995->1996 1997 7ff694615b23 1995->1997 2001 7ff694611094 4 API calls 1996->2001 2000 7ff694611094 4 API calls 1997->2000 1998->1999 2043 7ff694616ef0 1999->2043 2000->1999 2001->1999 2003 7ff69461116d 2002->2003 2006 7ff6946110fe 2002->2006 2003->1982 2004 7ff694611161 LocalFree 2004->2003 2005 7ff694611109 CharPrevW 2005->2006 2006->2004 2006->2005 2007 7ff694611131 fputws 2006->2007 2007->2004 2010 7ff694611270 InitiateSystemShutdownExW 2009->2010 2011 7ff694611200 LookupPrivilegeValueW 2009->2011 2014 7ff694616ef0 7 API calls 2010->2014 2012 7ff694611223 AdjustTokenPrivileges 2011->2012 2013 7ff694611264 CloseHandle 2011->2013 2012->2013 2013->2010 2015 7ff6946112a3 2014->2015 2015->1982 2051 7ff694616b70 2016->2051 2018 7ff694611fa3 2019 7ff694616ef0 7 API calls 2018->2019 2020 7ff694611fb5 2019->2020 2020->1994 2020->1995 2020->1999 2022 7ff694611c25 2024 7ff694611c39 SetupDiCreateDeviceInfoListExW 2022->2024 2025 7ff694611c62 SetupDiGetClassDevsExW 2022->2025 2023 7ff694611ae0 SetupDiClassGuidsFromNameExW 2026 7ff694611b0d GetLastError 2023->2026 2027 7ff694611b22 2023->2027 2035 7ff694611ca8 2024->2035 2025->2035 2026->2027 2028 7ff694611b2c 2026->2028 2027->2022 2027->2028 2029 7ff694611ba3 CharNextW 2027->2029 2030 7ff694611bc7 CharNextW 2027->2030 2031 7ff694611bda wcschr 2027->2031 2028->2018 2034 7ff694611f94 SetupDiDestroyDeviceInfoList 2028->2034 2029->2027 2030->2027 2031->2027 2032 7ff694611d07 SetupDiGetDeviceInfoListDetailW 2032->2028 2033 7ff694611d2b SetupDiEnumDeviceInfo 2032->2033 2033->2028 2041 7ff694611d6b 2033->2041 2034->2018 2035->2028 2035->2032 2036 7ff694611cdb SetupDiOpenDeviceInfoW 2035->2036 2037 7ff694611d02 2035->2037 2036->2035 2037->2032 2038 7ff694611f3d SetupDiEnumDeviceInfo 2038->2028 2038->2041 2039 7ff694611da1 CM_Get_Device_ID_ExW 2039->2041 2040 7ff6946115e8 GetLastError SetupDiGetDeviceRegistryPropertyW malloc 2040->2041 2041->2028 2041->2038 2041->2039 2041->2040 2042 7ff69461182c 11 API calls 2041->2042 2042->2041 2044 7ff694616ef9 2043->2044 2045 7ff694616f50 RtlCaptureContext RtlLookupFunctionEntry 2044->2045 2046 7ff6946121b7 2044->2046 2047 7ff694616fd7 2045->2047 2048 7ff694616f95 RtlVirtualUnwind 2045->2048 2046->1977 2046->1980 2046->1982 2055 7ff694616f14 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2047->2055 2048->2047 2052 7ff694616b8e malloc 2051->2052 2053 7ff694611aab 2052->2053 2054 7ff694616b7f 2052->2054 2053->2018 2053->2023 2053->2027 2054->2052 2054->2053 2506 7ff6946170f0 2507 7ff6946170ff 2506->2507 2508 7ff694617122 2506->2508 2507->2508 2509 7ff69461711b ?terminate@ 2507->2509 2509->2508 2089 7ff694614530 2090 7ff69461455e 2089->2090 2091 7ff694614554 2089->2091 2124 7ff694612214 SetupDiGetDeviceInfoListDetailW 2090->2124 2117 7ff694612300 2091->2117 2094 7ff694614559 2096 7ff6946145c7 2097 7ff6946145e1 2096->2097 2143 7ff694612370 2096->2143 2101 7ff6946145f3 2097->2101 2155 7ff694612454 SetupDiGetDeviceInfoListDetailW 2097->2155 2100 7ff694614585 2103 7ff6946112b0 3 API calls 2100->2103 2107 7ff69461459b 2100->2107 2109 7ff694614605 2101->2109 2185 7ff6946127f8 SetupDiGetDeviceInfoListDetailW 2101->2185 2103->2107 2107->2096 2139 7ff694611184 2107->2139 2108 7ff6946145ad 2115 7ff694611094 4 API calls 2108->2115 2110 7ff694614617 2109->2110 2206 7ff694612e8c memset 2109->2206 2113 7ff694614629 2110->2113 2235 7ff69461377c SetupDiGetDeviceInfoListDetailW 2110->2235 2112 7ff69461463b 2112->2094 2309 7ff6946132c4 2112->2309 2113->2112 2288 7ff6946131d0 2113->2288 2115->2096 2118 7ff6946112b0 3 API calls 2117->2118 2119 7ff694612320 2118->2119 2120 7ff694612336 2119->2120 2121 7ff6946112b0 3 API calls 2119->2121 2122 7ff694612214 11 API calls 2120->2122 2121->2120 2123 7ff694612347 2122->2123 2123->2094 2125 7ff694612287 2124->2125 2126 7ff694612259 CM_Get_Device_ID_ExW 2124->2126 2127 7ff6946122c7 wprintf 2125->2127 2128 7ff6946122af wprintf 2125->2128 2126->2125 2129 7ff6946122da 2127->2129 2128->2129 2130 7ff694616ef0 7 API calls 2129->2130 2131 7ff6946122ec 2130->2131 2131->2094 2131->2096 2132 7ff6946112b0 2131->2132 2133 7ff694616b70 malloc 2132->2133 2137 7ff6946112db 2133->2137 2134 7ff694611372 SetupDiGetDeviceRegistryPropertyW 2135 7ff694611304 GetLastError 2134->2135 2136 7ff6946112e6 2134->2136 2135->2136 2135->2137 2136->2100 2137->2134 2137->2136 2138 7ff694616b70 malloc 2137->2138 2138->2137 2140 7ff694611188 2139->2140 2142 7ff6946111b5 2139->2142 2141 7ff694611199 fputs 2140->2141 2141->2140 2141->2142 2142->2108 2144 7ff694611184 fputs 2143->2144 2145 7ff694612394 2144->2145 2146 7ff6946112b0 3 API calls 2145->2146 2147 7ff6946123a5 2146->2147 2148 7ff6946112b0 3 API calls 2147->2148 2149 7ff6946123b9 2148->2149 2150 7ff6946123dd 2149->2150 2151 7ff6946123c6 2149->2151 2152 7ff694611094 4 API calls 2150->2152 2153 7ff694611094 4 API calls 2151->2153 2154 7ff6946123db 2152->2154 2153->2154 2154->2097 2156 7ff6946124af CM_Get_DevNode_Status_Ex 2155->2156 2157 7ff6946125d0 2155->2157 2159 7ff6946124da 2156->2159 2160 7ff69461250f 2156->2160 2158 7ff694611184 fputs 2157->2158 2162 7ff6946125dc 2158->2162 2159->2157 2163 7ff6946124e8 2159->2163 2161 7ff69461253e 2160->2161 2164 7ff694612524 2160->2164 2167 7ff694611184 fputs 2161->2167 2182 7ff694612569 2161->2182 2173 7ff694611094 4 API calls 2162->2173 2165 7ff694611184 fputs 2163->2165 2166 7ff694611184 fputs 2164->2166 2170 7ff6946124f4 2165->2170 2166->2170 2168 7ff694612550 2167->2168 2178 7ff694611094 4 API calls 2168->2178 2169 7ff694611184 fputs 2180 7ff69461257c 2169->2180 2179 7ff694611094 4 API calls 2170->2179 2171 7ff694612598 2175 7ff694611184 fputs 2171->2175 2172 7ff6946125b0 2174 7ff694612508 2172->2174 2176 7ff694611184 fputs 2172->2176 2173->2174 2177 7ff694616ef0 7 API calls 2174->2177 2175->2170 2176->2170 2181 7ff694612601 2177->2181 2178->2182 2179->2174 2183 7ff694611094 4 API calls 2180->2183 2181->2101 2182->2169 2184 7ff694612590 2182->2184 2183->2184 2184->2171 2184->2172 2186 7ff694612852 CM_Get_DevNode_Status_Ex 2185->2186 2205 7ff694612934 2185->2205 2187 7ff694612881 2186->2187 2186->2205 2188 7ff69461288b CM_Get_First_Log_Conf_Ex 2187->2188 2189 7ff6946128b0 CM_Get_First_Log_Conf_Ex 2187->2189 2188->2189 2191 7ff69461293b 2188->2191 2189->2191 2192 7ff6946128d3 2189->2192 2190 7ff694616ef0 7 API calls 2193 7ff69461299a 2190->2193 2195 7ff694611184 fputs 2191->2195 2194 7ff6946128e4 CM_Get_First_Log_Conf_Ex 2192->2194 2196 7ff694612907 2192->2196 2193->2109 2194->2191 2194->2196 2197 7ff694612945 2195->2197 2198 7ff694611184 fputs 2196->2198 2199 7ff694611094 4 API calls 2197->2199 2201 7ff694612911 2198->2201 2200 7ff694612967 2199->2200 2342 7ff694612620 CM_Get_Next_Res_Des_Ex 2200->2342 2203 7ff694611094 4 API calls 2201->2203 2203->2205 2205->2190 2355 7ff694612a04 2206->2355 2209 7ff694612f27 SetupDiGetDriverInfoDetailW 2211 7ff694612f79 2209->2211 2212 7ff694612f64 GetLastError 2209->2212 2210 7ff694612f02 2213 7ff694611184 fputs 2210->2213 2214 7ff6946130f5 SetupDiDestroyDriverInfoList 2211->2214 2218 7ff694612f95 SetupDiSetSelectedDriverW 2211->2218 2212->2211 2212->2214 2215 7ff694612f0c 2213->2215 2216 7ff69461311f 2214->2216 2217 7ff694613110 SetupCloseFileQueue 2214->2217 2223 7ff694611094 4 API calls 2215->2223 2219 7ff694612f20 2216->2219 2221 7ff694611184 fputs 2216->2221 2217->2216 2218->2214 2220 7ff694612fb6 SetupOpenFileQueue 2218->2220 2225 7ff694616ef0 7 API calls 2219->2225 2220->2214 2222 7ff694612fcf memset SetupDiGetDeviceInstallParamsW 2220->2222 2228 7ff69461312a 2221->2228 2222->2214 2224 7ff694613008 SetupDiSetDeviceInstallParamsW 2222->2224 2223->2219 2224->2214 2226 7ff694613031 SetupDiCallClassInstaller 2224->2226 2227 7ff69461314f 2225->2227 2226->2214 2229 7ff694613050 SetupScanFileQueueW 2226->2229 2227->2110 2230 7ff694611094 4 API calls 2228->2230 2231 7ff694611184 fputs 2229->2231 2230->2219 2232 7ff694613092 2231->2232 2233 7ff694611094 4 API calls 2232->2233 2234 7ff6946130c7 SetupScanFileQueueW 2233->2234 2234->2214 2236 7ff6946137d1 SetupDiOpenClassRegKeyExW 2235->2236 2275 7ff6946139db 2235->2275 2237 7ff694613858 2236->2237 2238 7ff694613814 2236->2238 2398 7ff6946115e8 2237->2398 2384 7ff694611720 2238->2384 2239 7ff694616ef0 7 API calls 2242 7ff6946139f6 2239->2242 2242->2113 2243 7ff694613871 2245 7ff6946138a6 2243->2245 2249 7ff694611184 fputs 2243->2249 2244 7ff694613823 2244->2237 2247 7ff694611184 fputs 2244->2247 2246 7ff6946112b0 3 API calls 2245->2246 2248 7ff6946138bf 2246->2248 2250 7ff694613838 2247->2250 2251 7ff694611184 fputs 2248->2251 2252 7ff694613886 2249->2252 2255 7ff694611094 4 API calls 2250->2255 2253 7ff6946138ca 2251->2253 2254 7ff694611094 4 API calls 2252->2254 2258 7ff694611094 4 API calls 2253->2258 2256 7ff69461389b 2254->2256 2257 7ff69461384d 2255->2257 2259 7ff694613174 2 API calls 2256->2259 2393 7ff694613174 2257->2393 2261 7ff6946138df 2258->2261 2259->2245 2262 7ff69461390a 2261->2262 2263 7ff6946138ea 2261->2263 2264 7ff694611184 fputs 2262->2264 2265 7ff694611184 fputs 2263->2265 2266 7ff694613912 2264->2266 2267 7ff6946138f2 wprintf 2265->2267 2269 7ff694611094 4 API calls 2266->2269 2268 7ff694613927 2267->2268 2270 7ff694613995 2268->2270 2272 7ff694611720 3 API calls 2268->2272 2269->2268 2271 7ff6946115e8 3 API calls 2270->2271 2274 7ff6946139a6 2271->2274 2273 7ff694613949 2272->2273 2276 7ff694613986 RegCloseKey 2273->2276 2277 7ff69461397e 2273->2277 2279 7ff694611184 fputs 2273->2279 2274->2275 2278 7ff694611184 fputs 2274->2278 2275->2239 2276->2270 2277->2276 2280 7ff6946139bb 2278->2280 2281 7ff69461395e 2279->2281 2282 7ff694611094 4 API calls 2280->2282 2283 7ff694611094 4 API calls 2281->2283 2284 7ff6946139d0 2282->2284 2285 7ff694613973 2283->2285 2286 7ff694613174 2 API calls 2284->2286 2287 7ff694613174 2 API calls 2285->2287 2286->2275 2287->2277 2289 7ff6946115e8 3 API calls 2288->2289 2290 7ff6946131f7 2289->2290 2291 7ff6946115e8 3 API calls 2290->2291 2292 7ff694613209 2291->2292 2293 7ff694613240 2292->2293 2295 7ff694611184 fputs 2292->2295 2294 7ff694613275 2293->2294 2297 7ff694611184 fputs 2293->2297 2296 7ff694611184 fputs 2294->2296 2301 7ff694613294 2294->2301 2298 7ff694613221 2295->2298 2299 7ff694613280 2296->2299 2300 7ff694613254 2297->2300 2302 7ff694611094 4 API calls 2298->2302 2304 7ff694611094 4 API calls 2299->2304 2305 7ff694611094 4 API calls 2300->2305 2301->2112 2303 7ff694613235 2302->2303 2306 7ff694613174 2 API calls 2303->2306 2304->2301 2307 7ff694613268 2305->2307 2306->2293 2308 7ff694613174 2 API calls 2307->2308 2308->2294 2411 7ff694617510 2309->2411 2312 7ff694613744 2317 7ff694616ef0 7 API calls 2312->2317 2313 7ff69461335a SetupDiSetDeviceInstallParamsW 2313->2312 2314 7ff69461337f SetupDiBuildDriverInfoList 2313->2314 2315 7ff694613729 2314->2315 2316 7ff6946133a3 SetupDiEnumDriverInfoW 2314->2316 2318 7ff694611184 fputs 2315->2318 2319 7ff69461370f SetupDiDestroyDriverInfoList 2316->2319 2340 7ff6946133d5 2316->2340 2320 7ff69461375a 2317->2320 2321 7ff694613730 2318->2321 2319->2312 2319->2315 2320->2094 2322 7ff694611094 4 API calls 2321->2322 2322->2312 2323 7ff694611094 4 API calls 2324 7ff6946133ef SetupDiGetDriverInfoDetailW 2323->2324 2325 7ff69461342b GetLastError 2324->2325 2328 7ff69461343c 2324->2328 2325->2328 2326 7ff694611184 fputs 2326->2328 2327 7ff694611094 FormatMessageW CharPrevW fputws LocalFree 2327->2328 2328->2326 2328->2327 2329 7ff694611094 4 API calls 2328->2329 2330 7ff6946134e6 FileTimeToSystemTime 2329->2330 2331 7ff694613502 GetDateFormatW 2330->2331 2333 7ff694613535 2330->2333 2331->2333 2332 7ff694611184 fputs 2332->2333 2333->2332 2334 7ff694611094 4 API calls 2333->2334 2335 7ff694611094 4 API calls 2333->2335 2336 7ff6946135a0 SetupDiGetDriverInstallParamsW 2334->2336 2335->2333 2337 7ff6946136d4 SetupDiEnumDriverInfoW 2336->2337 2336->2340 2337->2319 2337->2340 2338 7ff694611184 fputs 2338->2340 2339 7ff694611094 FormatMessageW CharPrevW fputws LocalFree 2339->2340 2340->2323 2340->2337 2340->2338 2340->2339 2341 7ff694611094 4 API calls 2340->2341 2341->2337 2343 7ff694612679 2342->2343 2344 7ff6946127dc CM_Free_Log_Conf_Handle 2342->2344 2345 7ff69461268d CM_Get_Res_Des_Data_Size_Ex 2343->2345 2346 7ff69461267e CM_Free_Res_Des_Handle 2343->2346 2347 7ff69461279c CM_Get_Next_Res_Des_Ex 2343->2347 2349 7ff694616b70 malloc 2343->2349 2351 7ff6946126c6 CM_Get_Res_Des_Data_Ex 2343->2351 2352 7ff694611184 fputs 2343->2352 2353 7ff69461277b wprintf 2343->2353 2354 7ff694612717 wprintf 2343->2354 2344->2205 2345->2343 2345->2347 2346->2345 2347->2343 2348 7ff6946127c8 2347->2348 2348->2344 2350 7ff6946127cd CM_Free_Res_Des_Handle 2348->2350 2349->2343 2350->2344 2351->2343 2352->2343 2353->2343 2354->2343 2356 7ff694612a26 2355->2356 2357 7ff694612a57 SetupDiGetDeviceInstallParamsW 2356->2357 2358 7ff694612a7e SetupDiSetDeviceInstallParamsW 2357->2358 2383 7ff694612ae6 2357->2383 2359 7ff694612aed SetupDiOpenDevRegKey 2358->2359 2360 7ff694612aad SetupDiBuildDriverInfoList 2358->2360 2361 7ff694612e4a RegCloseKey 2359->2361 2362 7ff694612b24 RegQueryValueExW 2359->2362 2364 7ff694612ac1 SetupDiEnumDriverInfoW 2360->2364 2360->2383 2361->2383 2365 7ff694612e47 2362->2365 2366 7ff694612b65 2362->2366 2363 7ff694616ef0 7 API calls 2367 7ff694612e67 2363->2367 2364->2383 2365->2361 2366->2365 2368 7ff694612b6f RegQueryValueExW 2366->2368 2367->2209 2367->2210 2368->2365 2369 7ff694612bb4 2368->2369 2369->2365 2370 7ff694612bbe RegQueryValueExW 2369->2370 2370->2365 2371 7ff694612bfe 2370->2371 2371->2365 2372 7ff694612c08 RegQueryValueExW RegCloseKey 2371->2372 2373 7ff694612c59 2372->2373 2372->2383 2374 7ff694612c63 SetupDiGetDeviceRegistryPropertyW 2373->2374 2373->2383 2375 7ff694612c9d SetupDiSetDeviceInstallParamsW 2374->2375 2374->2383 2376 7ff694612cc8 SetupDiBuildDriverInfoList 2375->2376 2375->2383 2377 7ff694612ce5 SetupDiEnumDriverInfoW 2376->2377 2376->2383 2378 7ff694612e2a SetupDiDestroyDriverInfoList 2377->2378 2382 7ff694612d0c 2377->2382 2378->2383 2379 7ff694612e03 SetupDiEnumDriverInfoW 2379->2378 2379->2382 2380 7ff694612d69 SetupDiGetDriverInfoDetailW 2381 7ff694612da0 GetLastError 2380->2381 2380->2382 2381->2379 2381->2382 2382->2379 2382->2380 2382->2383 2383->2363 2385 7ff694616b70 malloc 2384->2385 2392 7ff694611742 2385->2392 2386 7ff694611801 2386->2244 2387 7ff6946117b5 RegQueryValueExW 2388 7ff6946117e6 2387->2388 2389 7ff69461175b GetLastError 2387->2389 2407 7ff6946113dc 2388->2407 2389->2386 2389->2392 2391 7ff694616b70 malloc 2391->2392 2392->2386 2392->2387 2392->2391 2394 7ff694613188 2393->2394 2395 7ff6946131b5 2393->2395 2394->2395 2396 7ff694611184 fputs 2394->2396 2395->2237 2397 7ff694613195 wprintf 2396->2397 2397->2394 2397->2395 2399 7ff694616b70 malloc 2398->2399 2405 7ff694611613 2399->2405 2400 7ff6946116ed 2400->2243 2401 7ff6946116a8 SetupDiGetDeviceRegistryPropertyW 2402 7ff694611639 GetLastError 2401->2402 2403 7ff6946116cf 2401->2403 2402->2400 2402->2405 2404 7ff6946113dc malloc 2403->2404 2404->2400 2405->2400 2405->2401 2406 7ff694616b70 malloc 2405->2406 2406->2405 2409 7ff694611403 2407->2409 2408 7ff694616b70 malloc 2410 7ff694611439 2408->2410 2409->2408 2410->2386 2412 7ff6946132e6 memset memset SetupDiGetDeviceInstallParamsW 2411->2412 2412->2312 2412->2313 2413 7ff694615870 SetupDiGetDeviceInfoListDetailW 2414 7ff6946159b9 2413->2414 2415 7ff6946158c2 CM_Get_Device_ID_ExW 2413->2415 2416 7ff694616ef0 7 API calls 2414->2416 2415->2414 2417 7ff6946158f3 SetupDiSetClassInstallParamsW 2415->2417 2418 7ff6946159ca 2416->2418 2419 7ff694615938 SetupDiCallClassInstaller 2417->2419 2422 7ff69461597a wprintf 2417->2422 2421 7ff694615953 SetupDiGetDeviceInstallParamsW 2419->2421 2419->2422 2421->2422 2422->2414 2423 7ff694615770 LoadLibraryW 2424 7ff6946157d1 GetProcAddress 2423->2424 2425 7ff6946157b4 2423->2425 2427 7ff6946157ef FreeLibrary 2424->2427 2428 7ff694615800 2424->2428 2433 7ff6946153a0 2425->2433 2427->2425 2430 7ff6946153a0 16 API calls 2428->2430 2429 7ff6946157cf 2431 7ff694615828 FreeLibrary 2430->2431 2431->2429 2434 7ff6946154fe 2433->2434 2435 7ff6946153ec 2433->2435 2436 7ff694616ef0 7 API calls 2434->2436 2435->2434 2437 7ff694615410 GetFullPathNameW 2435->2437 2438 7ff694615517 2436->2438 2437->2434 2439 7ff694615436 GetFileAttributesW 2437->2439 2438->2429 2439->2434 2440 7ff694615450 LoadLibraryW 2439->2440 2440->2434 2441 7ff69461546f GetProcAddress 2440->2441 2442 7ff69461548d 2441->2442 2443 7ff6946154ef FreeLibrary 2441->2443 2444 7ff694611094 4 API calls 2442->2444 2443->2434 2445 7ff6946154aa 2444->2445 2445->2443 2446 7ff694611094 4 API calls 2445->2446 2447 7ff6946154e4 2446->2447 2447->2443 2448 7ff694614670 2449 7ff69461469b 2448->2449 2452 7ff694614693 2448->2452 2450 7ff694611a20 34 API calls 2449->2450 2451 7ff6946146c6 2450->2451 2451->2452 2453 7ff6946146d2 2451->2453 2454 7ff6946146f5 2451->2454 2456 7ff694611094 4 API calls 2453->2456 2455 7ff694611094 4 API calls 2454->2455 2455->2452 2456->2452 2457 7ff694614cb0 2458 7ff694614cff SetupDiSetClassInstallParamsW 2457->2458 2459 7ff694614d05 SetupDiSetClassInstallParamsW 2457->2459 2462 7ff694614d8f SetupDiCallClassInstaller 2458->2462 2463 7ff694614e02 2458->2463 2459->2458 2461 7ff694614d33 SetupDiCallClassInstaller 2459->2461 2461->2458 2462->2463 2465 7ff694614daa SetupDiGetDeviceInstallParamsW 2462->2465 2464 7ff694612214 11 API calls 2463->2464 2473 7ff694614de6 2464->2473 2466 7ff694614dcd 2465->2466 2467 7ff694614def 2465->2467 2466->2467 2469 7ff694614dd7 2466->2469 2470 7ff694612214 11 API calls 2467->2470 2468 7ff694616ef0 7 API calls 2471 7ff694614e22 2468->2471 2472 7ff694612214 11 API calls 2469->2472 2470->2473 2472->2473 2473->2468 2474 7ff6946165f0 2475 7ff694616618 2474->2475 2485 7ff694616644 2474->2485 2476 7ff69461661a _wcsicmp 2475->2476 2475->2485 2476->2475 2477 7ff694616662 2476->2477 2478 7ff694611a20 34 API calls 2477->2478 2477->2485 2479 7ff6946166b1 2478->2479 2480 7ff6946166db 2479->2480 2481 7ff6946166bf 2479->2481 2479->2485 2482 7ff6946166f8 2480->2482 2483 7ff6946166e0 2480->2483 2484 7ff694611094 4 API calls 2481->2484 2487 7ff694611094 4 API calls 2482->2487 2486 7ff694611094 4 API calls 2483->2486 2484->2485 2486->2485 2487->2485 2488 7ff694616830 2489 7ff694616879 GetFullPathNameW 2488->2489 2490 7ff694616871 2488->2490 2491 7ff69461689f 2489->2491 2492 7ff694616912 2489->2492 2493 7ff694616ef0 7 API calls 2490->2493 2491->2492 2494 7ff6946168aa LoadLibraryW 2491->2494 2498 7ff694611094 4 API calls 2492->2498 2495 7ff6946169a0 2493->2495 2494->2490 2496 7ff6946168c9 GetProcAddress 2494->2496 2497 7ff6946168e8 2496->2497 2504 7ff69461695f 2496->2504 2500 7ff6946168ff GetLastError 2497->2500 2502 7ff694616943 2497->2502 2498->2504 2499 7ff69461697f FreeLibrary 2499->2490 2500->2492 2501 7ff694616919 GetLastError 2500->2501 2501->2492 2503 7ff694611094 4 API calls 2502->2503 2503->2504 2504->2490 2504->2499 2510 7ff6946161f0 SetupDiGetDeviceInfoListDetailW 2511 7ff69461625a CM_Get_Device_ID_ExW 2510->2511 2526 7ff6946162f0 2510->2526 2512 7ff69461628b CM_Get_DevNode_Status_Ex 2511->2512 2511->2526 2513 7ff6946162b9 2512->2513 2512->2526 2515 7ff6946162c0 wprintf 2513->2515 2516 7ff694616322 2513->2516 2514 7ff694616ef0 7 API calls 2517 7ff694616306 2514->2517 2519 7ff6946162e3 2515->2519 2518 7ff6946115e8 3 API calls 2516->2518 2520 7ff694616331 2518->2520 2521 7ff694611094 4 API calls 2519->2521 2531 7ff694616340 2520->2531 2536 7ff6946114a0 2520->2536 2521->2526 2523 7ff694616539 wprintf 2524 7ff694616560 2523->2524 2525 7ff6946165a2 wprintf 2523->2525 2527 7ff69461656d wprintf 2524->2527 2528 7ff694616580 wprintf 2524->2528 2525->2526 2526->2514 2527->2528 2528->2524 2528->2525 2529 7ff694616b70 malloc 2529->2531 2530 7ff6946163fe _wcsicmp 2530->2531 2531->2523 2531->2526 2531->2529 2531->2530 2532 7ff694616446 _wcsicmp 2531->2532 2533 7ff6946114a0 malloc 2531->2533 2535 7ff6946164cc 2531->2535 2532->2531 2533->2531 2534 7ff69461651b SetupDiSetDeviceRegistryPropertyW 2534->2523 2534->2526 2535->2526 2535->2534 2535->2535 2537 7ff6946114ce 2536->2537 2538 7ff694616b70 malloc 2537->2538 2541 7ff694611511 2538->2541 2539 7ff694611580 2539->2531 2540 7ff6946113dc malloc 2540->2539 2541->2539 2541->2540 2505 7ff694617130 SetUnhandledExceptionFilter 2056 7ff694616ca0 __wgetmainargs 2542 7ff694615ba0 2543 7ff694615bbf CM_Connect_MachineW 2542->2543 2544 7ff694615be0 CM_Locate_DevNode_ExW 2542->2544 2545 7ff694615bdb 2543->2545 2546 7ff694615c5f 2543->2546 2547 7ff694615bfa 2544->2547 2553 7ff694615c47 2544->2553 2545->2544 2549 7ff694611094 4 API calls 2547->2549 2548 7ff694615c53 CM_Disconnect_Machine 2548->2546 2550 7ff694615c17 CM_Reenumerate_DevNode_Ex 2549->2550 2551 7ff694615c32 2550->2551 2550->2553 2552 7ff694611094 4 API calls 2551->2552 2552->2553 2553->2546 2553->2548 2554 7ff694616720 2555 7ff694616761 GetFullPathNameW 2554->2555 2563 7ff694616759 2554->2563 2556 7ff6946167d0 2555->2556 2557 7ff694616788 SetupCopyOEMInfW 2555->2557 2561 7ff694611094 4 API calls 2556->2561 2557->2556 2560 7ff6946167dc 2557->2560 2558 7ff694616ef0 7 API calls 2559 7ff694616820 2558->2559 2562 7ff694611094 4 API calls 2560->2562 2561->2563 2562->2563 2563->2558 2564 7ff694613e20 2565 7ff694613ed1 2564->2565 2569 7ff694613e52 2564->2569 2568 7ff694611094 4 API calls 2565->2568 2566 7ff694613e8e 2566->2565 2571 7ff694613eb2 2566->2571 2567 7ff694613e65 _wcsicmp 2567->2566 2567->2569 2574 7ff694613ef2 2568->2574 2569->2566 2569->2567 2570 7ff694613ecc 2572 7ff694611094 4 API calls 2571->2572 2572->2570 2573 7ff694611094 4 API calls 2573->2574 2574->2570 2574->2573 2575 7ff694613f2d fputs 2574->2575 2575->2574 2621 7ff694617563 _XcptFilter 2640 7ff694615350 2641 7ff694615359 2640->2641 2642 7ff694615360 2640->2642 2643 7ff694611094 4 API calls 2642->2643 2644 7ff694615377 2643->2644 2645 7ff6946111c4 13 API calls 2644->2645 2645->2641 2646 7ff694614180 2647 7ff6946141ea 2646->2647 2648 7ff6946141e2 2646->2648 2649 7ff694616b70 malloc 2647->2649 2650 7ff694616ef0 7 API calls 2648->2650 2656 7ff6946141f4 2649->2656 2651 7ff6946144fd 2650->2651 2652 7ff694614280 SetupDiClassGuidsFromNameExW 2654 7ff69461422b GetLastError 2652->2654 2652->2656 2653 7ff6946144be 2653->2648 2655 7ff6946144dd SetupDiDestroyDeviceInfoList 2653->2655 2654->2653 2654->2656 2655->2648 2656->2648 2656->2652 2656->2653 2657 7ff6946142e3 SetupDiGetClassDevsExW 2656->2657 2659 7ff694614339 SetupDiEnumDeviceInfo 2656->2659 2660 7ff694614397 SetupDiGetClassDescriptionExW 2656->2660 2661 7ff694616b70 malloc 2656->2661 2662 7ff694611094 FormatMessageW CharPrevW fputws LocalFree 2656->2662 2663 7ff694614457 SetupDiEnumDeviceInfo 2656->2663 2664 7ff694614478 SetupDiDestroyDeviceInfoList 2656->2664 2665 7ff694612300 14 API calls 2656->2665 2657->2656 2658 7ff694614351 SetupDiClassNameFromGuidExW 2657->2658 2658->2656 2658->2660 2659->2656 2659->2658 2660->2656 2661->2656 2662->2656 2663->2656 2664->2656 2665->2656 2666 7ff694615c80 2667 7ff6946161b8 2666->2667 2668 7ff694615cdd 2666->2668 2672 7ff694616ef0 7 API calls 2667->2672 2668->2667 2669 7ff694615cea SetupDiClassGuidsFromNameExW 2668->2669 2670 7ff694615d27 2669->2670 2671 7ff694615d12 GetLastError 2669->2671 2670->2667 2673 7ff694615d32 _wcsicmp 2670->2673 2671->2667 2671->2670 2674 7ff6946161ce 2672->2674 2675 7ff694615d59 _wcsicmp 2673->2675 2676 7ff694615d50 SetupDiOpenClassRegKeyExW 2673->2676 2675->2676 2681 7ff694616127 2675->2681 2676->2667 2678 7ff694615dc3 2676->2678 2679 7ff694611720 3 API calls 2678->2679 2680 7ff694615dce 2679->2680 2683 7ff694616162 2680->2683 2684 7ff6946114a0 malloc 2680->2684 2706 7ff694615df2 2680->2706 2681->2667 2682 7ff6946161a9 RegCloseKey 2681->2682 2682->2667 2685 7ff694611094 4 API calls 2683->2685 2684->2706 2687 7ff694616179 2685->2687 2686 7ff69461607d 2686->2683 2689 7ff69461608b 2686->2689 2688 7ff694613174 2 API calls 2687->2688 2688->2681 2690 7ff69461612e RegDeleteValueW 2689->2690 2691 7ff694616094 2689->2691 2690->2681 2692 7ff694616149 2690->2692 2691->2681 2693 7ff6946160d7 RegSetValueExW 2691->2693 2696 7ff694611094 4 API calls 2692->2696 2693->2681 2695 7ff694616105 2693->2695 2694 7ff694615fe6 _wcsicmp 2694->2706 2702 7ff694611094 4 API calls 2695->2702 2696->2681 2697 7ff694615e9f OpenSCManagerW 2697->2681 2698 7ff694615ec4 OpenServiceW 2697->2698 2700 7ff694615ef3 CloseServiceHandle 2698->2700 2701 7ff694615ee4 CloseServiceHandle 2698->2701 2699 7ff6946114a0 malloc 2699->2706 2700->2681 2700->2706 2701->2700 2703 7ff69461611a 2702->2703 2704 7ff694613174 2 API calls 2703->2704 2704->2681 2705 7ff694616b70 malloc 2705->2706 2706->2681 2706->2683 2706->2686 2706->2694 2706->2697 2706->2699 2706->2705 2707 7ff694613f80 2708 7ff694616b70 malloc 2707->2708 2719 7ff694613fc6 2708->2719 2709 7ff694616ef0 7 API calls 2711 7ff69461414f 2709->2711 2710 7ff694614023 SetupDiBuildClassInfoListExW 2712 7ff694613fd8 GetLastError 2710->2712 2713 7ff694614048 2710->2713 2717 7ff694614132 2712->2717 2712->2719 2714 7ff694611094 4 API calls 2713->2714 2721 7ff694614070 2714->2721 2715 7ff694616b70 malloc 2715->2719 2716 7ff69461407c SetupDiClassNameFromGuidExW 2718 7ff6946140c8 SetupDiGetClassDescriptionExW 2716->2718 2716->2721 2717->2709 2720 7ff69461410a wprintf 2718->2720 2718->2721 2719->2710 2719->2715 2719->2717 2720->2716 2720->2717 2721->2716 2721->2717 2721->2718 2721->2720 2722 7ff6946129c0 2723 7ff6946129ce 2722->2723 2724 7ff6946129d2 2722->2724 2725 7ff694611184 fputs 2724->2725 2726 7ff6946129dc wprintf 2725->2726 2726->2723 2727 7ff694616ec0 2730 7ff694617304 2727->2730 2731 7ff694617330 6 API calls 2730->2731 2732 7ff694616ec9 2730->2732 2731->2732 2742 7ff694614e40 2743 7ff694614f6f 2742->2743 2744 7ff694614e7c 2742->2744 2746 7ff694616ef0 7 API calls 2743->2746 2744->2743 2745 7ff694614e85 LoadStringW 2744->2745 2745->2743 2747 7ff694614eab LoadStringW 2745->2747 2748 7ff694614fca 2746->2748 2747->2743 2749 7ff694614ece LoadStringW 2747->2749 2749->2743 2750 7ff694614ef3 2749->2750 2751 7ff694611a20 34 API calls 2750->2751 2752 7ff694614f4e 2751->2752 2752->2743 2753 7ff694614f71 2752->2753 2755 7ff694614f5d 2752->2755 2754 7ff694614f91 2753->2754 2756 7ff694614f78 2753->2756 2759 7ff694611094 4 API calls 2754->2759 2757 7ff694611094 4 API calls 2755->2757 2758 7ff694611094 4 API calls 2756->2758 2757->2743 2758->2743 2759->2743 2760 7ff694615540 2761 7ff694615597 2760->2761 2762 7ff6946155da 2760->2762 2761->2762 2765 7ff6946155b9 GetFullPathNameW 2761->2765 2763 7ff694616ef0 7 API calls 2762->2763 2764 7ff694615745 2763->2764 2765->2762 2766 7ff6946155e1 memset 2765->2766 2767 7ff694615603 2766->2767 2767->2762 2768 7ff694615609 SetupDiGetINFClassW 2767->2768 2768->2762 2769 7ff694615633 SetupDiCreateDeviceInfoList 2768->2769 2769->2762 2770 7ff694615652 SetupDiCreateDeviceInfoW 2769->2770 2771 7ff694615698 SetupDiSetDeviceRegistryPropertyW 2770->2771 2772 7ff69461571d SetupDiDestroyDeviceInfoList 2770->2772 2771->2772 2774 7ff6946156d2 SetupDiCallClassInstaller 2771->2774 2772->2762 2774->2772 2775 7ff6946156ef 2774->2775 2776 7ff694611094 4 API calls 2775->2776 2777 7ff694615706 2776->2777 2778 7ff6946153a0 16 API calls 2777->2778 2779 7ff69461571b 2778->2779 2779->2772 2780 7ff6946169c0 2781 7ff6946169f8 GetWindowsDirectoryW 2780->2781 2782 7ff6946169f0 2780->2782 2781->2782 2785 7ff694616a1b 2781->2785 2783 7ff694616ef0 7 API calls 2782->2783 2784 7ff694616b51 2783->2784 2785->2782 2786 7ff694616aa3 FindFirstFileW 2785->2786 2787 7ff694616ade 2786->2787 2788 7ff694616aca 2786->2788 2790 7ff694611094 4 API calls 2787->2790 2789 7ff694611094 4 API calls 2788->2789 2789->2782 2792 7ff694616af0 2790->2792 2791 7ff694611094 4 API calls 2791->2792 2792->2791 2796 7ff694613a1c 2792->2796 2795 7ff694616b2e FindClose 2795->2782 2797 7ff694617510 2796->2797 2798 7ff694613a45 SetupOpenInfFileW 2797->2798 2799 7ff694613a81 GetLastError 2798->2799 2800 7ff694613a95 SetupFindFirstLineW 2798->2800 2801 7ff694613dd2 2799->2801 2802 7ff694613ac6 SetupGetStringFieldW 2800->2802 2806 7ff694613b0b 2800->2806 2803 7ff694616ef0 7 API calls 2801->2803 2804 7ff694613aed 2802->2804 2802->2806 2805 7ff694613de9 FindNextFileW 2803->2805 2808 7ff694611094 4 API calls 2804->2808 2805->2792 2805->2795 2807 7ff694611094 4 API calls 2806->2807 2809 7ff694613b20 SetupFindFirstLineW 2807->2809 2810 7ff694613b09 2808->2810 2811 7ff694613bd7 2809->2811 2812 7ff694613b4a SetupGetStringFieldW 2809->2812 2810->2809 2815 7ff694611094 4 API calls 2811->2815 2812->2811 2813 7ff694613b71 CLSIDFromString 2812->2813 2813->2811 2814 7ff694613b8d SetupDiGetClassDescriptionExW 2813->2814 2814->2811 2816 7ff694613bb9 2814->2816 2817 7ff694613bec LoadLibraryW 2815->2817 2821 7ff694611094 4 API calls 2816->2821 2818 7ff694613c0b GetProcAddress 2817->2818 2819 7ff694613daf SetupCloseInfFile 2817->2819 2818->2819 2820 7ff694613c2d memset 2818->2820 2819->2801 2822 7ff694613dc3 FreeLibrary 2819->2822 2824 7ff694613c5a 2820->2824 2823 7ff694613bd5 2821->2823 2822->2801 2823->2817 2825 7ff694613c9b 2824->2825 2826 7ff694613c5e GetLastError 2824->2826 2829 7ff694611094 4 API calls 2825->2829 2826->2825 2827 7ff694613c71 GetLastError 2826->2827 2827->2825 2828 7ff694613c84 2827->2828 2833 7ff694611094 4 API calls 2828->2833 2830 7ff694613cb7 SetupFindFirstLineW 2829->2830 2831 7ff694613ce1 SetupGetStringFieldW 2830->2831 2832 7ff694613d85 2830->2832 2834 7ff694613d2c 2831->2834 2835 7ff694613d11 2831->2835 2837 7ff694611094 4 API calls 2832->2837 2836 7ff694613c99 2833->2836 2839 7ff694611094 4 API calls 2834->2839 2838 7ff694611094 4 API calls 2835->2838 2836->2830 2843 7ff694613d9a 2837->2843 2840 7ff694613d2a 2838->2840 2841 7ff694613d3e SetupGetStringFieldW 2839->2841 2840->2841 2842 7ff694613d6a 2841->2842 2841->2843 2845 7ff694611094 4 API calls 2842->2845 2844 7ff694611094 4 API calls 2843->2844 2844->2819 2846 7ff694613d83 2845->2846 2846->2819 2847 7ff694616bc0 2849 7ff694616bd2 2847->2849 2854 7ff6946171b8 GetModuleHandleW 2849->2854 2850 7ff694616c39 __set_app_type 2851 7ff694616c76 2850->2851 2852 7ff694616c8c 2851->2852 2853 7ff694616c7f __setusermatherr 2851->2853 2853->2852 2855 7ff6946171cd 2854->2855 2855->2850

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF69461182C 1 Function_00007FF694614530 3 Function_00007FF6946112B0 1->3 9 Function_00007FF694617418 1->9 24 Function_00007FF694612E8C 1->24 30 Function_00007FF694612214 1->30 32 Function_00007FF694611094 1->32 33 Function_00007FF6946127F8 1->33 34 Function_00007FF69461377C 1->34 37 Function_00007FF694612300 1->37 42 Function_00007FF694611184 1->42 58 Function_00007FF694612370 1->58 68 Function_00007FF6946131D0 1->68 71 Function_00007FF694612454 1->71 81 Function_00007FF6946132C4 1->81 2 Function_00007FF694614CB0 2->30 56 Function_00007FF694616EF0 2->56 55 Function_00007FF694616B70 3->55 4 Function_00007FF6946149B0 4->9 13 Function_00007FF694611A20 4->13 4->32 5 Function_00007FF694616830 5->9 5->32 5->56 6 Function_00007FF694617130 7 Function_00007FF6946172B0 8 Function_00007FF6946115B4 10 Function_00007FF694613A1C 10->9 25 Function_00007FF694617510 10->25 10->32 10->56 11 Function_00007FF694615BA0 11->9 11->32 12 Function_00007FF694616720 12->9 12->32 12->56 13->0 13->8 43 Function_00007FF6946115E8 13->43 13->55 13->56 14 Function_00007FF694616CA0 15 Function_00007FF694617220 16 Function_00007FF694613E20 16->9 16->32 17 Function_00007FF694612620 17->42 17->55 18 Function_00007FF694611720 18->55 60 Function_00007FF6946113DC 18->60 19 Function_00007FF6946114A0 23 Function_00007FF694611008 19->23 19->55 19->60 20 Function_00007FF6946151A0 20->9 20->13 20->32 20->56 21 Function_00007FF6946153A0 21->9 21->32 21->56 22 Function_00007FF6946171A2 24->9 24->32 40 Function_00007FF694612A04 24->40 24->42 24->56 26 Function_00007FF694614810 26->9 26->13 26->32 27 Function_00007FF694614B10 27->9 27->13 27->32 28 Function_00007FF694617210 29 Function_00007FF694617590 30->23 30->56 31 Function_00007FF694616F14 33->9 33->17 33->32 33->42 33->56 34->3 34->8 34->9 34->18 34->32 34->42 34->43 34->56 59 Function_00007FF694613174 34->59 35 Function_00007FF694614180 35->9 35->23 35->32 35->37 35->55 35->56 36 Function_00007FF694613F80 36->9 36->23 36->32 36->55 36->56 37->3 37->30 38 Function_00007FF694615C80 38->8 38->9 38->18 38->19 38->32 38->55 38->56 38->59 39 Function_00007FF694617402 40->25 40->56 41 Function_00007FF694617304 42->9 43->55 43->60 44 Function_00007FF694616E6B 45 Function_00007FF69461746C 46 Function_00007FF6946165F0 46->9 46->13 46->32 47 Function_00007FF694614FF0 47->9 47->13 47->32 47->56 48 Function_00007FF6946161F0 48->8 48->9 48->19 48->32 48->43 48->55 48->56 49 Function_00007FF694615870 49->56 50 Function_00007FF6946159F0 50->9 50->13 50->32 50->56 51 Function_00007FF694614670 51->9 51->13 51->32 52 Function_00007FF694617270 52->15 70 Function_00007FF6946172D0 52->70 53 Function_00007FF6946170F0 54 Function_00007FF694616CF0 54->52 67 Function_00007FF694611FD0 54->67 56->31 57 Function_00007FF694615770 57->21 58->3 58->9 58->32 58->42 59->42 60->55 61 Function_00007FF69461715C 62 Function_00007FF6946148E0 62->9 62->13 62->32 63 Function_00007FF694614A60 63->9 63->13 63->32 64 Function_00007FF694614BE0 64->9 64->13 64->32 65 Function_00007FF694617563 66 Function_00007FF694617448 66->45 67->9 67->32 67->50 80 Function_00007FF6946111C4 67->80 68->8 68->9 68->32 68->42 68->43 68->59 69 Function_00007FF694615350 69->9 69->32 69->80 71->9 71->32 71->42 71->56 72 Function_00007FF6946171B8 72->61 73 Function_00007FF6946129C0 73->42 74 Function_00007FF694616EC0 74->41 75 Function_00007FF694614740 75->9 75->13 75->32 76 Function_00007FF694614E40 76->9 76->13 76->32 76->56 77 Function_00007FF694615540 77->9 77->21 77->23 77->32 77->56 78 Function_00007FF6946169C0 78->9 78->10 78->32 78->56 79 Function_00007FF694616BC0 79->28 79->72 80->56 81->9 81->25 81->32 81->42 81->56

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff694611a20-7ff694611ab9 call 7ff694616b70 3 7ff694611abf-7ff694611ac5 0->3 4 7ff694611fa3-7ff694611fc8 call 7ff694616ef0 0->4 6 7ff694611b66 3->6 7 7ff694611acb-7ff694611ad5 3->7 8 7ff694611b6c-7ff694611b75 6->8 10 7ff694611ad7-7ff694611ade 7->10 11 7ff694611b48-7ff694611b4a 7->11 13 7ff694611b7b-7ff694611b88 8->13 14 7ff694611c34-7ff694611c37 8->14 10->11 15 7ff694611ae0-7ff694611b0b SetupDiClassGuidsFromNameExW 10->15 11->6 12 7ff694611b4c-7ff694611b57 11->12 12->8 16 7ff694611b59-7ff694611b5e 12->16 19 7ff694611b8c-7ff694611ba1 13->19 17 7ff694611c39-7ff694611c60 SetupDiCreateDeviceInfoListExW 14->17 18 7ff694611c62-7ff694611ca3 SetupDiGetClassDevsExW 14->18 20 7ff694611b0d-7ff694611b1c GetLastError 15->20 21 7ff694611b25-7ff694611b2a 15->21 16->8 26 7ff694611b60-7ff694611b62 16->26 27 7ff694611ca8-7ff694611caf 17->27 18->27 28 7ff694611bbe-7ff694611bc5 19->28 29 7ff694611ba3-7ff694611bb9 CharNextW 19->29 22 7ff694611b22 20->22 23 7ff694611f84-7ff694611f92 call 7ff694616bb0 20->23 24 7ff694611b2c-7ff694611b2f 21->24 25 7ff694611b34-7ff694611b44 21->25 22->21 23->4 42 7ff694611f94-7ff694611f9e SetupDiDestroyDeviceInfoList 23->42 24->23 25->11 26->6 31 7ff694611f7e 27->31 32 7ff694611cb5-7ff694611cc2 27->32 33 7ff694611bc7-7ff694611bd8 CharNextW 28->33 34 7ff694611bda-7ff694611beb wcschr 28->34 29->28 31->23 37 7ff694611d07-7ff694611d25 SetupDiGetDeviceInfoListDetailW 32->37 38 7ff694611cc4-7ff694611cd2 32->38 35 7ff694611bef-7ff694611c08 33->35 34->35 40 7ff694611c0a-7ff694611c0d 35->40 41 7ff694611c0f 35->41 37->31 39 7ff694611d2b-7ff694611d65 SetupDiEnumDeviceInfo 37->39 43 7ff694611cd5-7ff694611cd9 38->43 44 7ff694611f79-7ff694611f7c 39->44 45 7ff694611d6b-7ff694611d6d 39->45 40->41 46 7ff694611c15-7ff694611c1f 40->46 41->46 42->4 47 7ff694611cf8-7ff694611d00 43->47 48 7ff694611cdb-7ff694611cf3 SetupDiOpenDeviceInfoW 43->48 44->23 49 7ff694611f0f 45->49 50 7ff694611d73-7ff694611d82 45->50 46->19 51 7ff694611c25-7ff694611c32 46->51 47->43 52 7ff694611d02 47->52 48->47 55 7ff694611f14-7ff694611f16 49->55 53 7ff694611d88-7ff694611d94 50->53 54 7ff694611f3d-7ff694611f5f SetupDiEnumDeviceInfo 50->54 51->14 51->18 52->37 57 7ff694611d99-7ff694611d9b 53->57 54->44 56 7ff694611f61-7ff694611f6f 54->56 55->54 58 7ff694611f18 55->58 56->45 59 7ff694611f1a 57->59 60 7ff694611da1-7ff694611dd6 CM_Get_Device_ID_ExW 57->60 61 7ff694611f1e-7ff694611f3b 58->61 59->61 62 7ff694611dd8 60->62 63 7ff694611ddf-7ff694611de3 60->63 61->54 67 7ff694611f74-7ff694611f77 61->67 62->63 64 7ff694611e13-7ff694611e3d call 7ff6946115e8 * 2 63->64 65 7ff694611de5-7ff694611e03 call 7ff69461182c 63->65 75 7ff694611e42-7ff694611e50 64->75 72 7ff694611e09-7ff694611e0e 65->72 73 7ff694611ed0-7ff694611f03 call 7ff6946115b4 * 2 65->73 67->23 72->73 73->57 88 7ff694611f09-7ff694611f0d 73->88 77 7ff694611e87-7ff694611e8d 75->77 78 7ff694611e52-7ff694611e58 75->78 82 7ff694611ecb 77->82 83 7ff694611e8f-7ff694611e95 77->83 78->77 80 7ff694611e5a-7ff694611e66 78->80 84 7ff694611e6a-7ff694611e74 call 7ff69461182c 80->84 82->73 83->82 86 7ff694611e97-7ff694611ea3 83->86 92 7ff694611e76-7ff694611e80 84->92 93 7ff694611ec1 84->93 89 7ff694611ea7-7ff694611eb1 call 7ff69461182c 86->89 88->55 89->93 97 7ff694611eb3-7ff694611ebd 89->97 92->84 96 7ff694611e82 92->96 95 7ff694611ec6 93->95 95->82 96->77 97->89 98 7ff694611ebf 97->98 98->95
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$DeviceInfo$List$CharClassEnumNext$CreateDestroyDetailDevice_DevsErrorFromGet_GuidsLastNameOpenmallocwcschr
    • String ID:
    • API String ID: 43639810-0
    • Opcode ID: 346997b52acf79b8c85f6c67cfbfc8ecc27e95c6d2b0a952b0ad311ee47ef266
    • Instruction ID: b2f36ca09ff9e6943364c2b988ab837665b6050d6b46fd7fd9e3c7e800d04a98
    • Opcode Fuzzy Hash: 346997b52acf79b8c85f6c67cfbfc8ecc27e95c6d2b0a952b0ad311ee47ef266
    • Instruction Fuzzy Hash: F2F1B3B2A08A8286EB208F55E4802FDB7A0FB8DB98F548175DE5E87B94DF3CD545D700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: DeviceErrorLastPropertyRegistrySetupmalloc
    • String ID:
    • API String ID: 3222414921-0
    • Opcode ID: 090b46064aa7c0e42f17cac93464e8602f3f87fbcec76419732d820bd4227342
    • Instruction ID: 7842b2fae20f165afa9fc651038a4bd381005b466ae43959e9fbfb26d1a1f098
    • Opcode Fuzzy Hash: 090b46064aa7c0e42f17cac93464e8602f3f87fbcec76419732d820bd4227342
    • Instruction Fuzzy Hash: 1521847260878186EB648F11A4906B977A4FB8CB90F588275EEBE83795DF3DD841CB40

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
    • String ID:
    • API String ID: 4291973834-0
    • Opcode ID: 706a97d6c57b6583ab6d2954fa5cc554724fb3c63a47e31049ab5f7dc56f8480
    • Instruction ID: df9ac3d3d3fa6deadbad87d4a516f41639bbb4d7ad00bc003b358a5756fdb672
    • Opcode Fuzzy Hash: 706a97d6c57b6583ab6d2954fa5cc554724fb3c63a47e31049ab5f7dc56f8480
    • Instruction Fuzzy Hash: 2D41D8B5E0C6468AF7709B15E9C027927A0EF8CB44F0085B6D92DC76A4DF7CE845E740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 135 7ff694611fd0-7ff694612020 wcsrchr 136 7ff694612028-7ff694612037 CharNextW 135->136 137 7ff694612022-7ff694612026 135->137 138 7ff69461203a-7ff694612043 136->138 137->138 139 7ff6946120c0-7ff6946120c7 138->139 140 7ff694612045-7ff69461204a 138->140 141 7ff694612139-7ff694612153 call 7ff694617418 call 7ff694611094 139->141 142 7ff6946120c9-7ff6946120dc 139->142 143 7ff69461204e-7ff69461205c 140->143 164 7ff694612158-7ff69461216f 141->164 144 7ff6946120de-7ff6946120ed CharNextW 142->144 145 7ff6946120f0-7ff694612100 142->145 146 7ff6946120bc 143->146 147 7ff69461205e-7ff694612069 143->147 144->145 145->141 149 7ff694612102 145->149 146->139 150 7ff694612098-7ff69461209d 147->150 151 7ff69461206b-7ff694612072 147->151 154 7ff694612105-7ff694612119 _wcsicmp 149->154 150->146 153 7ff69461209f-7ff6946120a7 150->153 155 7ff69461208a-7ff69461208f 151->155 156 7ff694612074-7ff69461207c 151->156 153->146 159 7ff6946120a9 153->159 160 7ff69461211b-7ff69461211e 154->160 161 7ff694612120-7ff694612137 154->161 155->146 163 7ff694612091-7ff694612096 155->163 156->146 162 7ff69461207e-7ff694612083 156->162 165 7ff6946120b1-7ff6946120ba 159->165 160->161 166 7ff694612171-7ff694612193 160->166 161->141 161->154 162->146 167 7ff694612085-7ff694612088 162->167 163->165 165->143 165->146 168 7ff6946121a0-7ff6946121ab 166->168 169 7ff694612195-7ff69461219e 166->169 167->165 170 7ff6946121ae-7ff6946121b1 call 7ff6946159f0 168->170 169->170 171 7ff6946121b7-7ff6946121bd 170->171 172 7ff6946121bf-7ff6946121c2 171->172 173 7ff694612204-7ff694612206 171->173 174 7ff6946121f8-7ff6946121fd 172->174 175 7ff6946121c4-7ff6946121d0 172->175 173->164 174->173 176 7ff6946121ff call 7ff6946111c4 174->176 177 7ff6946121de-7ff6946121e3 call 7ff694617418 175->177 178 7ff6946121d2-7ff6946121dc call 7ff694617418 175->178 176->173 184 7ff6946121e8-7ff6946121f6 call 7ff694611094 177->184 178->184 184->173
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CharNext$_wcsicmpwcsrchr
    • String ID:
    • API String ID: 349611830-0
    • Opcode ID: 00a20d2dbd4039686c28c160fa1c05f15aff131818592b9301d6560f865f19a8
    • Instruction ID: b5104249dd46c058316abeaef0ea3c4b43af9b8819806a06972d05b6c38665ac
    • Opcode Fuzzy Hash: 00a20d2dbd4039686c28c160fa1c05f15aff131818592b9301d6560f865f19a8
    • Instruction Fuzzy Hash: 9251FFB6A0868686EA30DB15D4C427A66A0FB4DB89F05C679DF2DD3390DF3CE585E300

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: LoadString$Setup$CharClassDestroyDeviceErrorFormatFreeFromGuidsInfoLastListLocalMessageNamePrevfputws
    • String ID:
    • API String ID: 2156310005-0
    • Opcode ID: 4c3c7b40d94fe2c47dfe18297074997c7891f4faa63f9ec967768bd3813214f2
    • Instruction ID: 8b9105bd76063d29df8e97aee534ce039678c77640bcb17e88f702de20a24cbb
    • Opcode Fuzzy Hash: 4c3c7b40d94fe2c47dfe18297074997c7891f4faa63f9ec967768bd3813214f2
    • Instruction Fuzzy Hash: 9F414A72618B82CAE7748B21E490BBAB6A4FB8C745F508075EA5D87B85DF3CE505DB00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 239 7ff694616ca0-7ff694616ce8 __wgetmainargs
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: __wgetmainargs
    • String ID:
    • API String ID: 1709950718-0
    • Opcode ID: 943ab0ee3eda69021a4f07d25a78058e0e8e433080375cef63d515d42e6b7d78
    • Instruction ID: 368c5e14bd768964d7decdf83574d1f8ef19c3384e617ccf6ba5ac7f4e01c711
    • Opcode Fuzzy Hash: 943ab0ee3eda69021a4f07d25a78058e0e8e433080375cef63d515d42e6b7d78
    • Instruction Fuzzy Hash: 73E052B4E086479EEB208B10B9804B837A0FB8DB04F8081B6C42D96234DE7CA14DEB00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 314 7ff694615c80-7ff694615cd7 315 7ff6946161bc 314->315 316 7ff694615cdd-7ff694615ce4 314->316 318 7ff6946161c1-7ff6946161e8 call 7ff694616ef0 315->318 316->315 317 7ff694615cea-7ff694615d10 SetupDiClassGuidsFromNameExW 316->317 319 7ff694615d27-7ff694615d2c 317->319 320 7ff694615d12-7ff694615d21 GetLastError 317->320 322 7ff6946161b8-7ff6946161ba 319->322 323 7ff694615d32-7ff694615d4e _wcsicmp 319->323 320->319 320->322 322->318 325 7ff694615d59-7ff694615d75 _wcsicmp 323->325 326 7ff694615d50-7ff694615d57 323->326 328 7ff694615d7b 325->328 329 7ff69461618e 325->329 327 7ff694615d82-7ff694615dbd SetupDiOpenClassRegKeyExW 326->327 327->322 330 7ff694615dc3-7ff694615dd3 call 7ff694611720 327->330 328->327 331 7ff694616193-7ff694616196 329->331 338 7ff694615dd9-7ff694615de9 330->338 339 7ff694616162-7ff69461618c call 7ff694617418 call 7ff694611094 call 7ff694613174 330->339 333 7ff694616198-7ff69461619b call 7ff6946115b4 331->333 334 7ff6946161a0-7ff6946161a7 331->334 333->334 334->322 337 7ff6946161a9-7ff6946161b3 RegCloseKey 334->337 337->322 341 7ff694615deb-7ff694615dfb call 7ff6946114a0 338->341 342 7ff694615e05-7ff694615e0d 338->342 339->331 341->334 349 7ff694615e01 341->349 342->339 343 7ff694615e13-7ff694615e16 342->343 346 7ff694615e1b-7ff694615e27 343->346 350 7ff69461607d 346->350 351 7ff694615e2d-7ff694615e37 346->351 349->342 356 7ff694616082-7ff694616085 350->356 353 7ff694615e39-7ff694615e45 351->353 354 7ff694615e4e-7ff694615e52 351->354 357 7ff694615e4b 353->357 358 7ff694616064-7ff694616076 353->358 354->329 359 7ff694615e58-7ff694615e5b 354->359 356->339 361 7ff69461608b-7ff69461608e 356->361 357->354 358->356 366 7ff694616078 358->366 364 7ff694615fde-7ff694615fe4 359->364 365 7ff694615e61-7ff694615e64 359->365 362 7ff69461612e-7ff694616147 RegDeleteValueW 361->362 363 7ff694616094-7ff69461609f 361->363 362->331 371 7ff694616149-7ff694616160 call 7ff694617418 call 7ff694611094 362->371 367 7ff6946160bc-7ff6946160d1 363->367 368 7ff6946160a1 363->368 370 7ff694616004-7ff69461600b 364->370 365->364 369 7ff694615e6a-7ff694615e6d 365->369 366->346 367->331 373 7ff6946160d7-7ff6946160ff RegSetValueExW 367->373 372 7ff6946160a4-7ff6946160ac 368->372 374 7ff694615e6f-7ff694615e71 369->374 375 7ff694615e90-7ff694615e93 369->375 376 7ff694615fe6-7ff694615ffd _wcsicmp 370->376 377 7ff69461600d-7ff694616017 370->377 399 7ff694616127-7ff69461612c 371->399 372->372 382 7ff6946160ae-7ff6946160ba 372->382 373->331 383 7ff694616105-7ff694616122 call 7ff694617418 call 7ff694611094 call 7ff694613174 373->383 384 7ff694615e8b-7ff694615e8e 374->384 385 7ff694615e73-7ff694615e79 374->385 375->329 381 7ff694615e99-7ff694615e9b 375->381 376->377 386 7ff694615fff-7ff694616001 376->386 377->331 379 7ff69461601d-7ff694616020 377->379 387 7ff694616028-7ff694616036 379->387 388 7ff694616022-7ff694616026 379->388 390 7ff694615e9f-7ff694615ebe OpenSCManagerW 381->390 382->367 382->368 383->399 384->390 385->390 392 7ff694615e7b 385->392 386->370 387->387 395 7ff694616038-7ff694616046 call 7ff6946114a0 387->395 393 7ff694616060 388->393 390->331 396 7ff694615ec4-7ff694615ee2 OpenServiceW 390->396 398 7ff694615e7e-7ff694615e87 392->398 393->358 395->331 408 7ff69461604c-7ff694616057 call 7ff6946115b4 395->408 401 7ff694615ef3-7ff694615f08 CloseServiceHandle 396->401 402 7ff694615ee4-7ff694615eee CloseServiceHandle 396->402 398->398 404 7ff694615e89 398->404 399->331 401->331 406 7ff694615f0e-7ff694615f14 401->406 402->401 404->390 409 7ff694615f16 406->409 410 7ff694615f24-7ff694615f4f call 7ff694616b70 406->410 417 7ff69461605a-7ff69461605d 408->417 413 7ff694615f19-7ff694615f22 409->413 410->331 418 7ff694615f55-7ff694615f5d 410->418 413->410 413->413 417->393 419 7ff694615f7c-7ff694615f83 418->419 420 7ff694615f5f-7ff694615f68 418->420 421 7ff694615faa-7ff694615fc5 call 7ff6946114a0 call 7ff694616bb0 419->421 422 7ff694615f85-7ff694615f95 419->422 423 7ff694615f6b-7ff694615f7a 420->423 421->331 429 7ff694615fcb-7ff694615fdc call 7ff6946115b4 421->429 424 7ff694615f98-7ff694615fa8 422->424 423->419 423->423 424->421 424->424 429->417
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CloseOpenService_wcsicmp$ClassHandleSetupValue$CharDeleteErrorFormatFreeFromGuidsLastLocalManagerMessageNamePrevfputwswprintf
    • String ID: !$+$-$=$@$@$LowerFilters$UpperFilters$lower$upper
    • API String ID: 1724156078-2693469231
    • Opcode ID: 926cd04b1689d02a59abcbcd5e01b1a056d007f521a5af8e348f38f05508dc4f
    • Instruction ID: cc52d523064e1db41ad23284b33ff97b73dd075722a1f66c53d320afc35969f0
    • Opcode Fuzzy Hash: 926cd04b1689d02a59abcbcd5e01b1a056d007f521a5af8e348f38f05508dc4f
    • Instruction Fuzzy Hash: D2E1BFB6A0968286EA349B159491279BBA1FF4DBA0F45C271DE3E877D1DF3CE444E300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 432 7ff694612a04-7ff694612a78 call 7ff694617510 call 7ff6946174d6 SetupDiGetDeviceInstallParamsW 437 7ff694612e56 432->437 438 7ff694612a7e-7ff694612aab SetupDiSetDeviceInstallParamsW 432->438 439 7ff694612e58-7ff694612e81 call 7ff694616ef0 437->439 440 7ff694612aed-7ff694612b1e SetupDiOpenDevRegKey 438->440 441 7ff694612aad-7ff694612abb SetupDiBuildDriverInfoList 438->441 442 7ff694612e4a-7ff694612e51 RegCloseKey 440->442 443 7ff694612b24-7ff694612b5f RegQueryValueExW 440->443 441->437 445 7ff694612ac1-7ff694612ae0 SetupDiEnumDriverInfoW 441->445 442->437 446 7ff694612e47 443->446 447 7ff694612b65-7ff694612b69 443->447 445->437 449 7ff694612ae6-7ff694612ae8 445->449 446->442 447->446 450 7ff694612b6f-7ff694612bae RegQueryValueExW 447->450 449->439 450->446 451 7ff694612bb4-7ff694612bb8 450->451 451->446 452 7ff694612bbe-7ff694612bf8 RegQueryValueExW 451->452 452->446 453 7ff694612bfe-7ff694612c02 452->453 453->446 454 7ff694612c08-7ff694612c53 RegQueryValueExW RegCloseKey 453->454 454->437 455 7ff694612c59-7ff694612c5d 454->455 455->437 456 7ff694612c63-7ff694612c97 SetupDiGetDeviceRegistryPropertyW 455->456 456->437 457 7ff694612c9d-7ff694612cc2 SetupDiSetDeviceInstallParamsW 456->457 457->437 458 7ff694612cc8-7ff694612cdf SetupDiBuildDriverInfoList 457->458 458->437 459 7ff694612ce5-7ff694612d06 SetupDiEnumDriverInfoW 458->459 460 7ff694612e2a-7ff694612e3a SetupDiDestroyDriverInfoList 459->460 461 7ff694612d0c 459->461 462 7ff694612e3f-7ff694612e41 460->462 463 7ff694612d13-7ff694612d1d 461->463 462->439 464 7ff694612d20-7ff694612d2a 463->464 465 7ff694612d2c-7ff694612d32 464->465 466 7ff694612d34-7ff694612d36 464->466 465->464 465->466 467 7ff694612d3c-7ff694612d4a 466->467 468 7ff694612e03-7ff694612e24 SetupDiEnumDriverInfoW 466->468 469 7ff694612d4d-7ff694612d57 467->469 468->460 468->463 470 7ff694612d59-7ff694612d5f 469->470 471 7ff694612d61-7ff694612d63 469->471 470->469 470->471 471->468 472 7ff694612d69-7ff694612d9e SetupDiGetDriverInfoDetailW 471->472 473 7ff694612da0-7ff694612daf GetLastError 472->473 474 7ff694612db1-7ff694612dbf 472->474 473->468 473->474 475 7ff694612dc2-7ff694612dcc 474->475 476 7ff694612dd6-7ff694612dd8 475->476 477 7ff694612dce-7ff694612dd4 475->477 476->468 478 7ff694612dda-7ff694612de8 476->478 477->475 477->476 479 7ff694612deb-7ff694612df5 478->479 480 7ff694612df7-7ff694612dfd 479->480 481 7ff694612dff-7ff694612e01 479->481 480->479 480->481 481->468 482 7ff694612e43-7ff694612e45 481->482 482->462
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$DeviceQueryValue$DriverInfoInstallParams$BuildList$CloseEnumOpenPropertyRegistry
    • String ID: DriverDesc$InfPath$InfSection$ProviderName
    • API String ID: 1187922586-109328823
    • Opcode ID: 70622a9b5a574f4e2a8280fc3ff9c5255fc456a0584ec18a8c22dc112fbdd8cc
    • Instruction ID: 61ed72a14db9be25f583ec4605efc2f914b98b5475680e500e26ee26a6e71e24
    • Opcode Fuzzy Hash: 70622a9b5a574f4e2a8280fc3ff9c5255fc456a0584ec18a8c22dc112fbdd8cc
    • Instruction Fuzzy Hash: DCC162B2A08A8286EB708F51E4842BAB7A0FB8DB99F44C175DE5D93754DF3CD504EB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 792 7ff694614180-7ff6946141e0 793 7ff6946141ea-7ff6946141fa call 7ff694616b70 792->793 794 7ff6946141e2-7ff6946141e5 792->794 800 7ff6946144ec 793->800 801 7ff694614200-7ff69461420a 793->801 795 7ff6946144ee-7ff69461451d call 7ff694616ef0 794->795 800->795 802 7ff694614210-7ff694614217 801->802 803 7ff6946144c5-7ff6946144cd call 7ff694616bb0 801->803 804 7ff69461421d-7ff694614220 802->804 805 7ff6946144a2-7ff6946144b8 802->805 811 7ff6946144d4-7ff6946144db 803->811 804->805 807 7ff694614226-7ff694614229 804->807 805->802 808 7ff6946144be 805->808 810 7ff694614280-7ff6946142a0 SetupDiClassGuidsFromNameExW 807->810 808->803 812 7ff69461422b-7ff69461423a GetLastError 810->812 813 7ff6946142a2-7ff6946142a8 810->813 811->800 814 7ff6946144dd-7ff6946144e7 SetupDiDestroyDeviceInfoList 811->814 817 7ff6946144c0 812->817 818 7ff694614240-7ff694614273 call 7ff694616bb0 call 7ff694616b70 812->818 815 7ff6946142d8-7ff6946142dd 813->815 816 7ff6946142aa-7ff6946142d3 call 7ff694617418 call 7ff694611094 813->816 814->800 815->805 820 7ff6946142e3-7ff694614325 SetupDiGetClassDevsExW 815->820 816->805 817->803 841 7ff694614279-7ff69461427d 818->841 842 7ff6946144cf 818->842 823 7ff694614327-7ff694614331 820->823 824 7ff694614351-7ff694614379 SetupDiClassNameFromGuidExW 820->824 827 7ff694614339-7ff69461434f SetupDiEnumDeviceInfo 823->827 828 7ff694614397-7ff6946143c0 SetupDiGetClassDescriptionExW 824->828 829 7ff69461437b-7ff694614391 call 7ff694611008 824->829 827->824 834 7ff694614333-7ff694614336 827->834 831 7ff6946143dd-7ff6946143e8 828->831 832 7ff6946143c2-7ff6946143d7 call 7ff694611008 828->832 829->817 829->828 838 7ff6946143ea-7ff694614410 call 7ff694617418 call 7ff694611094 831->838 839 7ff694614412-7ff694614444 call 7ff694617418 call 7ff694611094 831->839 832->817 832->831 834->827 852 7ff69461446f-7ff694614476 838->852 853 7ff694614457-7ff69461446d SetupDiEnumDeviceInfo 839->853 841->810 842->811 855 7ff694614478-7ff694614487 SetupDiDestroyDeviceInfoList 852->855 856 7ff69461448a-7ff694614497 852->856 853->852 854 7ff694614446-7ff694614455 call 7ff694612300 853->854 854->853 855->856 856->820 857 7ff69461449d 856->857 857->805
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$ClassDestroyDeviceFromGuidsInfoListName
    • String ID:
    • API String ID: 1860465623-3916222277
    • Opcode ID: e6450321c0d2d64a461101c674be3e33342555eeae8982276af84a45cca274cc
    • Instruction ID: e97b820dcccfb4faf842d453b2dcc1bebf3195e24987609723bcda00370c65ee
    • Opcode Fuzzy Hash: e6450321c0d2d64a461101c674be3e33342555eeae8982276af84a45cca274cc
    • Instruction Fuzzy Hash: 1AA18FB2A0878286E7309F61E4903B967A4FB8EBA4F548675DA6D87BC4DF3CD405D700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCloseCurrentHandleInitiateLookupOpenPrivilegePrivilegesShutdownSystemValue
    • String ID: SeShutdownPrivilege
    • API String ID: 2036077386-3733053543
    • Opcode ID: fddce4556390571a9fb10fe5ea09b351c16824cdf68d2e6d798df49b6638f994
    • Instruction ID: 630dabbef7a9a71ec5f36633077ded6fc29d41f1f93cadeacebb24845769642c
    • Opcode Fuzzy Hash: fddce4556390571a9fb10fe5ea09b351c16824cdf68d2e6d798df49b6638f994
    • Instruction Fuzzy Hash: FC214F72518A82C7E7608B11F4567BABBA0FBCDB44F44D165EA5E82B54CF7CD048CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: DirectoryFileFindFirstWindows
    • String ID: \INF\OEM*.INF
    • API String ID: 1585389207-2728984289
    • Opcode ID: 6a7a1a2d6b532156aec20f8e7e9eeafbd71c87cdb6d56367d2f17184ac1bf8f6
    • Instruction ID: a26b329638701c756806f054cfdebfb48032422db751b423dac0cc51b28f2c9a
    • Opcode Fuzzy Hash: 6a7a1a2d6b532156aec20f8e7e9eeafbd71c87cdb6d56367d2f17184ac1bf8f6
    • Instruction Fuzzy Hash: 304186B5B1868283EE309B24D4902B976A5FF8CB90F54C5B2CA6E83795DF3CE815D340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 240 7ff694613a1c-7ff694613a7f call 7ff694617510 SetupOpenInfFileW 243 7ff694613a81-7ff694613a90 GetLastError 240->243 244 7ff694613a95-7ff694613ac4 SetupFindFirstLineW 240->244 245 7ff694613dd2-7ff694613e09 call 7ff694616ef0 243->245 246 7ff694613ac6-7ff694613aeb SetupGetStringFieldW 244->246 247 7ff694613b0b-7ff694613b1b call 7ff694617418 call 7ff694611094 244->247 246->247 250 7ff694613aed-7ff694613b09 call 7ff694617418 call 7ff694611094 246->250 257 7ff694613b20-7ff694613b44 SetupFindFirstLineW 247->257 250->257 259 7ff694613bd7-7ff694613be7 call 7ff694617418 call 7ff694611094 257->259 260 7ff694613b4a-7ff694613b6f SetupGetStringFieldW 257->260 267 7ff694613bec-7ff694613c05 LoadLibraryW 259->267 260->259 262 7ff694613b71-7ff694613b8b CLSIDFromString 260->262 262->259 264 7ff694613b8d-7ff694613bb7 SetupDiGetClassDescriptionExW 262->264 264->259 266 7ff694613bb9-7ff694613bd5 call 7ff694617418 call 7ff694611094 264->266 266->267 269 7ff694613c0b-7ff694613c27 GetProcAddress 267->269 270 7ff694613daf-7ff694613dc1 SetupCloseInfFile 267->270 269->270 272 7ff694613c2d-7ff694613c5c memset 269->272 270->245 274 7ff694613dc3-7ff694613dcd FreeLibrary 270->274 277 7ff694613c9b-7ff694613cb2 call 7ff694617418 call 7ff694611094 272->277 278 7ff694613c5e-7ff694613c6f GetLastError 272->278 274->245 285 7ff694613cb7-7ff694613cdb SetupFindFirstLineW 277->285 278->277 280 7ff694613c71-7ff694613c82 GetLastError 278->280 280->277 282 7ff694613c84-7ff694613c99 call 7ff694617418 call 7ff694611094 280->282 282->285 287 7ff694613ce1-7ff694613d0f SetupGetStringFieldW 285->287 288 7ff694613d85-7ff694613d9a call 7ff694617418 call 7ff694611094 285->288 290 7ff694613d2c-7ff694613d39 call 7ff694617418 call 7ff694611094 287->290 291 7ff694613d11-7ff694613d2a call 7ff694617418 call 7ff694611094 287->291 304 7ff694613d9d-7ff694613daa call 7ff694617418 call 7ff694611094 288->304 305 7ff694613d3e-7ff694613d68 SetupGetStringFieldW 290->305 291->305 304->270 305->304 307 7ff694613d6a-7ff694613d83 call 7ff694617418 call 7ff694611094 305->307 307->270
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$ErrorLastString$FieldFindFirstLine$AddressClassDescriptionFileFromLibraryLoadOpenProcmemset
    • String ID: ClassGUID$DriverVer$Provider$SetupVerifyInfFile$Version$setupapi.dll
    • API String ID: 653204746-1638047923
    • Opcode ID: 564b6a287c9b88aca2cc48c980f14925d6c819359dbf66884c50b56fdeedf4fc
    • Instruction ID: d8e4926fc806ea996170937971a6f74391ee0bdde8f26b2402958dfd03a8f2b8
    • Opcode Fuzzy Hash: 564b6a287c9b88aca2cc48c980f14925d6c819359dbf66884c50b56fdeedf4fc
    • Instruction Fuzzy Hash: 70A17EB1A08A8286F730AB21E8901F966A0FF8DB55F44D1B5D92ED7784DF3CE549D700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 483 7ff6946132c4-7ff694613354 call 7ff694617510 memset * 2 SetupDiGetDeviceInstallParamsW 486 7ff694613749 483->486 487 7ff69461335a-7ff694613379 SetupDiSetDeviceInstallParamsW 483->487 489 7ff69461374b-7ff694613774 call 7ff694616ef0 486->489 487->486 488 7ff69461337f-7ff69461339d SetupDiBuildDriverInfoList 487->488 490 7ff694613729-7ff69461373f call 7ff694611184 call 7ff694617418 call 7ff694611094 488->490 491 7ff6946133a3-7ff6946133cf SetupDiEnumDriverInfoW 488->491 497 7ff694613744-7ff694613747 490->497 494 7ff69461370f-7ff694613727 SetupDiDestroyDriverInfoList 491->494 495 7ff6946133d5 491->495 494->490 494->497 499 7ff6946133d8-7ff694613429 call 7ff694617418 call 7ff694611094 SetupDiGetDriverInfoDetailW 495->499 497->489 507 7ff69461342b-7ff69461343a GetLastError 499->507 508 7ff69461343c-7ff69461347b call 7ff694611184 call 7ff694617418 call 7ff694611094 call 7ff694611184 call 7ff694617418 call 7ff694611094 499->508 507->508 509 7ff694613480-7ff694613500 call 7ff694611184 call 7ff694617418 call 7ff694611094 call 7ff694611184 call 7ff694617418 call 7ff694611094 call 7ff694611184 call 7ff694617418 call 7ff694611094 FileTimeToSystemTime 507->509 508->509 539 7ff694613557-7ff6946135cb call 7ff694611184 call 7ff694617418 call 7ff694611094 SetupDiGetDriverInstallParamsW 509->539 540 7ff694613502-7ff694613533 GetDateFormatW 509->540 553 7ff6946135d1-7ff694613622 call 7ff694611184 call 7ff694617418 call 7ff694611094 call 7ff694611184 call 7ff694617418 call 7ff694611094 539->553 554 7ff6946136d4-7ff694613709 SetupDiEnumDriverInfoW 539->554 540->539 542 7ff694613535-7ff694613552 call 7ff694611184 call 7ff694617418 call 7ff694611094 540->542 542->539 567 7ff694613644-7ff694613648 553->567 568 7ff694613624-7ff694613640 call 7ff694611184 call 7ff694617418 call 7ff694611094 553->568 554->494 554->499 569 7ff694613669-7ff69461366d 567->569 570 7ff69461364a-7ff694613665 call 7ff694611184 call 7ff694617418 call 7ff694611094 567->570 568->567 573 7ff69461368e-7ff694613692 569->573 574 7ff69461366f-7ff69461368a call 7ff694611184 call 7ff694617418 call 7ff694611094 569->574 570->569 576 7ff6946136b3-7ff6946136b7 573->576 577 7ff694613694-7ff6946136af call 7ff694611184 call 7ff694617418 call 7ff694611094 573->577 574->573 576->554 583 7ff6946136b9-7ff6946136cf call 7ff694611184 call 7ff694617418 call 7ff694611094 576->583 577->576 583->554
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$Driver$Info$InstallParams$DeviceEnumFormatListTimememset$BuildCharDateDestroyDetailErrorFileFreeLastLocalMessagePrevSystemfputws
    • String ID:
    • API String ID: 2199235825-3916222277
    • Opcode ID: 04f89785b6df9a3bfffd53cf9e2ae7aa516d764af16d114aa2dc309da656ddb3
    • Instruction ID: 7da77c97f5a4cef830a9e849d9a3f143e1c4608af55ea09d082542c4c6946ce0
    • Opcode Fuzzy Hash: 04f89785b6df9a3bfffd53cf9e2ae7aa516d764af16d114aa2dc309da656ddb3
    • Instruction Fuzzy Hash: 28C1A3B1B186C247FA34AB2194912FEA651FF8D744F44C479EA1E97786CE3CE444E740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 605 7ff6946161f0-7ff694616254 SetupDiGetDeviceInfoListDetailW 606 7ff69461625a-7ff694616289 CM_Get_Device_ID_ExW 605->606 607 7ff6946162f4 605->607 606->607 608 7ff69461628b-7ff6946162b7 CM_Get_DevNode_Status_Ex 606->608 609 7ff6946162f6-7ff694616320 call 7ff694616ef0 607->609 608->607 610 7ff6946162b9-7ff6946162be 608->610 612 7ff6946162c0-7ff6946162f0 wprintf call 7ff694617418 call 7ff694611094 610->612 613 7ff694616322-7ff694616337 call 7ff6946115e8 610->613 612->607 619 7ff694616339-7ff694616346 call 7ff6946114a0 613->619 620 7ff69461634c-7ff69461635b 613->620 619->620 631 7ff694616348-7ff69461634a 619->631 623 7ff694616539-7ff69461655e wprintf 620->623 624 7ff694616361-7ff694616364 620->624 628 7ff694616560-7ff694616565 623->628 629 7ff6946165a2-7ff6946165b0 wprintf 623->629 627 7ff694616369-7ff694616375 624->627 632 7ff694616377 627->632 633 7ff69461637f-7ff694616383 627->633 634 7ff694616568-7ff69461656b 628->634 630 7ff6946165b5-7ff6946165b8 629->630 630->631 635 7ff6946165be-7ff6946165c6 call 7ff6946115b4 630->635 631->609 636 7ff69461637a-7ff69461637d 632->636 633->636 637 7ff694616385-7ff694616389 633->637 638 7ff69461656d-7ff69461657b wprintf 634->638 639 7ff694616580-7ff6946165a0 wprintf 634->639 635->631 641 7ff69461639b 636->641 642 7ff69461638b-7ff69461638e 637->642 643 7ff694616390-7ff694616394 637->643 638->639 639->629 639->634 645 7ff69461639e-7ff6946163a2 641->645 642->641 644 7ff694616396 643->644 643->645 644->641 647 7ff6946165d8-7ff6946165dd 645->647 648 7ff6946163a8-7ff6946163ae 645->648 647->630 649 7ff6946163be-7ff6946163c1 648->649 650 7ff6946163b0 648->650 652 7ff6946163c7 649->652 653 7ff6946163c3-7ff6946163c5 649->653 651 7ff6946163b3-7ff6946163bc 650->651 651->649 651->651 654 7ff6946163c9-7ff6946163ee call 7ff694616b70 652->654 653->652 653->654 654->630 657 7ff6946163f4-7ff6946163f9 654->657 658 7ff6946163fb 657->658 659 7ff694616430 657->659 662 7ff6946163fe-7ff694616413 _wcsicmp 658->662 660 7ff69461643a-7ff69461643f 659->660 661 7ff694616432-7ff694616437 659->661 663 7ff694616476-7ff694616494 call 7ff6946114a0 call 7ff694616bb0 660->663 664 7ff694616441 660->664 661->660 665 7ff694616421-7ff694616427 662->665 666 7ff694616415-7ff69461641e 662->666 663->630 676 7ff69461649a-7ff6946164c6 call 7ff6946115b4 663->676 668 7ff694616446-7ff69461645b _wcsicmp 664->668 665->662 667 7ff694616429-7ff69461642e 665->667 666->665 667->659 670 7ff694616469-7ff69461646f 668->670 671 7ff69461645d-7ff694616466 668->671 670->668 673 7ff694616471 670->673 671->670 673->663 676->627 679 7ff6946164cc-7ff6946164cf 676->679 680 7ff6946165cb-7ff6946165d3 679->680 681 7ff6946164d5-7ff6946164e0 679->681 684 7ff69461651b-7ff694616537 SetupDiSetDeviceRegistryPropertyW 680->684 682 7ff6946164fd-7ff694616511 681->682 683 7ff6946164e2 681->683 682->630 686 7ff694616517 682->686 685 7ff6946164e5-7ff6946164ed 683->685 684->623 684->630 685->685 687 7ff6946164ef-7ff6946164fb 685->687 686->684 687->682 687->683
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Get_$CharDetailDeviceDevice_FormatFreeInfoListLocalMessageNode_PrevSetupStatus_fputwswprintf
    • String ID: %-60s:
    • API String ID: 1600579866-769737362
    • Opcode ID: 5fccd09aa755dc3fb9f06b51dcdbeabcd0cd67ba1d2805434f5031641155a501
    • Instruction ID: 19144cd665c7a074fa01e511f896270a51513ac89d06b4694e70196cec2da1b2
    • Opcode Fuzzy Hash: 5fccd09aa755dc3fb9f06b51dcdbeabcd0cd67ba1d2805434f5031641155a501
    • Instruction Fuzzy Hash: B8B190B6A08B8683EA308F11E58027D7BA4FB59B84F45D171DA6E87794DF3CE852D700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CharNext$_wcsnicmpwcschr$_wcsicmpiswalphatowlowertowupper
    • String ID: *
    • API String ID: 658721666-163128923
    • Opcode ID: 6c028171533642cf754e1c2f9030c6ee29d2d88fe8cbbbcee21d3451e464a59a
    • Instruction ID: 75c766f222c81c2bfdc030223778ca8e0aaa854c964ae34654c9be06101935b2
    • Opcode Fuzzy Hash: 6c028171533642cf754e1c2f9030c6ee29d2d88fe8cbbbcee21d3451e464a59a
    • Instruction Fuzzy Hash: DE51A5B1A08B9282EB705B16A4900B9BAA0FB4DFD1744C5B1DEBE83794DF3CE455E310

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Des_Res_$Get_$Data_Free_HandleNext_wprintf$Size_fputs
    • String ID: DMA : %u$IO : %04I64x-%04I64x$IRQ : %u$MEM : %08I64x-%08I64x
    • API String ID: 722776883-3427375868
    • Opcode ID: 9b08e2580fd995fd1323d7d8c7d3968f47489ccd5d6e3822b77bb76949f4117a
    • Instruction ID: b3d1612be9ad23b4f94e1571d1724af66ea8e271bb0fbf03dd6c56c324957efc
    • Opcode Fuzzy Hash: 9b08e2580fd995fd1323d7d8c7d3968f47489ccd5d6e3822b77bb76949f4117a
    • Instruction Fuzzy Hash: C851B1B2A047428BEB248F24D4946B9BBA0FB4DB98F44C175DE1D83795DF38E444D700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$DeviceDriverInstallParams$FileInfoQueue$Scanmemset$BuildCallCharClassDetailEnumErrorFormatFreeInstallerLastListLocalMessageOpenPrevSelectedfputsfputws
    • String ID:
    • API String ID: 3550884892-0
    • Opcode ID: 1c0340ecdef8709fe67892c2f2bd353b30d0c9940b17e42dad09206d73fa4277
    • Instruction ID: 1945f204125deda37356e7e9a6cc4b269349f360c2c16585c150162a93489a6e
    • Opcode Fuzzy Hash: 1c0340ecdef8709fe67892c2f2bd353b30d0c9940b17e42dad09206d73fa4277
    • Instruction Fuzzy Hash: B27170726086818BE7309B21E8911FEBBA5FB8DB94F448275DA2E87B95CF3CD505D700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$Device$Info$ClassCreateList$CallDestroyFullInstallerNamePathPropertyRegistrymemset
    • String ID:
    • API String ID: 2770198913-3916222277
    • Opcode ID: 637852011958671ebc2a86af737020983344680163c69d9b2c53f9f14a188548
    • Instruction ID: f88ffb59c05fecfa49054dbbda528f3acb916962ffdaa5f3cfb2e85734c23d02
    • Opcode Fuzzy Hash: 637852011958671ebc2a86af737020983344680163c69d9b2c53f9f14a188548
    • Instruction Fuzzy Hash: 2F5191B2A08A8186E764CB21E4907ADB7A1FB8CB94F848172DE6D87B84DF7CD505D740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Library$AddressErrorFreeFullLastLoadNamePathProc
    • String ID: SetupUninstallOEMInfW$setupapi.dll
    • API String ID: 3805412813-3713901415
    • Opcode ID: f826e6926d4abd4d1c32c8a32c69696b6dbc7c6ad6b6f534f13fffafd3e8f701
    • Instruction ID: 550ac5d522afdf855f3e716bbc8beedc54b4ced94abb303fb56872a41a0c6322
    • Opcode Fuzzy Hash: f826e6926d4abd4d1c32c8a32c69696b6dbc7c6ad6b6f534f13fffafd3e8f701
    • Instruction Fuzzy Hash: AB416C76A08A8283FB309B11E4953B96AA0FB8DB50F54C4B5DA6E83785CF3CE400D740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setupwprintf$CharClassCloseDetailDeviceFormatFreeInfoListLocalMessageOpenPrevQueryValuefputsfputws
    • String ID: %s$LowerFilters$UpperFilters
    • API String ID: 4180368772-1836264166
    • Opcode ID: c96146b135fb6446ec0d141a43b450ce88b596e9a6496a6f546279a038430dfb
    • Instruction ID: 68b7ec25415ac1989eb036ddae43b6b4ea72d493bd31d7c8027a594482ad2c53
    • Opcode Fuzzy Hash: c96146b135fb6446ec0d141a43b450ce88b596e9a6496a6f546279a038430dfb
    • Instruction Fuzzy Hash: 9B5184F0B0868252FD38A72294A11F85295EF8DB90F48C5B8D92F8B7C6DE3DE441E340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: FreeLibrary$AddressAttributesCharFileFormatFullLoadLocalMessageNamePathPrevProcfputws
    • String ID: UpdateDriverForPlugAndPlayDevicesW$newdev.dll
    • API String ID: 3139919817-3767700378
    • Opcode ID: b5a4fe77c619eed7b17a7eefbe38ac003ec55746e375a6d3b133f2d118feb241
    • Instruction ID: 5e7683d967ad2826c4ce71a99b40955e05ae15026e604d6d973bc32b5308b7ba
    • Opcode Fuzzy Hash: b5a4fe77c619eed7b17a7eefbe38ac003ec55746e375a6d3b133f2d118feb241
    • Instruction Fuzzy Hash: 4641B3B2A08B8286E7349F11E4942B9B7A4FB8CB81F4481B1DE5E93794DF3CE845D700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$ClassDeviceInstallParams$CallDetailDevice_Get_InfoInstallerListwprintf
    • String ID: %-60s: %s
    • API String ID: 1061212145-3470069224
    • Opcode ID: d8e35f1dae23d892e67c052b59891b43c6bb9e2ccfcc005567ed7e1e6362209c
    • Instruction ID: b214398cc27c05b3515a18b846523b3c64b120b6e06311679e8bbe2677748405
    • Opcode Fuzzy Hash: d8e35f1dae23d892e67c052b59891b43c6bb9e2ccfcc005567ed7e1e6362209c
    • Instruction Fuzzy Hash: 623150B2604AC1CAE7348F61E8447EABBA4FB4DB89F449175CA1D8BA94CF3CD505DB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: ClassSetup$BuildDescriptionErrorFromGuidInfoLastListNamemallocwprintf
    • String ID: %-20s: %s
    • API String ID: 894314750-1251934994
    • Opcode ID: 1f7e96aa73fb74d08126d1bbaf1fdb7694c13161de74e7aefa62b0d6292f9c7f
    • Instruction ID: b8c24aa3f70bb536b75b33d85b21f54697aab09e4d18901e07c665336ce07a4a
    • Opcode Fuzzy Hash: 1f7e96aa73fb74d08126d1bbaf1fdb7694c13161de74e7aefa62b0d6292f9c7f
    • Instruction Fuzzy Hash: D151D3B2A18A9286F730DB21E8917F967A0FB8DB94F408175DA6D83794CF3CE505D740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Library$Free$AddressLoadProc$AttributesFileFullNamePath
    • String ID: SetupSetNonInteractiveMode$setupapi.dll
    • API String ID: 298606531-1268865691
    • Opcode ID: d6473bd80b3354bc20dd18b845dee4fc7294c20c11b53f877abf81ad8315ab3c
    • Instruction ID: f5cfc820d38186ef400ee635f522f9158823e990a9fa092ef31cd5008a7035cd
    • Opcode Fuzzy Hash: d6473bd80b3354bc20dd18b845dee4fc7294c20c11b53f877abf81ad8315ab3c
    • Instruction Fuzzy Hash: F4212876B08B5182EB249B16A880029FBA0FB8DFD0B8485B5DE5E83B11DF3CE442D744
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: wprintf$DetailDeviceDevice_Get_InfoListSetup
    • String ID: %-60s: %s$%s
    • API String ID: 500149863-1339393084
    • Opcode ID: 22688ed9ad00e57f419abfa9b832a18cfacfc1b16a54d8d9094973b0933df31a
    • Instruction ID: 06a3d07fd783dd63da6748e4121086ce03a625f541ca8b9dbf694ef4821b61b8
    • Opcode Fuzzy Hash: 22688ed9ad00e57f419abfa9b832a18cfacfc1b16a54d8d9094973b0933df31a
    • Instruction Fuzzy Hash: 50215EB2A18A8286E7308B14F8807B9B760FB8DB85F84D571DA1E87654DF3CD549D700
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Conf_Get_Log_$First_$DetailDeviceFree_HandleInfoListNode_SetupStatus_
    • String ID:
    • API String ID: 950201049-0
    • Opcode ID: 31dd0be03b1e2ed74105f98b7802783fa533680d4a7a54325da88854b0cf6a6b
    • Instruction ID: 52cc94bf74cb4a13daf38d4362fb7f32c5b0479862309a4dd052e0ed465a4150
    • Opcode Fuzzy Hash: 31dd0be03b1e2ed74105f98b7802783fa533680d4a7a54325da88854b0cf6a6b
    • Instruction Fuzzy Hash: E041D172618682C7E760CF21E4D07BABBA0FB89B48F44A175EA4E87695CF3CD404DB40
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 4104442557-0
    • Opcode ID: ff399e0d3ff5fe37e71ae8076eddf2ae3c4423fb69a0fba1259bbe2426c4784e
    • Instruction ID: 6f23aac008eb723fe8c41110b7353dd8835b07e27ce3513f3a8c54482d1a7827
    • Opcode Fuzzy Hash: ff399e0d3ff5fe37e71ae8076eddf2ae3c4423fb69a0fba1259bbe2426c4784e
    • Instruction Fuzzy Hash: 84111A72A04F418AEB20DF70E8842A933A4FB4C758F444A35EA6D87B64DF7CD5A4C380
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: Setup$Class$InstallParams$CallDeviceInstallerwprintf$DetailDevice_Get_InfoList
    • String ID:
    • API String ID: 3776784670-0
    • Opcode ID: 8ce33fe5aa1e47d727e1c62a8cf72dee673e4573541e05452e905546d644a5c8
    • Instruction ID: 896d1c65fa5972d572f4b0646c7da2df6b9f3132a08649aee3e6eec86f927334
    • Opcode Fuzzy Hash: 8ce33fe5aa1e47d727e1c62a8cf72dee673e4573541e05452e905546d644a5c8
    • Instruction Fuzzy Hash: 8E412CB26086818AE7348F11E5943BDBAA0FB8EFC8F448165DA5D87B95CF3CD505DB40
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID:
    • API String ID: 140117192-0
    • Opcode ID: f73fcc106f6f841744f8b0324b0c44eff1169e70cc5ac8b3154f84bef4cecd31
    • Instruction ID: 82d66e240e048cd368c6debe6e154240214cda60b920beb964c04177014760ef
    • Opcode Fuzzy Hash: f73fcc106f6f841744f8b0324b0c44eff1169e70cc5ac8b3154f84bef4cecd31
    • Instruction Fuzzy Hash: ED41CAB5A08B4589EB208B19F8D03697764FB8CB84F508175DAADC3764DF7CE454E740
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: CharFormatFreeLocalMessagePrevfputws
    • String ID:
    • API String ID: 578739846-0
    • Opcode ID: 80f2999c9d4d5f92137bd9dbf908d4475c93929c27a24fa275eded79dab9367f
    • Instruction ID: f6ed5e6c046b2228e4c20f3cd843e1b04572d51ff8843da08bac168d7f3df280
    • Opcode Fuzzy Hash: 80f2999c9d4d5f92137bd9dbf908d4475c93929c27a24fa275eded79dab9367f
    • Instruction Fuzzy Hash: D62139B7A04B519AE7118F61E8844BC77B5FB88B54B568971CE2E43754EF34C851C310
    APIs
    Memory Dump Source
    • Source File: 00000028.00000002.1877620203.00007FF694611000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF694610000, based on PE: true
    • Associated: 00000028.00000002.1877600211.00007FF694610000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877638479.00007FF694618000.00000002.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877658108.00007FF69461B000.00000004.00000001.01000000.0000000B.sdmpDownload File
    • Associated: 00000028.00000002.1877678865.00007FF69461C000.00000002.00000001.01000000.0000000B.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_40_2_7ff694610000_devcon.jbxd
    Similarity
    • API ID: MachineNode_$Connect_Disconnect_Locate_Reenumerate_
    • String ID:
    • API String ID: 218754429-0
    • Opcode ID: bcf9bd167d5d9956257164c9fa32b781fcb5858d099143dc4dd555625cd9d9f3
    • Instruction ID: dbc1e0701fd36513bb668b613bfd7c2bbfd71f92c9b7d71a84289da23ea18124
    • Opcode Fuzzy Hash: bcf9bd167d5d9956257164c9fa32b781fcb5858d099143dc4dd555625cd9d9f3
    • Instruction Fuzzy Hash: 4F11D6B2B08AC682E7289F21E4905B9B7A1FFCDB84F45C574DA6E83655DF3CD404D600

    Execution Graph

    Execution Coverage:21.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:5.1%
    Total number of Nodes:354
    Total number of Limit Nodes:11
    execution_graph 1678 7ffe13201727 ReleaseMutex 1624 7ffe132057e4 1631 7ffe13205b20 1624->1631 1629 7ffe132057f1 1632 7ffe13205b28 InitializeCriticalSectionEx 1631->1632 1633 7ffe13205b5a 1632->1633 1634 7ffe13205b49 1632->1634 1636 7ffe13205b68 __vcrt_uninitialize_locks DeleteCriticalSection 1633->1636 1634->1632 1635 7ffe132057ed 1634->1635 1635->1629 1637 7ffe13205ab0 FlsAlloc 1635->1637 1636->1635 1638 7ffe13205acc FlsSetValue 1637->1638 1639 7ffe132057fa 1637->1639 1638->1639 1640 7ffe13205aed 1638->1640 1639->1629 1642 7ffe13205b68 1639->1642 1646 7ffe13205afc 1640->1646 1643 7ffe13205b93 1642->1643 1644 7ffe13205b97 1643->1644 1645 7ffe13205b76 DeleteCriticalSection 1643->1645 1644->1629 1645->1643 1647 7ffe13205b0b FlsFree 1646->1647 1648 7ffe13205b18 1646->1648 1647->1648 1648->1639 1679 7ffe13205ea2 1680 7ffe13205f26 1679->1680 1681 7ffe13205eba 1679->1681 1681->1680 1686 7ffe132059d0 1681->1686 1683 7ffe13205f07 1684 7ffe132059d0 7 API calls 1683->1684 1685 7ffe13205f1c terminate 1684->1685 1685->1680 1689 7ffe132059ec 1686->1689 1688 7ffe132059d9 1688->1683 1690 7ffe13205a0b GetLastError FlsGetValue 1689->1690 1691 7ffe13205a04 1689->1691 1692 7ffe13205a2a 1690->1692 1693 7ffe13205a94 SetLastError 1690->1693 1691->1688 1694 7ffe13205a34 FlsSetValue 1692->1694 1695 7ffe13205a2f 1692->1695 1693->1691 1694->1693 1696 7ffe13205a44 1694->1696 1695->1693 1697 7ffe13205a84 FlsSetValue 1696->1697 1698 7ffe13205a5f FlsSetValue 1696->1698 1701 7ffe13205a8c free 1697->1701 1699 7ffe13205a6c 1698->1699 1700 7ffe13205a7e 1698->1700 1699->1701 1700->1697 1701->1693 1317 7ffe13203940 1318 7ffe13203948 1317->1318 1319 7ffe13203b15 DbgPrintEx 1318->1319 1320 7ffe13203983 1318->1320 1321 7ffe13203a2d 1319->1321 1322 7ffe1320399c DbgPrintEx DbgPrintEx 1320->1322 1323 7ffe132039c5 1320->1323 1322->1323 1324 7ffe132039fb 1323->1324 1325 7ffe13203a34 1323->1325 1324->1321 1328 7ffe13203a04 DbgPrintEx DbgPrintEx 1324->1328 1326 7ffe13203a3d DbgPrintEx DbgPrintEx 1325->1326 1327 7ffe13203a66 1325->1327 1326->1327 1338 7ffe13203b50 1327->1338 1328->1321 1331 7ffe13203a8b DbgPrintEx DbgPrintEx 1332 7ffe13203ab4 1331->1332 1345 7ffe13201b18 1332->1345 1335 7ffe13203ac5 DbgPrintEx 1335->1321 1336 7ffe13203ae1 1336->1321 1337 7ffe13203aea DbgPrintEx DbgPrintEx 1336->1337 1337->1321 1339 7ffe13203b86 DbgPrintEx 1338->1339 1342 7ffe13203bad 1338->1342 1340 7ffe13203a78 1339->1340 1340->1321 1340->1331 1340->1332 1341 7ffe13203cbe DbgPrintEx 1342->1340 1342->1341 1343 7ffe13203c23 DbgPrintEx 1342->1343 1344 7ffe13203c9a DbgPrintEx 1342->1344 1343->1340 1344->1340 1346 7ffe13201b56 swprintf 1345->1346 1347 7ffe13201b69 OutputDebugStringA 1346->1347 1350 7ffe13201bca swprintf 1347->1350 1348 7ffe13201c0e 1353 7ffe13203d90 1348->1353 1350->1348 1352 7ffe13201bfe OutputDebugStringA 1350->1352 1352->1348 1354 7ffe13203d99 1353->1354 1355 7ffe13201c1e 1354->1355 1356 7ffe13204150 IsProcessorFeaturePresent 1354->1356 1355->1335 1355->1336 1357 7ffe13204168 1356->1357 1362 7ffe13204224 RtlCaptureContext 1357->1362 1363 7ffe1320423e RtlLookupFunctionEntry 1362->1363 1364 7ffe1320417b 1363->1364 1365 7ffe13204254 RtlVirtualUnwind 1363->1365 1366 7ffe13204110 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1364->1366 1365->1363 1365->1364 1367 7ffe13201c40 1368 7ffe13201c87 swprintf 1367->1368 1369 7ffe13201c99 OutputDebugStringA 1368->1369 1370 7ffe13201cc3 1369->1370 1371 7ffe13201d66 1370->1371 1373 7ffe13201d26 swprintf 1370->1373 1394 7ffe13202b38 1371->1394 1375 7ffe13201d52 OutputDebugStringA 1373->1375 1376 7ffe13201de9 1375->1376 1377 7ffe13203d90 8 API calls 1376->1377 1379 7ffe13201f0b 1377->1379 1384 7ffe13201e59 swprintf 1386 7ffe13201e8b OutputDebugStringA 1384->1386 1385 7ffe13201e9a 1412 7ffe1320103c CreateMutexW CreateMutexW 1385->1412 1386->1385 1388 7ffe13201e1f swprintf 1388->1385 1389 7ffe13201e4c OutputDebugStringA 1388->1389 1389->1384 1390 7ffe13201e9f swprintf 1391 7ffe13201ecb OutputDebugStringA 1390->1391 1416 7ffe1320196c malloc 1391->1416 1395 7ffe13202b7e swprintf 1394->1395 1396 7ffe13202b91 OutputDebugStringA 1395->1396 1397 7ffe13202baf swprintf 1396->1397 1398 7ffe13202c67 OutputDebugStringA 1397->1398 1399 7ffe13202c76 1397->1399 1398->1399 1400 7ffe13203d90 8 API calls 1399->1400 1401 7ffe13201dcc 1400->1401 1401->1376 1402 7ffe132027cc 1401->1402 1403 7ffe1320280d swprintf 1402->1403 1404 7ffe132028b8 OutputDebugStringA 1403->1404 1407 7ffe132028ca swprintf 1403->1407 1404->1407 1405 7ffe13203d90 8 API calls 1406 7ffe13201de5 1405->1406 1406->1376 1408 7ffe13201a54 1406->1408 1407->1405 1409 7ffe13201a98 1408->1409 1410 7ffe13201ada 1409->1410 1411 7ffe13201a9e RtlInitUnicodeString 1409->1411 1410->1384 1420 7ffe13202d08 1410->1420 1411->1410 1413 7ffe13203cf6 1412->1413 1414 7ffe13201076 malloc CreateThread CreateThread 1413->1414 1415 7ffe132010d9 1414->1415 1415->1390 1417 7ffe1320198b malloc 1416->1417 1418 7ffe132019a8 malloc 1416->1418 1419 7ffe132019a0 1417->1419 1418->1376 1419->1418 1421 7ffe13202d65 1420->1421 1422 7ffe13202dac RtlInitUnicodeString 1421->1422 1423 7ffe13202ea7 1421->1423 1426 7ffe13202e33 swprintf 1422->1426 1424 7ffe13203d90 8 API calls 1423->1424 1425 7ffe13202ed8 1424->1425 1425->1388 1426->1423 1427 7ffe13202e8c OutputDebugStringA 1426->1427 1427->1423 1446 7ffe132011a0 1447 7ffe132011e6 SleepEx 1446->1447 1448 7ffe132011f6 CreateNamedPipeW 1447->1448 1461 7ffe1320122b swprintf 1447->1461 1448->1461 1449 7ffe132013b6 WaitForSingleObject 1449->1447 1449->1461 1450 7ffe132013d5 ReadFile 1452 7ffe132013fa CloseHandle 1450->1452 1450->1461 1451 7ffe13201430 ReleaseMutex 1451->1447 1452->1451 1453 7ffe1320124c OutputDebugStringA 1453->1447 1454 7ffe13201297 OutputDebugStringA ConnectNamedPipe 1455 7ffe132012b8 GetLastError 1454->1455 1454->1461 1455->1461 1456 7ffe132013a3 CloseHandle 1456->1449 1457 7ffe132012f1 OutputDebugStringA 1457->1461 1458 7ffe13201316 WriteFile 1458->1456 1458->1461 1459 7ffe13201356 SleepEx ReadFile 1459->1461 1460 7ffe1320140f ReleaseMutex 1460->1449 1461->1449 1461->1450 1461->1451 1461->1453 1461->1454 1461->1456 1461->1457 1461->1458 1461->1459 1461->1460 1649 7ffe13205960 1650 7ffe1320597a 1649->1650 1651 7ffe13205969 1649->1651 1651->1650 1652 7ffe13205975 free 1651->1652 1652->1650 1653 7ffe13204454 1654 7ffe13204478 __scrt_release_startup_lock 1653->1654 1655 7ffe13205cb3 _seh_filter_dll 1654->1655 1656 7ffe13205e54 __scrt_dllmain_exception_filter 1706 7ffe13204414 1711 7ffe1320580c 1706->1711 1708 7ffe1320441d 1709 7ffe13204421 1708->1709 1714 7ffe13205820 1708->1714 1712 7ffe132059ec 7 API calls 1711->1712 1713 7ffe13205815 1712->1713 1713->1708 1717 7ffe13205980 1714->1717 1718 7ffe1320582b 1717->1718 1719 7ffe13205994 1717->1719 1718->1709 1720 7ffe13205999 FlsGetValue 1719->1720 1721 7ffe132059a8 FlsSetValue 1719->1721 1720->1721 1721->1718 1722 7ffe132059b5 1721->1722 1722->1718 1723 7ffe132059c1 free 1722->1723 1723->1718 1702 7ffe13205533 1704 7ffe132055b8 _IsNonwritableInCurrentImage __except_validate_context_record 1702->1704 1703 7ffe132056e0 1704->1703 1705 7ffe132056ab RtlUnwindEx 1704->1705 1705->1704 1428 7ffe13201450 1429 7ffe13201496 SleepEx 1428->1429 1430 7ffe132014a6 CreateNamedPipeW 1429->1430 1432 7ffe132014db swprintf 1429->1432 1430->1432 1431 7ffe13201680 WaitForSingleObject 1431->1429 1431->1432 1432->1431 1433 7ffe132016dd PeekNamedPipe 1432->1433 1434 7ffe132016a6 WriteFile 1432->1434 1435 7ffe132014fc OutputDebugStringA 1432->1435 1439 7ffe13201547 OutputDebugStringA ConnectNamedPipe 1432->1439 1441 7ffe1320164f FindCloseChangeNotification 1432->1441 1442 7ffe132015a1 OutputDebugStringA 1432->1442 1443 7ffe132015c6 WriteFile 1432->1443 1444 7ffe13201667 ReleaseMutex 1432->1444 1445 7ffe13201602 SleepEx ReadFile 1432->1445 1437 7ffe132016fe CloseHandle 1433->1437 1438 7ffe13201711 ReleaseMutex 1433->1438 1436 7ffe132016c4 1434->1436 1434->1437 1435->1429 1436->1438 1437->1438 1438->1429 1439->1432 1440 7ffe13201568 GetLastError 1439->1440 1440->1432 1441->1429 1442->1432 1443->1432 1443->1441 1444->1431 1445->1432 1462 7ffe13201f30 1463 7ffe13201f6f 1462->1463 1464 7ffe13202059 1463->1464 1465 7ffe13201fd0 1463->1465 1466 7ffe13202066 1464->1466 1467 7ffe132020bf 1464->1467 1474 7ffe13201ffa 1464->1474 1469 7ffe1320202c 1465->1469 1470 7ffe13201fdf 1465->1470 1471 7ffe1320206b 1466->1471 1472 7ffe132020af 1466->1472 1571 7ffe13203158 1467->1571 1519 7ffe13202fa4 1469->1519 1475 7ffe13201fe4 1470->1475 1476 7ffe1320200f 1470->1476 1478 7ffe13202070 1471->1478 1479 7ffe1320209f 1471->1479 1559 7ffe1320221c 1472->1559 1481 7ffe13201fe9 1475->1481 1482 7ffe13202002 1475->1482 1513 7ffe13202ef4 1476->1513 1483 7ffe13202075 1478->1483 1484 7ffe1320208f 1478->1484 1550 7ffe13203390 1479->1550 1481->1474 1490 7ffe132025bc 1481->1490 1500 7ffe132034b4 1482->1500 1483->1474 1528 7ffe132023a0 1483->1528 1538 7ffe13202448 1484->1538 1586 7ffe13202698 1490->1586 1492 7ffe132025ed 1494 7ffe13203d90 8 API calls 1492->1494 1493 7ffe13202646 1496 7ffe13202fa4 10 API calls 1493->1496 1497 7ffe1320268c 1494->1497 1496->1492 1497->1474 1498 7ffe13202608 swprintf 1499 7ffe13202634 OutputDebugStringA 1498->1499 1499->1492 1501 7ffe132034fd swprintf 1500->1501 1502 7ffe13203511 OutputDebugStringA 1501->1502 1595 7ffe13203860 1502->1595 1504 7ffe13203529 swprintf 1505 7ffe13203534 swprintf 1504->1505 1506 7ffe13203583 OutputDebugStringA 1504->1506 1507 7ffe13203669 OutputDebugStringA 1505->1507 1506->1505 1510 7ffe1320359a swprintf 1506->1510 1508 7ffe13203671 1507->1508 1509 7ffe13203d90 8 API calls 1508->1509 1511 7ffe13203680 1509->1511 1512 7ffe132035ce OutputDebugStringA 1510->1512 1511->1474 1512->1508 1514 7ffe13202f39 swprintf 1513->1514 1515 7ffe13202f7c 1514->1515 1518 7ffe13202f6f OutputDebugStringA 1514->1518 1516 7ffe13203d90 8 API calls 1515->1516 1517 7ffe13202f90 1516->1517 1517->1474 1518->1515 1520 7ffe13202ff7 1519->1520 1522 7ffe13202ffd swprintf 1520->1522 1524 7ffe13203066 swprintf 1520->1524 1521 7ffe1320302f OutputDebugStringA 1523 7ffe13203116 1521->1523 1522->1521 1522->1523 1526 7ffe13203d90 8 API calls 1523->1526 1525 7ffe13203094 OutputDebugStringA 1524->1525 1525->1523 1527 7ffe13203148 1526->1527 1527->1474 1529 7ffe13202698 10 API calls 1528->1529 1530 7ffe132023cd 1529->1530 1531 7ffe1320242e 1530->1531 1533 7ffe13202416 1530->1533 1536 7ffe132023d8 swprintf 1530->1536 1532 7ffe13203d90 8 API calls 1531->1532 1535 7ffe1320243e 1532->1535 1534 7ffe13202fa4 10 API calls 1533->1534 1534->1531 1535->1474 1537 7ffe13202404 OutputDebugStringA 1536->1537 1537->1531 1539 7ffe13202491 swprintf 1538->1539 1540 7ffe132024a5 OutputDebugStringA 1539->1540 1601 7ffe13203698 1540->1601 1543 7ffe13203d90 8 API calls 1546 7ffe132025a2 1543->1546 1544 7ffe132024d2 swprintf 1548 7ffe132024f9 OutputDebugStringA 1544->1548 1545 7ffe1320250d swprintf 1547 7ffe132024c3 1545->1547 1549 7ffe1320254b OutputDebugStringA 1545->1549 1546->1474 1547->1543 1548->1547 1549->1547 1551 7ffe132033cd swprintf 1550->1551 1552 7ffe132033e1 OutputDebugStringA 1551->1552 1553 7ffe13203860 9 API calls 1552->1553 1556 7ffe132033f9 swprintf 1553->1556 1554 7ffe132033ff 1555 7ffe13203d90 8 API calls 1554->1555 1557 7ffe1320349d 1555->1557 1556->1554 1558 7ffe13203447 OutputDebugStringA 1556->1558 1557->1474 1558->1554 1560 7ffe13202266 swprintf 1559->1560 1561 7ffe1320227a OutputDebugStringA 1560->1561 1562 7ffe13203698 10 API calls 1561->1562 1563 7ffe13202292 1562->1563 1565 7ffe13202298 1563->1565 1567 7ffe132022a7 swprintf 1563->1567 1568 7ffe132022e2 swprintf 1563->1568 1564 7ffe13203d90 8 API calls 1566 7ffe13202386 1564->1566 1565->1564 1566->1474 1569 7ffe132022ce OutputDebugStringA 1567->1569 1568->1565 1570 7ffe13202320 OutputDebugStringA 1568->1570 1569->1565 1570->1565 1572 7ffe132031a0 swprintf 1571->1572 1573 7ffe132031b4 OutputDebugStringA 1572->1573 1574 7ffe13203860 9 API calls 1573->1574 1575 7ffe132031cc 1574->1575 1576 7ffe132031d2 1575->1576 1577 7ffe1320321c 1575->1577 1580 7ffe132031e1 swprintf 1575->1580 1578 7ffe13203d90 8 API calls 1576->1578 1581 7ffe13203226 swprintf 1577->1581 1584 7ffe13203271 swprintf 1577->1584 1579 7ffe13203379 1578->1579 1579->1474 1582 7ffe13203208 OutputDebugStringA 1580->1582 1583 7ffe1320325a OutputDebugStringA 1581->1583 1582->1576 1583->1576 1584->1576 1585 7ffe1320331c OutputDebugStringA 1584->1585 1585->1576 1587 7ffe132026de 1586->1587 1588 7ffe132026e4 swprintf 1587->1588 1591 7ffe13202721 swprintf 1587->1591 1590 7ffe13202711 OutputDebugStringA 1588->1590 1589 7ffe1320279d 1592 7ffe13203d90 8 API calls 1589->1592 1590->1589 1591->1589 1593 7ffe13202788 OutputDebugStringA 1591->1593 1594 7ffe132025e9 1592->1594 1593->1589 1594->1492 1594->1493 1594->1498 1597 7ffe132038a5 swprintf 1595->1597 1596 7ffe132038e5 1598 7ffe13203d90 8 API calls 1596->1598 1597->1596 1599 7ffe132038d8 OutputDebugStringA 1597->1599 1600 7ffe13203926 1598->1600 1599->1596 1600->1504 1602 7ffe132036e9 1601->1602 1603 7ffe132036ef swprintf 1602->1603 1604 7ffe13203759 swprintf 1602->1604 1605 7ffe13203721 OutputDebugStringA 1603->1605 1607 7ffe1320380d 1603->1607 1606 7ffe1320378b OutputDebugStringA 1604->1606 1605->1607 1606->1607 1608 7ffe13203d90 8 API calls 1607->1608 1609 7ffe132024bd 1608->1609 1609->1544 1609->1545 1609->1547 1610 7ffe13202110 1611 7ffe13202149 1610->1611 1617 7ffe132021e1 1611->1617 1618 7ffe132010ec WaitForSingleObject 1611->1618 1613 7ffe13203d90 8 API calls 1614 7ffe1320220f 1613->1614 1616 7ffe13202fa4 10 API calls 1616->1617 1617->1613 1619 7ffe1320110c 1618->1619 1620 7ffe13201113 1618->1620 1619->1616 1621 7ffe1320114c 1620->1621 1622 7ffe13201133 ReleaseMutex 1620->1622 1623 7ffe13201178 ReleaseMutex 1621->1623 1622->1619 1623->1619 1657 7ffe132040d0 1658 7ffe132040ec 1657->1658 1659 7ffe132040f1 1657->1659 1661 7ffe13204298 1658->1661 1662 7ffe132042bb GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1661->1662 1663 7ffe1320432f 1661->1663 1662->1663 1663->1659 1664 7ffe132019d0 1666 7ffe132019e2 1664->1666 1665 7ffe13201a4b 1666->1665 1673 7ffe1320100c 1666->1673 1669 7ffe13201a0b malloc 1670 7ffe13201a26 1669->1670 1676 7ffe13201724 1670->1676 1674 7ffe1320101c WaitForSingleObject 1673->1674 1675 7ffe13201034 1673->1675 1674->1675 1675->1665 1675->1669 1677 7ffe13201727 ReleaseMutex 1676->1677

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugFileNamedOutputPipeStringswprintf$CloseMutexReleaseSleepWrite$ChangeConnectCreateErrorFindHandleLastNotificationObjectPeekReadSingleWait
    • String ID: Client connected to Tx Pipe$Couldn't create TX PIPE$Tx Pipe waiting for client to connect
    • API String ID: 2104952168-620275337
    • Opcode ID: ccde033439e10b9cae6ee0591f6f41d027f13791ba550421f44d8fdc33a4abd9
    • Instruction ID: 07880865cd859bd3bac8a6008a860a249505fd55eed83b92ccb8a9b1cf89d2f5
    • Opcode Fuzzy Hash: ccde033439e10b9cae6ee0591f6f41d027f13791ba550421f44d8fdc33a4abd9
    • Instruction Fuzzy Hash: 47811D65E18E468AF720AB13E9402BD67A2FFE4BA0F9041B5D94D66674CF3CE54CC740

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: Create$MutexThread$malloc
    • String ID:
    • API String ID: 526595258-0
    • Opcode ID: 2a8761151093c3bb8fe723215a9311d83cc1d2543bc904fd2bb983a195674f77
    • Instruction ID: bff5df80578c5e7b74d3a120ee1c9359a014916da90ad64245080c0af561495c
    • Opcode Fuzzy Hash: 2a8761151093c3bb8fe723215a9311d83cc1d2543bc904fd2bb983a195674f77
    • Instruction Fuzzy Hash: 1811A031B18F014BF728AB62E88676E6392FBE8724F94817DDA4E55670CF3CA00CC600

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugFileOutputStringswprintf$CloseHandleMutexNamedPipeReadReleaseSleep$ConnectCreateErrorLastObjectSingleWaitWrite
    • String ID: Client connected to Rx Pipe$Couldn't create RX PIPE$Rx Pipe waiting for client to connect
    • API String ID: 1972074743-3588961759
    • Opcode ID: ff1bbc41128ba2a93588fd681ccb65bf33ce0c646b4688b609364b64b3b30b10
    • Instruction ID: 6b6a1c62639909009fd94aa77b86f7a6925d8b72375d01ccbaab7c162f9e9938
    • Opcode Fuzzy Hash: ff1bbc41128ba2a93588fd681ccb65bf33ce0c646b4688b609364b64b3b30b10
    • Instruction Fuzzy Hash: 4181FC65E18E428AF620AB63E9401BD73A1FFE4B60FA041B6D54E666B4CF7CE50DC740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: Print
    • String ID: FxDriverEntryUm: DriverEntry failed 0x%x for driver %wZ$FxDriverEntryUm: PDRIVER_OBJECT_UM 0x%p Successfully bound to class library if present$FxDriverEntryUm: PDRIVER_OBJECT_UM 0x%p Successfully bound to version library$FxDriverEntryUm: PDRIVER_OBJECT_UM 0x%p Successfully returned from driver's DriverEntry$FxDriverEntryUm: VersionBind status 0x%x$FxDriverEntryUm: invalid LoaderInterface 0x%x$FxDriverEntrydUm Enter PDRIVER_OBJECT_UM 0x%p$Wudfx2000:
    • API String ID: 3558298466-464219049
    • Opcode ID: f9f4fa4e0a429dc2f3b1f90cd808eaf3d505fd65c7824ea117bca7e17036aa37
    • Instruction ID: dd8d290e321b7647ec117f724c494d22b5b7ea0da5c39e6f9c15f95b73c23f8e
    • Opcode Fuzzy Hash: f9f4fa4e0a429dc2f3b1f90cd808eaf3d505fd65c7824ea117bca7e17036aa37
    • Instruction Fuzzy Hash: 8D51EB35A08F429EF624AB53E8045AE6261FFE8BB8F5441B2D95973371CE3DE58DC240

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: PipesInit returned: %d$8$Enter EvtDeviceAdd$Error: WdfDeviceCreate failed 0x%x$Failed to read descriptor from registry$Using Hard-coded Report descriptor
    • API String ID: 79745889-3959671834
    • Opcode ID: 16241715f71f7b2e78ff04d06a918d562623767d11e0113e24a21ebd294e7297
    • Instruction ID: 38bcc5f08ab4ae6235d934f7d513b1da4bd396c43e3673a305765dac9143b913
    • Opcode Fuzzy Hash: 16241715f71f7b2e78ff04d06a918d562623767d11e0113e24a21ebd294e7297
    • Instruction Fuzzy Hash: 78815025A18F8689E750EF22E8402AD2364FBE8B64F508172EA4DA7775DF3CE54CC740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: 8$QUEUecre$WdfIoQueueCreate failed 0x%x
    • API String ID: 79745889-1312770787
    • Opcode ID: 90a3f2d5762d31625a14d2fc45adea2f86764422d7893843a7f10a0f03dde394
    • Instruction ID: c87c3f500a32ec8b673cfc9d14bff116f7034fc4ba7d4c86daed51fca821a68c
    • Opcode Fuzzy Hash: 90a3f2d5762d31625a14d2fc45adea2f86764422d7893843a7f10a0f03dde394
    • Instruction Fuzzy Hash: 1F51FE26A18B8189E710DB26E8802AD7760FBE8BA4F504176EE4D67775DF3CD149C700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: $DriverEntry for IDmelonHIDdrv$Error: WdfDriverCreate failed 0x%x
    • API String ID: 79745889-3519952669
    • Opcode ID: a22b21f8a936388fc97461c0f9945eeb537ba2ea1cc19efaa65f3d543d1f3138
    • Instruction ID: 3b7667670efea88c8d5e697355b7252160a1300cdfd2466236bf01959fc6a409
    • Opcode Fuzzy Hash: a22b21f8a936388fc97461c0f9945eeb537ba2ea1cc19efaa65f3d543d1f3138
    • Instruction Fuzzy Hash: 53216432A18F8585E720EB12F8453AE6364FBE8BA0F904171DA8D93769DF3DD548CB40

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: InitStringUnicode
    • String ID: ReadFromRegistry
    • API String ID: 4228678080-2823807924
    • Opcode ID: d7045735b450d10ca7eef2bf90baf95b1a0a9490a264fc47a8becad569abb2c4
    • Instruction ID: c608d836ea9827d806bc395123a8922fb8fede801d42632df73f94415806c39b
    • Opcode Fuzzy Hash: d7045735b450d10ca7eef2bf90baf95b1a0a9490a264fc47a8becad569abb2c4
    • Instruction Fuzzy Hash: 89112B75B08F068AEB009B16E88476D7360FBA8BA5F5001B2DE5C57334DF2EE499C740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: swprintf$DebugOutputString
    • String ID: ($($WdfIoQueueCreate failed 0x%x$WdfTimerCreate failed 0x%x
    • API String ID: 2627967256-2377412015
    • Opcode ID: c736806c944dfe9459cdeb6948cce325341392466bc6cae8614ca52d8a592f4c
    • Instruction ID: 90059fb9455ff816abcdd71ea05e86216791d7933f64b6c6926b90f0a07fc0cf
    • Opcode Fuzzy Hash: c736806c944dfe9459cdeb6948cce325341392466bc6cae8614ca52d8a592f4c
    • Instruction Fuzzy Hash: 30A13E62A18B8189E710DF62E8802ED3760F7E4BA8F505276EE4D63779DF38D198C740
    APIs
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 3140674995-0
    • Opcode ID: 344297d84c8067e6abf24d991a323fa6e0dc01afb207876c91f4e9e0aea85330
    • Instruction ID: 70008aee4d89971716d6615a739e3821c33a614b7436b7f5e456fb0145bdc15d
    • Opcode Fuzzy Hash: 344297d84c8067e6abf24d991a323fa6e0dc01afb207876c91f4e9e0aea85330
    • Instruction Fuzzy Hash: 11316E72608E8189EB60AF61E8503ED3361FB94764F40847ADA4E67BA4EF3CD54CCB10

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: SetFeature$SetFeature: IDMELONHID_CONTROL_CODE_DUMMY1$SetFeature: IDMELONHID_CONTROL_CODE_DUMMY2$SetFeature: Unknown control Code 0x%x$SetFeature: invalid input buffer. size %d, expect %d$SetFeature: invalid report id %d
    • API String ID: 79745889-321838564
    • Opcode ID: e010d420a2bb48320439f17d13db64a889c1f4fd4f3445e748223449e5cc304c
    • Instruction ID: 66f68b39dd571b6cf0aeb87a4acc731d0943dcaab66e3a907ddf893dd6081654
    • Opcode Fuzzy Hash: e010d420a2bb48320439f17d13db64a889c1f4fd4f3445e748223449e5cc304c
    • Instruction Fuzzy Hash: C4516065618E828DE720EB23E8502FE6360FBE4764F5440B1EA4D676B5DE3CE64CC740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: WriteReport$WriteReport: input buffer. size %d$WriteReport: iRequestGetHidXferPacket_ToWriteToDevice failed$WriteReport: information set bytes %d$WriteReport: invalid input buffer. size %d, expect %d
    • API String ID: 79745889-1969825649
    • Opcode ID: 27dc0d55051a149a62840a266a3792bc134b13d6674b58aa0cf559228ccf8a14
    • Instruction ID: cc97268e4305c55e8c8233471ea9ae384d09ec48496282a1203a6d4d46bca1e7
    • Opcode Fuzzy Hash: 27dc0d55051a149a62840a266a3792bc134b13d6674b58aa0cf559228ccf8a14
    • Instruction Fuzzy Hash: B8413F25A18E8189E720EF13E8546ED6720FBE4BA4F904071EA4D676B5DF3CE64DC700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: GetFeature$GetFeature: invalid report id %d$GetFeature: output buffer too small. Size %d, expect %d
    • API String ID: 79745889-3916486426
    • Opcode ID: 01a1b0822caab69461dbe954ec9eae928e8f7ba608eb4ac28a7acc99e7c711f7
    • Instruction ID: 9471e1a8b0b690e3f544aa205423e357031206883c4772b9f00a9b79d8250b68
    • Opcode Fuzzy Hash: 01a1b0822caab69461dbe954ec9eae928e8f7ba608eb4ac28a7acc99e7c711f7
    • Instruction Fuzzy Hash: EA417F26618E8199EB20EB23D8442BD7360FBE8BA4F504072EA4D67B75DF3DE549C700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: GetInputReport$GetInputReport: invalid report id %d$GetInputReport: output buffer too small. Size %d, expect %d
    • API String ID: 79745889-1024876767
    • Opcode ID: 3f22c7e6480db2682eeb50e5b7a68e78ab0da883729ff340ae19963219fc38ee
    • Instruction ID: b57c48b829c50da6133ef1c3411e0348e9c581b702bece2f61086ca9d5ab40b5
    • Opcode Fuzzy Hash: 3f22c7e6480db2682eeb50e5b7a68e78ab0da883729ff340ae19963219fc38ee
    • Instruction Fuzzy Hash: F5419121618E8299EB20EB23E8542FD6720FBE97A4F5040B2EA4D67775CE3CD54DC700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: WdfRequestRetrieveInputMemory failed 0x%x$WdfRequestRetrieveInputMemory: invalid input buffer. size %d, expect %d$WdfRequestRetrieveOutputMemory failed 0x%x
    • API String ID: 79745889-1090594742
    • Opcode ID: 80aff233d870849c0cbc87c11f867bbff2568ec6a4f4e4078b9fa3f26c915016
    • Instruction ID: 50b6ebc5211e41350e4c401a6c91698e81f1f2ded92b2bf405b7c01939665795
    • Opcode Fuzzy Hash: 80aff233d870849c0cbc87c11f867bbff2568ec6a4f4e4078b9fa3f26c915016
    • Instruction Fuzzy Hash: 0A413126608E8289E710EF56E8802EE6761FBE8BA4F504072DA4D67775CF3CD549C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: RequestCopyFromBuffer: buffer too small. Size %d, expect %d$WdfMemoryCopyFromBuffer failed 0x%x$WdfRequestRetrieveOutputMemory failed 0x%x
    • API String ID: 79745889-3405115737
    • Opcode ID: 2ec1cebfa06fe716da7dd59f542e31adca3a226b2322e9e272680fa5f53667f5
    • Instruction ID: b78c4db11058f4420094fbd849f9757b82336558c9ba3b7830894f62b4fde593
    • Opcode Fuzzy Hash: 2ec1cebfa06fe716da7dd59f542e31adca3a226b2322e9e272680fa5f53667f5
    • Instruction Fuzzy Hash: 44413026B18E418AE720AB17E8806EE6321FBE8BA4F504072EE4D67775DF3DD549C700
    APIs
    Strings
    • FxStubBindClasses: invalid driver image, the address of symbol __KMDF_CLASS_BIND_START 0x%p is greater than the address of symbol __KMDF_CLASS_BIND_END 0x%p, status 0x%x, xrefs: 00007FFE13203B8D
    • FxStubBindClasses: VersionBindClass WDF_CLASS_BIND_INFO 0x%p, class %S, returned status 0x%x, xrefs: 00007FFE13203C9E
    • FxGetNextClassBindInfo failed, xrefs: 00007FFE13203CC0
    • FxStubBindClasses: ClientBindClass %p, WDF_CLASS_BIND_INFO 0x%p, class %S, returned status 0x%x, xrefs: 00007FFE13203C27
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: Print
    • String ID: FxGetNextClassBindInfo failed$FxStubBindClasses: ClientBindClass %p, WDF_CLASS_BIND_INFO 0x%p, class %S, returned status 0x%x$FxStubBindClasses: VersionBindClass WDF_CLASS_BIND_INFO 0x%p, class %S, returned status 0x%x$FxStubBindClasses: invalid driver image, the address of symbol __KMDF_CLASS_BIND_START 0x%p is greater than the address of symbol __KMDF_CLASS_BIND_END 0x%p, status 0x%x
    • API String ID: 3558298466-25039098
    • Opcode ID: f02df258cd53c364223eff0353354d87365857eeac632ec2e8b57c0b11e4937c
    • Instruction ID: 92cbdaf28fc13c4f03893f27a3edb6afc47b2d5358da21c1b639ffb68f158449
    • Opcode Fuzzy Hash: f02df258cd53c364223eff0353354d87365857eeac632ec2e8b57c0b11e4937c
    • Instruction Fuzzy Hash: 97414E71A08E468AEA10EF17E8445AE73A0FBA8FA4F554172DA4D63374DF3CE54AC240
    APIs
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
    • String ID:
    • API String ID: 190073905-0
    • Opcode ID: 954c3e957acb9558f11fa21a36b279f32b61ef67e54de2f5c0e76da4e01a6560
    • Instruction ID: 57a90a152a49ffef8caee3764849b12e6de0ac1f218c6a351a1d1ed7df84c348
    • Opcode Fuzzy Hash: 954c3e957acb9558f11fa21a36b279f32b61ef67e54de2f5c0e76da4e01a6560
    • Instruction Fuzzy Hash: F781AF20E08E438EF654BB6794412BE62A1AFF57A0F5481B5DA0D737B6DE3CE44DCA40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: String$DebugInitOutputUnicodeswprintf
    • String ID: 8$MyReportDescriptor$No. of report descriptor bytes copied: %d
    • API String ID: 4008883908-1845194508
    • Opcode ID: b02a79a54b4ddba33779877d9069f3ab775a5e906b3da4e03cffeec6627880c0
    • Instruction ID: 9b9ba75050fc2f8ccab7c5b8cbb05245d233e4c2ce1f07132eaac92c5fe0d249
    • Opcode Fuzzy Hash: b02a79a54b4ddba33779877d9069f3ab775a5e906b3da4e03cffeec6627880c0
    • Instruction Fuzzy Hash: DF510736A08F468AE7109B16E8443AE7760F7E8BA4F500176DA8C57735CF7DE589C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: GetStringId: invalid input buffer. size %d, expect %d$WdfRequestRetrieveInputMemory failed 0x%x
    • API String ID: 79745889-555852278
    • Opcode ID: 38d0409d3813333f2bee9a46dfebe6d07e6bd4e1a022ccd2fc7e73a9e0900cbb
    • Instruction ID: e2ae582cca2db9a30b8afdeee56ea03db1908b01b14a072962f5a244842db25e
    • Opcode Fuzzy Hash: 38d0409d3813333f2bee9a46dfebe6d07e6bd4e1a022ccd2fc7e73a9e0900cbb
    • Instruction Fuzzy Hash: 04314475618E428AE721EB17E8542AE6360FBE8B60F504072DA4EA3775DF3CD549C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: SetOutputReport$SetOutputReport: invalid input buffer. size %d, expect %d
    • API String ID: 79745889-2303318144
    • Opcode ID: c11430cfef5bba140b3b919910bcc19f44db8ca4e0b832e1d45df74e04fbc7af
    • Instruction ID: 8aec76f9a958cdcc00d4f0fb3c30190635a69f3ddb1b7a7999dfc64216f2b8db
    • Opcode Fuzzy Hash: c11430cfef5bba140b3b919910bcc19f44db8ca4e0b832e1d45df74e04fbc7af
    • Instruction Fuzzy Hash: 64215321A18E8185E620EB17F8943AEA760FBE8BA0F504071EA8D67775DE3CD54DCB40
    APIs
    • GetLastError.KERNEL32(?,?,?,00007FFE13205815,?,?,?,?,00007FFE1320441D,?,?,?,?,00007FFE13203DDD), ref: 00007FFE13205A0B
    • FlsGetValue.KERNEL32(?,?,?,00007FFE13205815,?,?,?,?,00007FFE1320441D,?,?,?,?,00007FFE13203DDD), ref: 00007FFE13205A19
    • SetLastError.KERNEL32(?,?,?,00007FFE13205815,?,?,?,?,00007FFE1320441D,?,?,?,?,00007FFE13203DDD), ref: 00007FFE13205A96
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: ErrorLast$Value
    • String ID:
    • API String ID: 1883355122-0
    • Opcode ID: 3a53b49d89fcfb0990be15416f23b776ae89fad4ae039d28db4b36a074390e63
    • Instruction ID: a35c40a86d97186b5d726e9d0991bf851a03447b25232bd14c59104c62b558f8
    • Opcode Fuzzy Hash: 3a53b49d89fcfb0990be15416f23b776ae89fad4ae039d28db4b36a074390e63
    • Instruction Fuzzy Hash: 8B110020A0DE528AFE64AB27D84413D7251AFECBB0B6446B4D96E377F5DE2CA449C600
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: GetString: unkown string id %d$UMDF Virtual AccessKey FIDO HID Device Manufacturer string$UMDF Virtual AccessKey FIDO HID Device Product string$UMDF Virtual AccessKey FIDO HID Device Serial Number string
    • API String ID: 79745889-1896618911
    • Opcode ID: c4f2a244a1dc23aea743032f213965f659474282e2358e41eed4bfeb1af6266f
    • Instruction ID: 18d39f626284c223d521a1fc6e304047880b3acaaf4c8665db69219b150a794f
    • Opcode Fuzzy Hash: c4f2a244a1dc23aea743032f213965f659474282e2358e41eed4bfeb1af6266f
    • Instruction Fuzzy Hash: 00116061A1CA4289FA71BB17E4543BD6250EBEA760F8040B3E94D666B5DE2CE60CCB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
    • String ID: csm$f
    • API String ID: 2395640692-629598281
    • Opcode ID: fba172f9e0be19d4b70c4800c4adb321cd4f8c035479ce89570abe1b3d123658
    • Instruction ID: aafe0c0381131ff3246a8c69008c5dc05e9e969af15165aa8bc03d0de6e1216f
    • Opcode Fuzzy Hash: fba172f9e0be19d4b70c4800c4adb321cd4f8c035479ce89570abe1b3d123658
    • Instruction Fuzzy Hash: FA51B336A0DA02CED714EB16E404A3C3795FBA4BA8F708570DA0A67768DF78E848C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: GetString: unkown string index %d$UMDF Virtual AccessKey FIDO HID Device
    • API String ID: 79745889-2538044269
    • Opcode ID: eeeb98476b812c8bfa2d5e2a05108d0f48fbaa56241f4f89c7e4470fe9665883
    • Instruction ID: cefa436e77eb407c765e4b5b4b98c76aa84bbefd7c80a7da774c65c83d08cdcc
    • Opcode Fuzzy Hash: eeeb98476b812c8bfa2d5e2a05108d0f48fbaa56241f4f89c7e4470fe9665883
    • Instruction Fuzzy Hash: E6012165B28A4246E631BB13E4513EE6350FFE9764F805072EA4D66A75DF3CE14CCB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: WdfRequestRetrieveInputMemory failed 0x%x
    • API String ID: 79745889-1324185097
    • Opcode ID: bd0ce6cc008070f1534a7335cc03115e47e4efc729aa8a19adac5ad3c39e0905
    • Instruction ID: 560392792d2f0ac11551d2f67fb1913b51e28d10752cf44bd1d7194bdc785f75
    • Opcode Fuzzy Hash: bd0ce6cc008070f1534a7335cc03115e47e4efc729aa8a19adac5ad3c39e0905
    • Instruction Fuzzy Hash: 31111D35A18E4589E720AB17F8902AE73A0FBECBA4F404172DA8D93775DE3CD158CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000036.00000002.3598617377.00007FFE13201000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE13200000, based on PE: true
    • Associated: 00000036.00000002.3598576040.00007FFE13200000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598653168.00007FFE13206000.00000002.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598685469.00007FFE1320A000.00000004.00000001.01000000.0000000E.sdmpDownload File
    • Associated: 00000036.00000002.3598716690.00007FFE1320B000.00000002.00000001.01000000.0000000E.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_54_2_7ffe13200000_WUDFHost.jbxd
    Similarity
    • API ID: DebugOutputStringswprintf
    • String ID: WdfRequestForwardToIoQueue failed with 0x%x
    • API String ID: 79745889-420988317
    • Opcode ID: 4570f5cfa8f07c1f8e7aa15afdc99eb437d33734220852b2caeb4416c538655f
    • Instruction ID: a9143db5b319ac119cfc543f211a68066df2113dfafbbeb658c5ee8671fb2786
    • Opcode Fuzzy Hash: 4570f5cfa8f07c1f8e7aa15afdc99eb437d33734220852b2caeb4416c538655f
    • Instruction Fuzzy Hash: AC111B36B18E8189E721AF16E8913EE6360FBECBA4F804172DA8D53775DE2CD559C700