Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nyen2eabmfb.exe

Overview

General Information

Sample name:nyen2eabmfb.exe
Analysis ID:1495141
MD5:7ce622cc13886a55bfce9bcc088c8dc6
SHA1:6aa21ea3cbd05b2727c2f7cd5328532d617c0dd0
SHA256:994d73477a5e2a22bf00a7898bc2b8ad784ec844bc27dbc43c3aa5576d3ec397
Tags:exe
Infos:

Detection

44Caliber Stealer, BlackGuard, Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected 44Caliber Stealer
Yara detected BlackGuard
Yara detected Rags Stealer
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nyen2eabmfb.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\nyen2eabmfb.exe" MD5: 7CE622CC13886A55BFCE9BCC088C8DC6)
    • Insidious_protected.exe (PID: 6360 cmdline: "C:\Users\user\AppData\Local\Temp\Insidious_protected.exe" MD5: D9CCDE3B728FBA6D6E3F1B92C75A11A8)
      • WerFault.exe (PID: 2688 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 1608 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"Discord Webhook": "https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_HouSEGlNyNzsrVH6EfQxrh8\u0001Logs"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
  • 0xffc:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
  • 0x142c:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
    00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
      00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          1.2.Insidious_protected.exe.940000.0.unpackJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
            1.2.Insidious_protected.exe.940000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.Insidious_protected.exe.940000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                1.2.Insidious_protected.exe.940000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                  1.2.Insidious_protected.exe.940000.0.unpackJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                    Click to see the 3 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeAvira: detection malicious, Label: HEUR/AGEN.1351863
                    Source: 1.2.Insidious_protected.exe.940000.0.unpackMalware Configuration Extractor: 44Caliber Stealer {"Discord Webhook": "https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_HouSEGlNyNzsrVH6EfQxrh8\u0001Logs"}
                    Source: nyen2eabmfb.exeReversingLabs: Detection: 52%
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: freegeoip.app

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeUnpacked PE file: 1.2.Insidious_protected.exe.940000.0.unpack
                    Source: nyen2eabmfb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49743 version: TLS 1.2
                    Source: Binary string: FC:\Windows\symbols\dll\mscorlib.pdb4.0.30319\diasymreader.dllllFiles source: Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: diasymreader.dllib.pdbpdbktx source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: |C:\Windows\Microsoft.NET\Framework\v4.0.30319\diasymreader.dll_b77a5c561934e089\mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.pdbd source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdb0.? source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdbL}s source: Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: c:\windows\microsoft.net\assembly\gac_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbv source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdbY source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: .c:\windows\mscorlib.pdbpdbVS source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Fc:\windows\symbols\dll\mscorlib.pdbC_ source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001383000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb0 source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, WER33B7.tmp.dmp.4.dr
                    Source: Binary string: \Stealler\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdbe source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdbP source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxzip32\Release\sfxzip.pdb source: nyen2eabmfb.exe
                    Source: Binary string: System.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: Fc:\windows\symbols\dll\mscorlib.pdbC_) source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001383000.00000004.00000020.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040481A FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0040481A
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00409237 SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00409237
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then jmp 031336BAh1_2_0313351D
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then jmp 03137DA4h1_2_03137B21
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then jmp 03132CB4h1_2_03132BA8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then inc dword ptr [ebp-30h]1_2_0313F288
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then inc dword ptr [ebp-30h]1_2_03136560
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 4x nop then inc dword ptr [ebp-24h]1_2_03138CE0

                    Networking

                    barindex
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: freegeoip.app
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.appd
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.enigmaprotector.com/
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.enigmaprotector.com/openU
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                    Source: Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_Ho
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003E06000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                    Source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                    Source: Insidious_protected.exeString found in binary or memory: https://steamcommunity.com/profiles/
                    Source: Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004D35000.00000004.00000800.00020000.00000000.sdmp, tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: Insidious_protected.exe, 00000001.00000002.1861456782.0000000004D35000.00000004.00000800.00020000.00000000.sdmp, tmp3155.tmp.tmpdb.1.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49743 version: TLS 1.2

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY

                    System Summary

                    barindex
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                    Source: 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                    Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                    Source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004022670_2_00402267
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004055990_2_00405599
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040F0400_2_0040F040
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040F8200_2_0040F820
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004050C20_2_004050C2
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041A9F20_2_0041A9F2
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041C9B10_2_0041C9B1
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040EB6B0_2_0040EB6B
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041BB720_2_0041BB72
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004013EE0_2_004013EE
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040FC400_2_0040FC40
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041B47A0_2_0041B47A
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040F4140_2_0040F414
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004114D10_2_004114D1
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041AF360_2_0041AF36
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031353301_2_03135330
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313A0D01_2_0313A0D0
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313C7381_2_0313C738
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313EA811_2_0313EA81
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031399E81_2_031399E8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313F2791_2_0313F279
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313F2881_2_0313F288
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313C7281_2_0313C728
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031365501_2_03136550
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031365601_2_03136560
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031399DF1_2_031399DF
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_031388881_2_03138888
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_03138CE01_2_03138CE0
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_05E200401_2_05E20040
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_05E200071_2_05E20007
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: String function: 0040D7F0 appears 39 times
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: String function: 00411A98 appears 34 times
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: String function: 00998264 appears 46 times
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 1608
                    Source: nyen2eabmfb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                    Source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                    Source: 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                    Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                    Source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                    Source: Insidious_protected.exe.0.drStatic PE information: Section: ZLIB complexity 0.9968701972336066
                    Source: Insidious_protected.exe.0.drStatic PE information: Section: dhnhbfg ZLIB complexity 0.9962756849315069
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/15@1/1
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040D027 ShowWindow,GetWindowRect,GetParent,GetParent,MapWindowPoints,DestroyWindow,CoCreateInstance,GetParent,CreateWindowExW,ShowWindow,SetWindowTextW,ShowWindow,UpdateWindow,0_2_0040D027
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile created: C:\Users\user\AppData\Roaming\44Jump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6360
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_6631187Jump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: sfxcmd0_2_0040B0CF
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: sfxcmd0_2_0040B0CF
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: sfxname0_2_0040B0CF
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: STARTDLG0_2_0040B0CF
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: %C0_2_0040B0CF
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCommand line argument: @vA0_2_00417590
                    Source: nyen2eabmfb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003DB1000.00000004.00000800.00020000.00000000.sdmp, tmp31A5.tmp.dat.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: nyen2eabmfb.exeReversingLabs: Detection: 52%
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile read: C:\Users\user\Desktop\nyen2eabmfb.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\nyen2eabmfb.exe "C:\Users\user\Desktop\nyen2eabmfb.exe"
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeProcess created: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe "C:\Users\user\AppData\Local\Temp\Insidious_protected.exe"
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 1608
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeProcess created: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe "C:\Users\user\AppData\Local\Temp\Insidious_protected.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: riched32.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeSection loaded: pcacli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: nyen2eabmfb.exeStatic file information: File size 1392189 > 1048576
                    Source: nyen2eabmfb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: FC:\Windows\symbols\dll\mscorlib.pdb4.0.30319\diasymreader.dllllFiles source: Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: diasymreader.dllib.pdbpdbktx source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: |C:\Windows\Microsoft.NET\Framework\v4.0.30319\diasymreader.dll_b77a5c561934e089\mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.pdbd source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdb0.? source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdbL}s source: Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: c:\windows\microsoft.net\assembly\gac_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbv source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdbY source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: .c:\windows\mscorlib.pdbpdbVS source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Fc:\windows\symbols\dll\mscorlib.pdbC_ source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001383000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb0 source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdb source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1859218842.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, WER33B7.tmp.dmp.4.dr
                    Source: Binary string: \Stealler\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp
                    Source: Binary string: .C:\Windows\mscorlib.pdbpdbe source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001413000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: mscorlib.pdbP source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxzip32\Release\sfxzip.pdb source: nyen2eabmfb.exe
                    Source: Binary string: System.ni.pdb source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER33B7.tmp.dmp.4.dr
                    Source: Binary string: Fc:\windows\symbols\dll\mscorlib.pdbC_) source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001383000.00000004.00000020.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeUnpacked PE file: 1.2.Insidious_protected.exe.940000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.rsrc:EW;Unknown_Section4:EW;dhnhbfg:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;.rsrc:ER;Unknown_Section4:ER;dhnhbfg:ER;
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeUnpacked PE file: 1.2.Insidious_protected.exe.940000.0.unpack
                    Source: Insidious_protected.exe.0.drStatic PE information: 0x90591ACE [Fri Sep 28 14:44:30 2046 UTC]
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004082C8 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004082C8
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_6631187Jump to behavior
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name:
                    Source: Insidious_protected.exe.0.drStatic PE information: section name: dhnhbfg
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00411ADD push ecx; ret 0_2_00411AF0
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040DC90 push eax; ret 0_2_0040DCAE
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AD3A0 push 009AD400h; ret 1_2_009AD3F8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099C3EA push 0099C418h; ret 1_2_0099C410
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099C494 push 0099C4C0h; ret 1_2_0099C4B8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099C4F8 push 0099C52Ch; ret 1_2_0099C524
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099C424 push 0099C450h; ret 1_2_0099C448
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099C45C push 0099C488h; ret 1_2_0099C480
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AD456 push 009AD5A4h; ret 1_2_009AD59C
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AE454 push 009AE4A1h; ret 1_2_009AE499
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099A5F0 push 0099A641h; ret 1_2_0099A639
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009A453E push 009A46D8h; ret 1_2_009A46D0
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AC536 push 009AC5B5h; ret 1_2_009AC5AD
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AD684 push ecx; mov dword ptr [esp], ecx1_2_009AD687
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AB6A4 push 009AB74Ch; ret 1_2_009AB744
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009A46DA push 009A474Bh; ret 1_2_009A4743
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AB62C push 009AB6A2h; ret 1_2_009AB69A
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AB74E push 009AB79Ch; ret 1_2_009AB794
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099A8AA push 0099A8D8h; ret 1_2_0099A8D0
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AD8F4 push ecx; mov dword ptr [esp], ecx1_2_009AD8F6
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009AC804 push 009AC830h; ret 1_2_009AC828
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009A485E push 009A488Ch; ret 1_2_009A4884
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099A968 push 0099A994h; ret 1_2_0099A98C
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099BA48 push ecx; mov dword ptr [esp], eax1_2_0099BA49
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099BCF2 push 0099BD20h; ret 1_2_0099BD18
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009B7D94 push ecx; mov dword ptr [esp], edx1_2_009B7D96
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0099BD2C push 0099BD58h; ret 1_2_0099BD50
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_009A3D60 push ecx; mov dword ptr [esp], edx1_2_009A3D65
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_00996F90 push eax; ret 1_2_00996FCC
                    Source: Insidious_protected.exe.0.drStatic PE information: section name: entropy: 7.996321345870958
                    Source: Insidious_protected.exe.0.drStatic PE information: section name: dhnhbfg entropy: 7.978903931994907
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeFile created: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeJump to dropped file
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeMemory allocated: 3C40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeWindow / User API: threadDelayed 608Jump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-15325
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe TID: 6312Thread sleep count: 608 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe TID: 1892Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe TID: 1892Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040481A FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0040481A
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00409237 SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00409237
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeThread delayed: delay time: 600000Jump to behavior
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: &VBoxService.exe
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Insidious_protected.exe, 00000001.00000002.1859218842.0000000001437000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: VBoxService.exe
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858330946.0000000000ADA000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: ~VirtualMachineTypes
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858330946.0000000000ADA000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: VMWare
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: nyen2eabmfb.exe, 00000000.00000002.1662290345.000000000051B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                    Source: Insidious_protected.exe, 00000001.00000002.1858330946.0000000000ADA000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeAPI call chain: ExitProcess graph end nodegraph_0-15327
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeOpen window title or class name: ollydbg
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: SIWDEBUG
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: NTICE
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: SICE
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeCode function: 1_2_0313E018 LdrInitializeThunk,1_2_0313E018
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00412945 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00412945
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004082C8 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004082C8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00412945 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00412945
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041324B _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041324B
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004177EB __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_004177EB
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_004167F8 SetUnhandledExceptionFilter,0_2_004167F8
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeProcess created: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe "C:\Users\user\AppData\Local\Temp\Insidious_protected.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0040B681 cpuid 0_2_0040B681
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_004084E4
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: GetLocaleInfoA,0_2_00419600
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Insidious_protected.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_0041081F GetSystemTimeAsFileTime,0_2_0041081F
                    Source: C:\Users\user\Desktop\nyen2eabmfb.exeCode function: 0_2_00405D56 GetVersionExW,0_2_00405D56
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTR
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTR
                    Source: Insidious_protected.exeString found in binary or memory: Electrum
                    Source: Insidious_protected.exe, 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                    Source: Insidious_protected.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                    Source: Insidious_protected.exeString found in binary or memory: \Exodus\exodus.wallet\
                    Source: Insidious_protected.exeString found in binary or memory: \Ethereum\keystore
                    Source: Insidious_protected.exeString found in binary or memory: \Exodus\exodus.wallet\
                    Source: Insidious_protected.exeString found in binary or memory: Ethereum
                    Source: Insidious_protected.exeString found in binary or memory: \Exodus\exodus.wallet\
                    Source: Insidious_protected.exeString found in binary or memory: \Ethereum\keystore
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\Insidious_protected.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\Jump to behavior
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1860627199.0000000003CCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTR
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 1.2.Insidious_protected.exe.940000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Insidious_protected.exe PID: 6360, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Native API
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory241
                    Security Software Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)251
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS251
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                    Obfuscated Files or Information
                    Cached Domain Credentials2
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                    Software Packing
                    DCSync34
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Timestomp
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    nyen2eabmfb.exe53%ReversingLabsWin32.Trojan.ProtectorEnigma
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\Insidious_protected.exe100%AviraHEUR/AGEN.1351863
                    C:\Users\user\AppData\Local\Temp\Insidious_protected.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    https://support.mozilla.org0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    https://steamcommunity.com/profiles/ASOFTWARE0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_Ho0%Avira URL Cloudsafe
                    http://freegeoip.appd0%Avira URL Cloudsafe
                    http://www.enigmaprotector.com/openU0%Avira URL Cloudsafe
                    https://freegeoip.app0%Avira URL Cloudsafe
                    https://freegeoip.app/xml/0%Avira URL Cloudsafe
                    https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%Avira URL Cloudsafe
                    https://steamcommunity.com/profiles/0%Avira URL Cloudsafe
                    http://www.enigmaprotector.com/0%Avira URL Cloudsafe
                    https://api.vimeworld.ru/user/name/0%Avira URL Cloudsafe
                    http://freegeoip.app0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    freegeoip.app
                    188.114.97.3
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://freegeoip.app/xml/Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C41000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabInsidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmp3155.tmp.tmpdb.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/ac/?q=Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoInsidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://steamcommunity.com/profiles/ASOFTWAREInsidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.enigmaprotector.com/openUInsidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://freegeoip.appInsidious_protected.exe, 00000001.00000002.1860627199.0000000003E06000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://freegeoip.appdInsidious_protected.exe, 00000001.00000002.1860627199.0000000003E1C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ecosia.org/newtab/Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmp3155.tmp.tmpdb.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_HoInsidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchInsidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://steamcommunity.com/profiles/Insidious_protected.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.vimeworld.ru/user/name/Insidious_protected.exe, Insidious_protected.exe, 00000001.00000002.1860627199.0000000003C41000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/Insidious_protected.exe, 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.mozilla.orgtmp3155.tmp.tmpdb.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.enigmaprotector.com/Insidious_protected.exe, 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInsidious_protected.exe, 00000001.00000002.1860627199.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CC1000.00000004.00000800.00020000.00000000.sdmp, Insidious_protected.exe, 00000001.00000002.1861456782.0000000004CDB000.00000004.00000800.00020000.00000000.sdmp, tmp3156.tmp.dat.1.dr, tmp31D5.tmp.dat.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://freegeoip.appInsidious_protected.exe, 00000001.00000002.1860627199.0000000003E1C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      188.114.97.3
                      freegeoip.appEuropean Union
                      13335CLOUDFLARENETUStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1495141
                      Start date and time:2024-08-19 18:41:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 16s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:nyen2eabmfb.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@4/15@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 63%
                      • Number of executed functions: 138
                      • Number of non-executed functions: 66
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 52.168.117.173
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      • VT rate limit hit for: nyen2eabmfb.exe
                      TimeTypeDescription
                      12:42:16API Interceptor1x Sleep call for process: WerFault.exe modified
                      12:42:16API Interceptor1x Sleep call for process: Insidious_protected.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      188.114.97.3htxERaJl1W.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • 826430cl.nyashtop.top/_httpGeoprocessorApiServercentral.php
                      http://te.nhrnick.com/Get hashmaliciousUnknownBrowse
                      • te.nhrnick.com/
                      S#U0435tup.exeGet hashmaliciousCryptbotBrowse
                      • neintyy19sb.top/v1/upload.php
                      Official Salary for the Month of August 2024 - NU1622662404290592.exeGet hashmaliciousFormBookBrowse
                      • www.eraplay88rtpgacor.lat/pt46/?Cj90E=2U5FQK94ZXdB/CZGbEmAqiVYM6OiqGkb5XXzbZC/PxdEk7+YTa81A9JVSB2t8XsQKzff&GVWh=CdT0vvb
                      FedEx Shipping Document.exeGet hashmaliciousAzorultBrowse
                      • l0h5.shop/CM341/index.php
                      http://binanceevn.com/index/index/lang/ko-kr/Trade/tradelistGet hashmaliciousUnknownBrowse
                      • binanceevn.com/Verify/code
                      rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                      • jiourl.com/anbdld
                      rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                      • jiourl.com/anbdld
                      QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • filetransfer.io/data-package/qLW2DYuh/download
                      QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • filetransfer.io/data-package/jSVzi5ju/download
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      freegeoip.appCheat.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                      • 188.114.97.3
                      B5U2ccQ8H1.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                      • 188.114.97.3
                      xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                      • 188.114.96.3
                      Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                      • 104.21.73.97
                      qdHMT36Tn9.exeGet hashmalicious44Caliber Stealer, Njrat, Rags StealerBrowse
                      • 172.67.160.84
                      64drop.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                      • 104.21.73.97
                      123.scr.exeGet hashmaliciousUnknownBrowse
                      • 104.21.73.97
                      123.scr.exeGet hashmaliciousRags StealerBrowse
                      • 104.21.73.97
                      123.scr.exeGet hashmaliciousRags StealerBrowse
                      • 172.67.160.84
                      RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                      • 172.67.160.84
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUShttps://klo.ua/wp-admin/ivwaj.php?7-797967704b5369323074665053797a4c54453873535532714c456c4e3153736f7974635071437a4f31776341-EMAILBASE64Get hashmaliciousPhisherBrowse
                      • 104.18.95.41
                      file.exeGet hashmaliciousLummaCBrowse
                      • 104.21.42.119
                      https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAgtmudCdipeGj991qUjM8egV6814sux3rgVxmpQ9ZUPP1ghEiBFZhGbeUOXRNN8jh0-dHyQbAhKeqZWA47C7EGYTdl0WfoRVsVtug9eoPZA7XQynIL6EntGVhDjys02My&Get hashmaliciousHTMLPhisherBrowse
                      • 104.18.69.40
                      0calendarscope.exeGet hashmaliciousLummaC, Go InjectorBrowse
                      • 104.21.16.74
                      401(k) Form - 2024-Benefits_Payroll Increment forms August 19, 2024 Ref_ DZQYC08093.emlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                      • 1.1.1.1
                      0calendarscope.exeGet hashmaliciousLummaC, Go InjectorBrowse
                      • 104.21.16.74
                      http://www.schoolsfirstfcu.org/Get hashmaliciousHTMLPhisherBrowse
                      • 104.18.86.42
                      Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                      • 104.26.1.231
                      http://c.edenroccapcana.com/ls/click?upn=u001.Jn-2B86bq4-2BTiJxHNPPwPcYCI8kgIN5SgMVsh0PZASy68e8PfiJNNBWJDO0OTi4LanfpEM_4RP1x9IUOIErTvm2WxWl5Z4QOHYAHyqip8YZp5LnDUq2XDbdNfDjy6diHckdYWR8GC1dEEt7xSdN8AAjvxAX2Bm9o-2BOkQ2n6vZOgy-2B7FKI4GOiHXXq8x6jV9zcNhH5gjJkame8F7fM8Aqevcoon0XajMkJnRoEdr1XdadG6lGda9bAu8ypNWj-2BXlZOL364sErAfQKFUCI6icKnDJkCM54G94kCNmgYcjJ7O7XN3WE3weWshg7ndjzA8pRwkZSgtorZoyVU7pbJLbMJ36n12VHu-2FgCePJ7biPYlS-2BsyRSspvir83-2Fpis9txF5QaNsJ7OisIkCkf6AWDh8PO4T0qZfOmwoP9C4TdIL05Ei8E-2FqIGHXGLznTIjK94robfUyV9-2FcjnZw6p9hZrt-2BqFayVCySKDkBfWYI04HVWV9dTuhiGDP9IUsM7xHpc7XINVq2oAdWrED6q9PJEi-2FQCsB1V-2Bp7VA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                      • 104.26.1.107
                      http://c.edenroccapcana.com/ls/click?upn=u001.Jn-2B86bq4-2BTiJxHNPPwPcYGWsrseFjolhLrLWEGRlN2-2FMC1N1jDjAZCygaCkRyU1YUF5r-2FhbwgKOSprD14EFnk88tw-2FM4MudP4BP140Mg00Fc-2FfqHsZF-2FTwXztM9i7TyFduRBYEWtw5JKf2C58aaNTD7FsAVLxZvei2RKy6KJ0zk-3DQJJC_4RP1x9IUOIErTvm2WxWl5Z4QOHYAHyqip8YZp5LnDUq2XDbdNfDjy6diHckdYWR8GC1dEEt7xSdN8AAjvxAX2Bm9o-2BOkQ2n6vZOgy-2B7FKI4GOiHXXq8x6jV9zcNhH5gjJkame8F7fM8Aqevcoon0XajMkJnRoEdr1XdadG6lGda9bAu8ypNWj-2BXlZOL364sErAfQKFUCI6icKnDJkCM54G94kCNmgYcjJ7O7XN3WE3weWshg7ndjzA8pRwkZSgtorZoyVU7pbJLbMJ36n12VHtDByzGxfAPgCMtZ1VHOcvogFdRBZCOK4lQSeo1AoxQ0LzWDeDO74xbO3bEd-2FsqceilgTJc44gYSbRuJxM6QlrkTAxELXq4552N1PSxMFukSLx2PPLbRk8xExJzj-2BstsRDZ5Y9I4enWVAocJjkNEZ5xkY5LeZJsKwhZOXYSpHHYfWrqzgRdVS05JEg2QikjQyw-3D-3DGet hashmaliciousHTMLPhisherBrowse
                      • 104.19.153.19
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0ehttps://procore-drive.s3.amazonaws.com/ProcoreDriveSetup.exeGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      https://shared.outlook.inky.com/link?domain=urldefense.proofpoint.com&t=h.eJxVUE2PmzAU_CsrDpxK-AazEuqyS5JqE9Jmg9IoF8sYQ0jABtvANlX_eyGHSr08vfdmNKOZ30rPa-X5SblI2YpnXZ_OnBSECrJoOWNFyyoqF5g1-mDN4Nc-fFA1O4KwRFT2dJq3nuLqhjh5UCEcW82KK4rrPicCtqxhMJtYAjYVJVDNw3hMVtGo4pD067OQGKVxXQ9Vs9yBzL-e-Nh9L7TBjeBb3pb0WFRVkqg8fIXd7u7ffby-lqdsKIVxMQ7yLfnx06k3JzJoxLu6EBvQitQmBGP3vi9cfgCb66cZO4BdtpvOWtXYGjbgWwnPbZWIAzp3MoW_Rin2BMS7Na8OOydFGVNFCCInhbL-vBDf-xg-_KPdrtDyCMHyvt5v35k2bFPZs9fs7KgkVL48Kbe5TUok42Uhfd-37CDQy4JP8QvG5cu_DdFcMCoe3XrIJ7nrBHaW2aZrmJ4BDDezPexlhmvngW5OOi5wbDdYmLMLebigehJgL-guCUZNM0vNYD6D_z3__AXAcKQ4.MEUCIB-PNKp_9-d3drOD5owphdjbOwtYz5OQxdgeN5g2hPNUAiEAleTizC6zi0EZIypSMBPG6kkRYgzdslitxgPkKL9II8MGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      http://uspsmyr.infoGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      http://uspsnye.infoGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, zgRATBrowse
                      • 188.114.97.3
                      buidl.exeGet hashmaliciousXWormBrowse
                      • 188.114.97.3
                      IB987650098000044.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.97.3
                      Legal Action Documents PDF.bat.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                      • 188.114.97.3
                      PAGO.08.12.2024.lnk.lnkGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                      • 188.114.97.3
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):1.2067933120602308
                      Encrypted:false
                      SSDEEP:192:xCAoUrtFq80BU/ojeTmuSohJ/zuiFdZ24IO8p:gAoytFiBU/ojecsJ/zuiFdY4IO8p
                      MD5:850EB406D97CE077481EBC07CD007D9B
                      SHA1:98E35F6C387A07E74C075591D379820FA91CB6F6
                      SHA-256:0FE11575DBAA91CA830F9E084787059ECBCD40EDF32566FD0889C7E9D14C131B
                      SHA-512:C67F70735B6C819BE254D9A37B8EAA1989910B7EB0AC52F6E9E7472BBC6C652446F8EA2F4B9E0B57B4B5E4F5AD81D938032C229C6BA3DED901868C9B4C098947
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.8.5.5.9.3.1.7.4.4.0.7.9.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.8.5.5.9.3.1.9.1.4.3.9.2.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.0.8.e.1.2.9.-.5.d.5.4.-.4.2.6.d.-.a.f.c.e.-.9.0.5.8.9.7.3.9.9.c.6.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.d.c.5.3.e.9.-.b.f.7.6.-.4.e.b.5.-.b.c.f.d.-.9.f.8.6.a.5.9.b.8.2.c.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.n.s.i.d.i.o.u.s._.p.r.o.t.e.c.t.e.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.s.i.d.i.o.u.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.d.8.-.0.0.0.1.-.0.0.1.4.-.0.9.c.8.-.2.6.b.4.5.6.f.2.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.1.1.8.6.e.c.8.a.7.1.b.7.6.8.8.5.0.a.d.2.d.f.e.6.a.d.f.3.7.6.7.0.0.0.0.0.0.0.0.!.0.0.0.0.b.0.b.b.e.8.7.a.e.7.5.1.9.b.5.d.6.d.c.d.7.f.6.2.8.2.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 15 streams, Mon Aug 19 16:41:58 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):361651
                      Entropy (8bit):4.0239026922771455
                      Encrypted:false
                      SSDEEP:3072:K62QZACW54uEqIbx1LTg4GpmynutSWy4yFb5+r87N7prH:K6bjW54h9hTgHcyncSWh4bYGr
                      MD5:01E8395B368FE595D87AFFB806360C93
                      SHA1:A8CFD31D7D7C604D8EDDD4E46A1A5A4C791AD26F
                      SHA-256:B61FEAF58AFD464749C97903BCFBF9672E445058E027BBFB042462026769C95A
                      SHA-512:04BA3813650C2255C363A8BD49BB257A21D42190436BBAAC08A28C0613E4D55D3FDB39E1DD026868215B700CED21B6BC1E9096338C58768CC9C173E48043E521
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ........u.f............4...........<...H.......$....)......t>...g..........`.......8...........T............M...6...........)...........+..............................................................................eJ......,,......GenuineIntel............T............u.f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6422
                      Entropy (8bit):3.7134083671386504
                      Encrypted:false
                      SSDEEP:96:RSIU6o7wVetbWgA6ARYZK0QE/fOOL5aM4UZ89bBxsfgrm:R6l7wVeJWv6mYZbBprZ89bBxsfgrm
                      MD5:2DB6279B4E193228414C5B3415577AF5
                      SHA1:7D956766A456D98E3F135AC31931F78F6E42ED32
                      SHA-256:42B01E71A8FC01F1C312B18B4B2CF94E5ACF373BDDC7D8097F043B7E862BCE77
                      SHA-512:B5098430A9598A0E4DC0B9C956BC56D2E01D234B4471702B4037570A66302C4A626A05E18F2177A621DF6052C84770F67ED16FA1D89DD98F27BF174C52A74947
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.6.0.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4807
                      Entropy (8bit):4.482233772463647
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsrJg77aI9ATWpW8VYtYm8M4JbSF/+q8vpkXCGs/rUd:uIjfFI7ai7VJJwKGXCF/rUd
                      MD5:2E617CFC2D0295294F6E56874BF1F657
                      SHA1:F40D78DBA4049C0DB550A7F149EB410BF9C38D7F
                      SHA-256:A626E14443E8D90DC4F20D54498B41F60ED5F37362DC92F7E0094202E448D85A
                      SHA-512:E89FCB6AED131C4B5F6344000FC86B4AD071885E13836C01DE568E0A3E37FFE9E5E4F612674AD9ACED8432B58F97D711BF476AFDAE8BF3430D6174D96863C29F
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="462704" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Users\user\Desktop\nyen2eabmfb.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1241088
                      Entropy (8bit):7.9864201442596885
                      Encrypted:false
                      SSDEEP:24576:c1VJqwlZcf4XH1yfEXk3vc8W/jr1STXLmPz63V2HTiViv4qWVLiO6:c1VrlSfI1WlE7/ITq76lslAZxiO6
                      MD5:D9CCDE3B728FBA6D6E3F1B92C75A11A8
                      SHA1:B0BBE87AE7519B5D6DCD7F6282E891922971942D
                      SHA-256:D5A18B44A40E9BC1952BCE6E187B81926FFD358AA5EBE95921CDE2B9A72B172F
                      SHA-512:738F1B568009A6DF2FCAF2F1C8ABA6AEE91B4A66474E095D6E483B72EBF1D5309D33908DD1531407A69520B657BDFA75C6B3EDA796C20BF1542B632030E58DB4
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Y..........."..................... ........@.. ........................;...........`................................. @-...... .......................@-.................................................................................................. ......................@............ ..........................@............ ..........................@....rsrc.... ... ......................@.............(..@......................@....dhnhbfg.`...@-..B..................@...........................................T-Ta...`R9....N........................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):5242880
                      Entropy (8bit):0.037963276276857943
                      Encrypted:false
                      SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                      MD5:C0FDF21AE11A6D1FA1201D502614B622
                      SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                      SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                      SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.1358696453229276
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                      MD5:28591AA4E12D1C4FC761BE7C0A468622
                      SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                      SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                      SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.1358696453229276
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                      MD5:28591AA4E12D1C4FC761BE7C0A468622
                      SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                      SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                      SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):114688
                      Entropy (8bit):0.9746603542602881
                      Encrypted:false
                      SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                      MD5:780853CDDEAEE8DE70F28A4B255A600B
                      SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                      SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                      SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                      Malicious:false
                      Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):114688
                      Entropy (8bit):0.9746603542602881
                      Encrypted:false
                      SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                      MD5:780853CDDEAEE8DE70F28A4B255A600B
                      SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                      SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                      SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                      Malicious:false
                      Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):49152
                      Entropy (8bit):0.8180424350137764
                      Encrypted:false
                      SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                      MD5:349E6EB110E34A08924D92F6B334801D
                      SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                      SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                      SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):105
                      Entropy (8bit):3.8863455911790052
                      Encrypted:false
                      SSDEEP:3:RGtjybXLGSWK+ZjMGvRS3ZMz9GSOLj2SjyRE2qJ:hvWF7Ipg9OL2RE2m
                      MD5:2E9D094DDA5CDC3CE6519F75943A4FF4
                      SHA1:5D989B4AC8B699781681FE75ED9EF98191A5096C
                      SHA-256:C84C98BBF5E0EF9C8D0708B5D60C5BB656B7D6BE5135D7F7A8D25557E08CF142
                      SHA-512:D1F7EED00959E902BDB2125B91721460D3FF99F3BDFC1F2A343D4F58E8D4E5E5A06C0C6CDC0379211C94510F7C00D7A8B34FA7D0CA0C3D54CBBE878F1E9812B7
                      Malicious:false
                      Preview:### Get Help ###.### Customize Firefox ###.### Get Involved ###.### About Us ###.### Getting Started ###.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.465755112213309
                      Encrypted:false
                      SSDEEP:6144:wIXfpi67eLPU9skLmb0b4mWSPKaJG8nAgejZMMhA2gX4WABl0uNCdwBCswSbO:VXD94mWlLZMM6YFHo+O
                      MD5:0F53CBAE227551C39720E28C3BCC6B15
                      SHA1:13DE03E20CD657F703857FDE0A034D5F0449B0A4
                      SHA-256:C3B09BA3351149A6727B2494FBF5789A4AA5F35EFDEFE1FFB9255BA2966EEFBF
                      SHA-512:31A196B8BAF60F96FFCAC4C6A73C461CB93AD4C89F662A651752D4ACE86D39494C260BE7485C6AA58B2499D8B87C69965D13AB1640F181C0243DE8C898507B1D
                      Malicious:false
                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.6..V................................................................................................................................................................................................................................................................................................................................................^..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.951890590608692
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.53%
                      • InstallShield setup (43055/19) 0.43%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:nyen2eabmfb.exe
                      File size:1'392'189 bytes
                      MD5:7ce622cc13886a55bfce9bcc088c8dc6
                      SHA1:6aa21ea3cbd05b2727c2f7cd5328532d617c0dd0
                      SHA256:994d73477a5e2a22bf00a7898bc2b8ad784ec844bc27dbc43c3aa5576d3ec397
                      SHA512:d824d400f0663b3c7ad2a81a4fc449b78d1a01e97517168245716d2b454c7fc4e1bbc09af56a9913462626184a5db0b6f65ce77f2d5eb1ed39c5ed3bb505efad
                      SSDEEP:24576:fF6kcnUDuwg5tW2l8Ye01R7E/k3vy8OKtlm0PDwVOt3PAThh9qAM:0Lnw69lLeOhbq+GOt3PO5dM
                      TLSH:B755231178D8C032EA4059384646DBE6D62AB4356B29A58BFFCD07BE3F34A61D731B43
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......jr.{...(...(...('kq(4..('kg(...('kw(;..(...(...('k`(v..('kv(/..('kp(/..('ku(/..(Rich...(........................PE..L......S...
                      Icon Hash:2775250905472797
                      Entrypoint:0x410bba
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x53FE0A1C [Wed Aug 27 16:41:00 2014 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:53dbb427d4fc9e9527dfdd72661dae65
                      Instruction
                      call 00007FD48D05D4A6h
                      jmp 00007FD48D056E0Dh
                      push ebp
                      mov ebp, esp
                      sub esp, 04h
                      mov dword ptr [ebp-04h], edi
                      mov edi, dword ptr [ebp+08h]
                      mov ecx, dword ptr [ebp+0Ch]
                      shr ecx, 07h
                      pxor xmm0, xmm0
                      jmp 00007FD48D056F9Ah
                      lea esp, dword ptr [esp+00000000h]
                      nop
                      movdqa dqword ptr [edi], xmm0
                      movdqa dqword ptr [edi+10h], xmm0
                      movdqa dqword ptr [edi+20h], xmm0
                      movdqa dqword ptr [edi+30h], xmm0
                      movdqa dqword ptr [edi+40h], xmm0
                      movdqa dqword ptr [edi+50h], xmm0
                      movdqa dqword ptr [edi+60h], xmm0
                      movdqa dqword ptr [edi+70h], xmm0
                      lea edi, dword ptr [edi+00000080h]
                      dec ecx
                      jne 00007FD48D056F62h
                      mov edi, dword ptr [ebp-04h]
                      mov esp, ebp
                      pop ebp
                      ret
                      push ebp
                      mov ebp, esp
                      sub esp, 10h
                      mov dword ptr [ebp-04h], edi
                      mov eax, dword ptr [ebp+08h]
                      cdq
                      mov edi, eax
                      xor edi, edx
                      sub edi, edx
                      and edi, 0Fh
                      xor edi, edx
                      sub edi, edx
                      test edi, edi
                      jne 00007FD48D056FCEh
                      mov ecx, dword ptr [ebp+10h]
                      mov edx, ecx
                      and edx, 7Fh
                      mov dword ptr [ebp-0Ch], edx
                      cmp ecx, edx
                      je 00007FD48D056FA4h
                      sub ecx, edx
                      push ecx
                      push eax
                      call 00007FD48D056F08h
                      add esp, 08h
                      mov eax, dword ptr [ebp+08h]
                      mov edx, dword ptr [ebp-0Ch]
                      test edx, edx
                      je 00007FD48D056FD7h
                      add eax, dword ptr [ebp+10h]
                      sub eax, edx
                      mov dword ptr [ebp-08h], eax
                      xor eax, eax
                      mov edi, dword ptr [ebp-08h]
                      mov ecx, dword ptr [ebp-0Ch]
                      rep stosb
                      mov eax, dword ptr [ebp+08h]
                      jmp 00007FD48D056FC0h
                      neg edi
                      add edi, 10h
                      mov dword ptr [ebp-10h], edi
                      xor eax, eax
                      mov edi, dword ptr [ebp+08h]
                      Programming Language:
                      • [ASM] VS2008 SP1 build 30729
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2008 SP1 build 30729
                      • [EXP] VS2008 SP1 build 30729
                      • [LNK] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x215c00x33.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2040c0xc8.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x510000x4488.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x1d3900x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1f9900x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x1d0000x320.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x1be220x1c0002d137227f877e45391070f45e41cf177False0.5954764229910714data6.673377062810487IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x1d0000x45f30x4600a7c3f8fa001f3226179500ad474dd901False0.3888392857142857data5.36027998610278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x220000x2ef080x1600e33c6ccd86a2ad26006a3edf2365270dFalse0.3045099431818182data3.180715513249134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x510000x44880x460003442f2882d1c4bbb2e706378a6db4e6False0.3484375data5.1068861312165374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_BITMAP0x5154c0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/m0.2581721147431621
                      RT_ICON0x521040x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.6047297297297297
                      RT_ICON0x5222c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.4703757225433526
                      RT_ICON0x527940x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.4986559139784946
                      RT_ICON0x52a7c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.4444945848375451
                      RT_DIALOG0x533240x2c2data0.5169971671388102
                      RT_DIALOG0x535e80x13adata0.6624203821656051
                      RT_DIALOG0x537240xf2data0.71900826446281
                      RT_DIALOG0x538180x14edata0.5868263473053892
                      RT_DIALOG0x539680x318data0.476010101010101
                      RT_DIALOG0x53c800x24adata0.6262798634812287
                      RT_STRING0x53ecc0x1fcdata0.421259842519685
                      RT_STRING0x540c80x246data0.41924398625429554
                      RT_STRING0x543100x1dcdata0.5105042016806722
                      RT_STRING0x544ec0xdcdata0.65
                      RT_STRING0x545c80x43edata0.3821362799263352
                      RT_STRING0x54a080x164data0.5056179775280899
                      RT_STRING0x54b6c0xe4data0.6359649122807017
                      RT_STRING0x54c500xfadata0.46
                      RT_STRING0x54d4c0xbadata0.5967741935483871
                      RT_GROUP_ICON0x54e080x3edata0.8387096774193549
                      RT_MANIFEST0x54e480x640XML 1.0 document, ASCII text, with CRLF line terminators0.423125
                      DLLImport
                      COMCTL32.dllInitCommonControlsEx
                      SHLWAPI.dllSHAutoComplete
                      KERNEL32.dllCreateDirectoryW, FindClose, FindNextFileW, FindFirstFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, GetModuleFileNameW, FindResourceW, GetModuleHandleW, FreeLibrary, GetProcAddress, LoadLibraryW, GetCurrentProcessId, GetLocaleInfoW, GetNumberFormatW, ExpandEnvironmentStringsW, WaitForSingleObject, GetDateFormatW, GetTimeFormatW, FileTimeToSystemTime, FileTimeToLocalFileTime, GetExitCodeProcess, GetTempPathW, MoveFileExW, Sleep, UnmapViewOfFile, MapViewOfFile, GetCommandLineW, CreateFileMappingW, GetTickCount, SetEnvironmentVariableW, OpenFileMappingW, SystemTimeToFileTime, TzSpecificLocalTimeToSystemTime, LocalFileTimeToFileTime, WideCharToMultiByte, MultiByteToWideChar, CompareStringW, IsDBCSLeadByte, GetCPInfo, GlobalAlloc, SetCurrentDirectoryW, DeleteFileW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, LoadLibraryA, GetConsoleMode, GetConsoleCP, InitializeCriticalSectionAndSpinCount, QueryPerformanceCounter, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetModuleHandleA, LCMapStringW, LCMapStringA, IsValidCodePage, GetOEMCP, GetACP, HeapSize, GetModuleFileNameA, ExitProcess, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, InterlockedDecrement, GetCurrentThreadId, InterlockedIncrement, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, VirtualAlloc, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, MoveFileW, SetFileAttributesW, GetFileAttributesW, FlushFileBuffers, SetFileTime, ReadFile, GetFileType, SetEndOfFile, SetFilePointer, GetStdHandle, CloseHandle, WriteFile, CreateFileW, SetLastError, GetLastError, CreateFileA, WriteConsoleW, VirtualFree, HeapCreate, GetStartupInfoA, GetCommandLineA, GetSystemTimeAsFileTime, HeapAlloc, HeapReAlloc, RaiseException, RtlUnwind, HeapFree
                      USER32.dllEnableWindow, GetDlgItem, PostMessageW, ShowWindow, GetDC, ReleaseDC, FindWindowExW, GetParent, MapWindowPoints, CreateWindowExW, UpdateWindow, LoadCursorW, RegisterClassExW, DestroyWindow, CopyRect, IsWindow, OemToCharBuffA, LoadIconW, LoadBitmapW, DefWindowProcW, GetSysColor, SetForegroundWindow, MessageBoxW, WaitForInputIdle, IsWindowVisible, DialogBoxParamW, DestroyIcon, SetFocus, GetClassNameW, SendDlgItemMessageW, EndDialog, GetDlgItemTextW, SetDlgItemTextW, wvsprintfW, SendMessageW, PeekMessageW, GetMessageW, TranslateMessage, DispatchMessageW, LoadStringW, GetWindowRect, GetClientRect, SetWindowPos, GetWindowTextW, SetWindowTextW, GetSystemMetrics, GetWindow, GetWindowLongW, SetWindowLongW
                      GDI32.dllGetDeviceCaps, CreateCompatibleDC, CreateCompatibleBitmap, SelectObject, StretchBlt, DeleteDC, GetObjectW, DeleteObject, CreateDIBSection
                      ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegQueryValueExW, RegCreateKeyExW, RegSetValueExW
                      SHELL32.dllSHGetSpecialFolderLocation, SHGetMalloc, SHBrowseForFolderW, SHFileOperationW, SHGetFileInfoW, SHGetPathFromIDListW, SHChangeNotify, ShellExecuteExW
                      ole32.dllOleInitialize, CreateStreamOnHGlobal, CLSIDFromString, CoCreateInstance, OleUninitialize
                      OLEAUT32.dllVariantInit
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 19, 2024 18:41:58.464484930 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:41:58.464518070 CEST44349730188.114.97.3192.168.2.4
                      Aug 19, 2024 18:41:58.464605093 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:41:58.481570959 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:41:58.481587887 CEST44349730188.114.97.3192.168.2.4
                      Aug 19, 2024 18:41:58.962490082 CEST44349730188.114.97.3192.168.2.4
                      Aug 19, 2024 18:41:58.962599039 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:13.871458054 CEST44349730188.114.97.3192.168.2.4
                      Aug 19, 2024 18:42:13.871519089 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:17.540090084 CEST49730443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:17.540112972 CEST44349730188.114.97.3192.168.2.4
                      Aug 19, 2024 18:42:17.552767038 CEST49743443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:17.552815914 CEST44349743188.114.97.3192.168.2.4
                      Aug 19, 2024 18:42:17.553548098 CEST49743443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:17.553771973 CEST49743443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:17.553808928 CEST44349743188.114.97.3192.168.2.4
                      Aug 19, 2024 18:42:18.025836945 CEST44349743188.114.97.3192.168.2.4
                      Aug 19, 2024 18:42:18.025908947 CEST49743443192.168.2.4188.114.97.3
                      Aug 19, 2024 18:42:18.085597038 CEST49743443192.168.2.4188.114.97.3
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 19, 2024 18:41:58.446324110 CEST6503453192.168.2.41.1.1.1
                      Aug 19, 2024 18:41:58.454161882 CEST53650341.1.1.1192.168.2.4
                      Aug 19, 2024 18:42:41.884810925 CEST5358285162.159.36.2192.168.2.4
                      Aug 19, 2024 18:42:42.381088972 CEST53618671.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Aug 19, 2024 18:41:58.446324110 CEST192.168.2.41.1.1.10xf79fStandard query (0)freegeoip.appA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Aug 19, 2024 18:41:58.454161882 CEST1.1.1.1192.168.2.40xf79fNo error (0)freegeoip.app188.114.97.3A (IP address)IN (0x0001)false
                      Aug 19, 2024 18:41:58.454161882 CEST1.1.1.1192.168.2.40xf79fNo error (0)freegeoip.app188.114.96.3A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:41:56
                      Start date:19/08/2024
                      Path:C:\Users\user\Desktop\nyen2eabmfb.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\nyen2eabmfb.exe"
                      Imagebase:0x400000
                      File size:1'392'189 bytes
                      MD5 hash:7CE622CC13886A55BFCE9BCC088C8DC6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:12:41:56
                      Start date:19/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\Insidious_protected.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\Insidious_protected.exe"
                      Imagebase:0x940000
                      File size:1'241'088 bytes
                      MD5 hash:D9CCDE3B728FBA6D6E3F1B92C75A11A8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Yara matches:
                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000001.00000002.1860627199.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000001.00000002.1860627199.0000000003C5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_BlackGuard, Description: Yara detected BlackGuard, Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000001.00000002.1858288089.0000000000942000.00000040.00000001.01000000.00000007.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1860627199.0000000003CCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Antivirus matches:
                      • Detection: 100%, Avira
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:12:41:57
                      Start date:19/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 1608
                      Imagebase:0xb90000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:12.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:3.5%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:59
                        execution_graph 14716 40a847 14717 40a851 __EH_prolog __write_nolock 14716->14717 14874 40150b 14717->14874 14720 40a893 14722 40a87c 14720->14722 14725 40a906 GetDlgItemTextW 14720->14725 14726 40a89d 14720->14726 14721 40ae16 14723 40ae3a 14721->14723 14724 40ae2b SendMessageW 14721->14724 14727 40ae53 14723->14727 14728 40ae43 SendDlgItemMessageW 14723->14728 14724->14723 14729 40a8de 14725->14729 14730 40a937 14725->14730 14726->14729 14731 40a8a0 14726->14731 14935 408f9a 14727->14935 14728->14727 14729->14722 14735 40a8fa EndDialog 14729->14735 14733 40a94e GetDlgItem 14730->14733 14871 40a93f 14730->14871 14731->14722 14738 40822f 103 API calls 14731->14738 14736 40a962 SendMessageW SendMessageW 14733->14736 14737 40a988 SetFocus 14733->14737 14735->14722 14736->14737 14742 40a999 14737->14742 14756 40a9a5 14737->14756 14741 40a8ba 14738->14741 14740 40ae07 KiUserCallbackDispatcher 14740->14722 14985 401000 SHGetMalloc 14741->14985 14746 40822f 103 API calls 14742->14746 14743 40ae8a GetDlgItem 14747 40aea0 14743->14747 14748 40aea6 SetWindowTextW 14743->14748 14744 40adad 14749 40822f 103 API calls 14744->14749 14751 40a9a3 14746->14751 14747->14748 14955 40d266 GetClassNameW 14748->14955 14753 40adbe SetDlgItemTextW 14749->14753 14757 408625 12 API calls 14751->14757 14758 40add1 14753->14758 14754 40a8c9 SetDlgItemTextW 14754->14722 14761 40822f 103 API calls 14756->14761 14762 40a9f9 14757->14762 14765 40822f 103 API calls 14758->14765 14760 40aed3 14766 409b11 155 API calls 14760->14766 14820 40aee9 _wcscat 14760->14820 14763 40a9d7 14761->14763 14764 40aa0d 14762->14764 14989 408e65 14762->14989 14767 40bea8 _swprintf 100 API calls 14763->14767 14880 403bb9 14764->14880 14771 40adf6 14765->14771 14766->14820 14767->14751 14768 40af7f 14772 40afad 14768->14772 14775 40822f 103 API calls 14768->14775 14774 40822f 103 API calls 14771->14774 14776 40b049 14772->14776 14784 409b11 155 API calls 14772->14784 14779 40adfd MessageBoxW 14774->14779 14781 40af97 SetDlgItemTextW 14775->14781 14782 40b052 EnableWindow 14776->14782 14783 40b05c 14776->14783 14777 40aa21 GetLastError 14778 40aa2c 14777->14778 14886 40d23c SetCurrentDirectoryW 14778->14886 14779->14722 14787 40822f 103 API calls 14781->14787 14782->14783 14788 40b076 14783->14788 15024 4014c8 GetDlgItem KiUserCallbackDispatcher 14783->15024 14789 40afc6 14784->14789 14785 40aa41 14790 40aa53 14785->14790 14791 40aa48 GetLastError 14785->14791 14786 40af5a 14786->14768 14792 40af62 14786->14792 14794 40afa7 SetDlgItemTextW 14787->14794 14793 40b0a3 14788->14793 14807 40b095 SendMessageW 14788->14807 14808 40b09d PostMessageW 14788->14808 14796 40affa 14789->14796 14802 40afd7 14789->14802 14806 40aab4 ctype 14790->14806 14809 40aa64 GetTickCount 14790->14809 14791->14790 15006 40d027 ShowWindow 14792->15006 14793->14722 14811 40822f 103 API calls 14793->14811 14794->14772 14798 40b003 SetForegroundWindow 14796->14798 14799 40b03b 14796->14799 14798->14799 14810 40b013 14798->14810 14812 409b11 155 API calls 14799->14812 14800 40822f 103 API calls 14800->14820 14801 40b06d 15025 4014c8 GetDlgItem KiUserCallbackDispatcher 14801->15025 14804 40d027 89 API calls 14802->14804 14813 40afee 14804->14813 14805 40acd0 14895 4014e6 GetDlgItem ShowWindow 14805->14895 14806->14805 14814 40ac73 14806->14814 14815 40aaeb GetModuleFileNameW 14806->14815 14807->14793 14808->14793 14816 40bea8 _swprintf 100 API calls 14809->14816 14810->14799 14817 40b01b DialogBoxParamW 14810->14817 14818 40b0b5 SetDlgItemTextW 14811->14818 14812->14776 14822 40d81b _realloc 66 API calls 14813->14822 14821 40822f 103 API calls 14814->14821 14995 4083f8 14815->14995 14828 40aa7d 14816->14828 14817->14729 14817->14799 14818->14722 14820->14768 14820->14786 14820->14800 14825 40ac7d 14821->14825 14826 40aff9 14822->14826 14824 40ace2 14896 4014e6 GetDlgItem ShowWindow 14824->14896 14830 40bea8 _swprintf 100 API calls 14825->14830 14826->14796 14887 4031f3 14828->14887 14833 40ac9b 14830->14833 14831 40bea8 _swprintf 100 API calls 14834 40ab3d CreateFileMappingW 14831->14834 14832 40aceb 14897 4014c8 GetDlgItem KiUserCallbackDispatcher 14832->14897 14845 40822f 103 API calls 14833->14845 14838 40ac03 ShellExecuteExW 14834->14838 14839 40ab9c GetCommandLineW 14834->14839 14837 40acf3 14898 4014e6 GetDlgItem ShowWindow 14837->14898 14853 40ac20 14838->14853 14842 40aba6 14839->14842 14840 40aaa2 14840->14806 14843 40aaa9 GetLastError 14840->14843 14999 40859f SHGetMalloc SHGetSpecialFolderLocation SHGetPathFromIDListW 14842->14999 14843->14806 14844 40acfc SetDlgItemTextW GetDlgItem 14847 40ad34 14844->14847 14848 40ad1a GetWindowLongW SetWindowLongW 14844->14848 14849 40acb6 MessageBoxW 14845->14849 14899 409b11 14847->14899 14848->14847 14849->14805 14851 40859f 3 API calls 14854 40abce 14851->14854 14856 40ac35 WaitForInputIdle Sleep 14853->14856 14857 40ac58 14853->14857 14858 40859f 3 API calls 14854->14858 14856->14857 14862 40ac61 CloseHandle 14857->14862 14863 40ac6a 14857->14863 14860 40abda MapViewOfFile 14858->14860 14859 409b11 155 API calls 14861 40ad50 14859->14861 15001 40dfe0 14860->15001 14929 4096b0 14861->14929 14862->14863 14863->14729 14863->14814 14868 409b11 155 API calls 14872 40ad69 14868->14872 14869 40ad8f 15005 4014c8 GetDlgItem KiUserCallbackDispatcher 14869->15005 14871->14740 14871->14744 14872->14869 14873 409b11 155 API calls 14872->14873 14873->14869 14875 401514 14874->14875 14876 401538 14874->14876 14878 401536 14875->14878 15026 407fcc 14875->15026 15046 407a7b 14876->15046 14878->14720 14878->14721 14878->14722 14882 403bc6 __write_nolock _wcsncpy 14880->14882 14881 403c56 14883 403b38 86 API calls 14881->14883 14885 403c7a 14881->14885 14882->14881 14882->14885 15052 403b38 14882->15052 14883->14885 14885->14777 14885->14778 14886->14785 14888 403200 __write_nolock 14887->14888 14889 403220 CreateFileW 14888->14889 14890 40328d 14889->14890 14891 40325e 14889->14891 14890->14840 14892 406631 79 API calls 14891->14892 14893 403272 14892->14893 14893->14890 14894 403276 CreateFileW 14893->14894 14894->14890 14895->14824 14896->14832 14897->14837 14898->14844 14900 409b1b __EH_prolog __write_nolock 14899->14900 14901 40a6eb 14900->14901 15084 408b5a 14900->15084 14901->14859 14904 408b5a ExpandEnvironmentStringsW 14907 409b50 _wcscat _wcslen _wcsrchr _wcscpy 14904->14907 14905 409e6c SetWindowTextW 14905->14907 14907->14901 14907->14904 14907->14905 14910 409f0a RegOpenKeyExW 14907->14910 14924 40a061 SendMessageW 14907->14924 14927 409c53 _memset _wcscat _wcslen 14907->14927 15088 40c212 CompareStringW 14907->15088 15089 408eef 14907->15089 15096 40d24f GetCurrentDirectoryW 14907->15096 15097 4049b2 14907->15097 15106 4047ed 14907->15106 15109 408d06 14907->15109 14910->14907 14911 409f26 RegQueryValueExW RegCloseKey 14910->14911 14911->14907 14913 409c58 SetFileAttributesW 14916 409d16 GetFileAttributesW 14913->14916 14913->14927 14915 40d81b _realloc 66 API calls 14915->14927 14918 409d24 DeleteFileW 14916->14918 14916->14927 14918->14927 14920 4049b2 84 API calls 14920->14927 14922 40bea8 _swprintf 100 API calls 14923 409d56 GetFileAttributesW 14922->14923 14925 409d67 MoveFileW 14923->14925 14923->14927 14924->14907 14926 409d7f MoveFileExW 14925->14926 14925->14927 14926->14927 14927->14907 14927->14913 14927->14915 14927->14920 14927->14922 14928 409cf2 SHFileOperationW 14927->14928 15101 4065a2 14927->15101 15117 40e345 14927->15117 14928->14916 14930 4096ba _wcscpy __EH_prolog 14929->14930 15360 40b585 14930->15360 14932 4096e1 _wcscpy 15364 40c379 14932->15364 14934 409733 14934->14868 14936 408fa7 __write_nolock 14935->14936 16144 40d40a 14936->16144 14939 408fb4 GetWindow 14940 40908a GetDlgItem SendMessageW 14939->14940 14941 408fd1 14939->14941 14954 40d24f GetCurrentDirectoryW 14940->14954 14941->14940 14942 408fe6 GetClassNameW 14941->14942 14944 40900e GetWindowLongW 14941->14944 14945 40906f GetWindow 14941->14945 16149 40c212 CompareStringW 14942->16149 14944->14945 14946 40901e SendMessageW 14944->14946 14945->14940 14945->14941 14946->14945 14947 409030 GetObjectW 14946->14947 16150 40d3c7 14947->16150 14949 409045 16154 40d384 14949->16154 16158 40d429 GetDC GetDeviceCaps ReleaseDC 14949->16158 14953 409068 DeleteObject 14953->14945 14954->14743 14956 40d287 14955->14956 14957 40d2ac 14955->14957 16172 40c212 CompareStringW 14956->16172 14959 40d2b1 SHAutoComplete 14957->14959 14960 40aeb8 14957->14960 14959->14960 14963 4088cb 14960->14963 14961 40d29a 14961->14957 14962 40d29e FindWindowExW 14961->14962 14962->14957 14964 4088d5 __EH_prolog __write_nolock 14963->14964 16173 4030b8 14964->16173 14966 4088ff 14967 40e86c _malloc 66 API calls 14966->14967 14969 408903 ctype 14966->14969 14968 408924 14967->14968 14968->14969 16182 40384e 14968->16182 14969->14760 14972 403424 121 API calls 14973 408949 14972->14973 14974 40384e 121 API calls 14973->14974 14975 40896a 14974->14975 14976 40370a 124 API calls 14975->14976 14977 408977 14976->14977 14978 4032b8 120 API calls 14977->14978 14981 408984 14978->14981 14979 4089b9 14980 40d81b _realloc 66 API calls 14979->14980 14980->14969 14981->14979 14982 40e86c _malloc 66 API calls 14981->14982 14983 4089d5 14982->14983 14983->14979 14984 40c048 MultiByteToWideChar 14983->14984 14984->14979 14986 40101b SHBrowseForFolderW 14985->14986 14987 401017 14985->14987 14986->14987 14988 401058 SHGetPathFromIDListW 14986->14988 14987->14722 14987->14754 14988->14987 14991 408e72 __write_nolock 14989->14991 14990 408eea 14990->14764 14991->14990 14992 408e97 RegCreateKeyExW 14991->14992 14992->14990 14993 408ebd _wcslen 14992->14993 14994 408ec5 RegSetValueExW RegCloseKey 14993->14994 14994->14990 14996 408401 14995->14996 14997 40841a 14995->14997 16192 4083c3 14996->16192 14997->14831 15000 4085d5 14999->15000 15000->14851 15002 40dff8 15001->15002 15003 40e01f __VEC_memcpy 15002->15003 15004 40abf7 UnmapViewOfFile 15002->15004 15003->15004 15004->14838 15005->14871 16210 40cfc0 LoadCursorW RegisterClassExW 15006->16210 15008 40d04d GetWindowRect GetParent MapWindowPoints 15009 40d087 DestroyWindow 15008->15009 15010 40d08e CoCreateInstance 15008->15010 15009->15010 15011 40d0f3 15010->15011 15012 40d0bd GetParent CreateWindowExW 15010->15012 15013 40d137 15011->15013 15017 40d0fa 15011->15017 15012->15011 15014 40d150 15013->15014 15015 40d13e ShowWindow UpdateWindow 15013->15015 15023 40d134 15014->15023 16217 40c998 GetTickCount GetTickCount 15014->16217 15015->15014 15017->15023 16211 40cc8e 15017->16211 15021 40d119 ShowWindow SetWindowTextW 15022 40d81b _realloc 66 API calls 15021->15022 15022->15023 15023->14768 15024->14801 15025->14788 15049 407ee5 15026->15049 15028 407feb GetWindowRect GetClientRect 15029 4080c8 15028->15029 15035 40802f 15028->15035 15031 408111 GetSystemMetrics GetWindow 15029->15031 15032 4080d3 GetWindowTextW 15029->15032 15030 40810c 15030->15031 15034 408135 15031->15034 15033 407d8d 101 API calls 15032->15033 15038 4080fa SetWindowTextW 15033->15038 15037 408211 15034->15037 15041 408142 GetWindowTextW 15034->15041 15042 407d8d 101 API calls 15034->15042 15043 4081f3 GetWindow 15034->15043 15044 408189 GetWindowRect SetWindowPos 15034->15044 15035->15030 15036 408082 GetWindowLongW 15035->15036 15039 4080a2 SetWindowPos GetWindowRect 15036->15039 15040 40809b 15036->15040 15037->14878 15038->15031 15039->15029 15040->15039 15041->15034 15045 408173 SetWindowTextW 15042->15045 15043->15034 15043->15037 15044->15043 15045->15034 15047 407a81 GetWindowLongW SetWindowLongW 15046->15047 15048 407a9f 15046->15048 15047->15048 15048->14878 15050 407d8d 101 API calls 15049->15050 15051 407f0c _wcschr 15050->15051 15051->15028 15053 40d7f0 __write_nolock 15052->15053 15054 403b45 CreateDirectoryW 15053->15054 15055 403b59 15054->15055 15056 403b88 15054->15056 15065 403b14 15055->15065 15061 403b97 15056->15061 15068 4038fc 15056->15068 15060 403b9b GetLastError 15060->15061 15061->14882 15062 406631 79 API calls 15063 403b75 15062->15063 15063->15060 15064 403b79 CreateDirectoryW 15063->15064 15064->15056 15064->15060 15076 4038b0 15065->15076 15069 40d7f0 __write_nolock 15068->15069 15070 403909 SetFileAttributesW 15069->15070 15071 403922 15070->15071 15072 40394b 15070->15072 15073 406631 79 API calls 15071->15073 15072->15061 15074 403936 15073->15074 15074->15072 15075 40393a SetFileAttributesW 15074->15075 15075->15072 15077 40d7f0 __write_nolock 15076->15077 15078 4038bd GetFileAttributesW 15077->15078 15079 4038d1 15078->15079 15080 4038f4 15078->15080 15081 406631 79 API calls 15079->15081 15080->15060 15080->15062 15082 4038e5 15081->15082 15082->15080 15083 4038e9 GetFileAttributesW 15082->15083 15083->15080 15085 408b67 __write_nolock 15084->15085 15086 408c1e 15085->15086 15087 408bfb ExpandEnvironmentStringsW 15085->15087 15086->14907 15087->15086 15088->14907 15091 408efc __write_nolock 15089->15091 15090 408f96 GetDlgItem SetWindowTextW SendMessageW 15090->14907 15091->15090 15092 408f18 RegOpenKeyExW 15091->15092 15092->15090 15093 408f35 RegQueryValueExW 15092->15093 15094 408f61 15093->15094 15095 408f8d RegCloseKey 15093->15095 15094->15095 15095->15090 15096->14907 15099 4049c3 15097->15099 15098 40481a 84 API calls 15098->15099 15099->15098 15100 404a53 15099->15100 15100->14907 15102 4062ce 78 API calls 15101->15102 15103 4065b7 15102->15103 15104 40bea8 _swprintf 100 API calls 15103->15104 15105 4065ce _wcslen _wcschr _wcsncpy 15103->15105 15104->15105 15105->14927 15107 4047f8 FindClose 15106->15107 15108 4047ff 15106->15108 15107->15108 15108->14907 15110 408d13 __write_nolock 15109->15110 15154 40e86c 15110->15154 15114 408b5a ExpandEnvironmentStringsW 15116 408d30 _wcscat _wcslen _wcscpy 15114->15116 15115 408dd0 15115->14907 15116->15114 15116->15115 15118 40e351 _flsall 15117->15118 15119 40e366 15118->15119 15120 40e358 15118->15120 15122 40e379 15119->15122 15123 40e36d 15119->15123 15121 40e86c _malloc 66 API calls 15120->15121 15143 40e360 __dosmaperr _flsall 15121->15143 15130 40e4eb 15122->15130 15141 40e386 ___sbh_resize_block ___sbh_find_block 15122->15141 15124 40d81b _realloc 66 API calls 15123->15124 15124->15143 15125 40e51e 15127 414152 _malloc 6 API calls 15125->15127 15126 410fa0 __lock 66 API calls 15126->15141 15129 40e524 15127->15129 15128 40e4f0 HeapReAlloc 15128->15130 15128->15143 15131 410dab _write_string 66 API calls 15129->15131 15130->15125 15130->15128 15132 40e542 15130->15132 15133 414152 _malloc 6 API calls 15130->15133 15137 40e538 15130->15137 15131->15143 15134 410dab _write_string 66 API calls 15132->15134 15132->15143 15133->15130 15136 40e54b GetLastError 15134->15136 15136->15143 15138 410dab _write_string 66 API calls 15137->15138 15152 40e4b9 15138->15152 15139 40e411 HeapAlloc 15139->15141 15140 40e466 HeapReAlloc 15140->15141 15141->15125 15141->15126 15141->15139 15141->15140 15141->15143 15144 4117b2 ___sbh_alloc_block 5 API calls 15141->15144 15145 40e4d1 15141->15145 15146 414152 _malloc 6 API calls 15141->15146 15148 40dfe0 __VEC_memcpy _realloc 15141->15148 15150 40e4b4 15141->15150 15153 411003 VirtualFree VirtualFree HeapFree ___sbh_free_block 15141->15153 15356 40e489 15141->15356 15142 40e4be GetLastError 15142->15143 15143->14927 15144->15141 15145->15143 15147 410dab _write_string 66 API calls 15145->15147 15146->15141 15149 40e4de 15147->15149 15148->15141 15149->15136 15149->15143 15151 410dab _write_string 66 API calls 15150->15151 15151->15152 15152->15142 15152->15143 15153->15141 15155 40e87e 15154->15155 15156 40e91f 15154->15156 15159 40e88f 15155->15159 15164 40e8db RtlAllocateHeap 15155->15164 15166 408d1f 15155->15166 15167 40e90b 15155->15167 15170 40e910 15155->15170 15223 40e81d 15155->15223 15231 414152 15155->15231 15157 414152 _malloc 6 API calls 15156->15157 15158 40e925 15157->15158 15160 410dab _write_string 65 API calls 15158->15160 15159->15155 15177 414a77 15159->15177 15186 4148cc 15159->15186 15220 414618 15159->15220 15160->15166 15164->15155 15166->15116 15172 401657 15166->15172 15169 410dab _write_string 65 API calls 15167->15169 15169->15170 15171 410dab _write_string 65 API calls 15170->15171 15171->15166 15350 401614 15172->15350 15174 40165f 15175 4015ab RaiseException 15174->15175 15176 401668 15175->15176 15176->15116 15234 418f99 15177->15234 15180 414a8b 15182 4148cc __NMSG_WRITE 66 API calls 15180->15182 15185 414aad 15180->15185 15181 418f99 __set_error_mode 66 API calls 15181->15180 15183 414aa3 15182->15183 15184 4148cc __NMSG_WRITE 66 API calls 15183->15184 15184->15185 15185->15159 15187 4148e0 15186->15187 15188 414a3b 15187->15188 15189 418f99 __set_error_mode 63 API calls 15187->15189 15188->15159 15190 414902 15189->15190 15191 414a40 GetStdHandle 15190->15191 15192 418f99 __set_error_mode 63 API calls 15190->15192 15191->15188 15193 414a4e _strlen 15191->15193 15194 414913 15192->15194 15193->15188 15196 414a67 WriteFile 15193->15196 15194->15191 15195 414925 15194->15195 15195->15188 15240 417a3b 15195->15240 15196->15188 15199 41495b GetModuleFileNameA 15201 414979 15199->15201 15206 41499c _strlen 15199->15206 15203 417a3b _strcpy_s 63 API calls 15201->15203 15204 414989 15203->15204 15204->15206 15207 41324b __invoke_watson 10 API calls 15204->15207 15205 4149df 15265 418e70 15205->15265 15206->15205 15256 418ee4 15206->15256 15207->15206 15211 414a03 15214 418e70 _strcat_s 63 API calls 15211->15214 15213 41324b __invoke_watson 10 API calls 15213->15211 15215 414a17 15214->15215 15217 414a28 15215->15217 15218 41324b __invoke_watson 10 API calls 15215->15218 15216 41324b __invoke_watson 10 API calls 15216->15205 15274 418d07 15217->15274 15218->15217 15325 4145ed GetModuleHandleW 15220->15325 15224 40e829 _flsall 15223->15224 15225 410fa0 __lock 66 API calls 15224->15225 15226 40e85a _flsall 15224->15226 15227 40e83f 15225->15227 15226->15155 15329 4117b2 15227->15329 15232 4129cf __decode_pointer 6 API calls 15231->15232 15233 414162 15232->15233 15233->15155 15235 418fa8 15234->15235 15236 410dab _write_string 66 API calls 15235->15236 15238 414a7e 15235->15238 15237 418fcb 15236->15237 15239 413373 __calloc_impl 6 API calls 15237->15239 15238->15180 15238->15181 15239->15238 15241 417a53 15240->15241 15242 417a4c 15240->15242 15243 410dab _write_string 66 API calls 15241->15243 15242->15241 15247 417a79 15242->15247 15244 417a58 15243->15244 15245 413373 __calloc_impl 6 API calls 15244->15245 15246 414947 15245->15246 15246->15199 15249 41324b 15246->15249 15247->15246 15248 410dab _write_string 66 API calls 15247->15248 15248->15244 15301 40d700 15249->15301 15251 413278 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15252 413354 GetCurrentProcess TerminateProcess 15251->15252 15253 413348 __invoke_watson 15251->15253 15303 412945 15252->15303 15253->15252 15255 413371 15255->15199 15261 418ef6 15256->15261 15257 418efa 15258 4149cc 15257->15258 15259 410dab _write_string 66 API calls 15257->15259 15258->15205 15258->15216 15260 418f16 15259->15260 15262 413373 __calloc_impl 6 API calls 15260->15262 15261->15257 15261->15258 15263 418f40 15261->15263 15262->15258 15263->15258 15264 410dab _write_string 66 API calls 15263->15264 15264->15260 15266 418e88 15265->15266 15269 418e81 15265->15269 15267 410dab _write_string 66 API calls 15266->15267 15268 418e8d 15267->15268 15270 413373 __calloc_impl 6 API calls 15268->15270 15269->15266 15272 418ebc 15269->15272 15271 4149f2 15270->15271 15271->15211 15271->15213 15272->15271 15273 410dab _write_string 66 API calls 15272->15273 15273->15268 15312 4129c6 15274->15312 15277 418d2a LoadLibraryA 15278 418e54 15277->15278 15279 418d3f GetProcAddress 15277->15279 15278->15188 15279->15278 15282 418d55 15279->15282 15280 418ddc 15284 4129cf __decode_pointer 6 API calls 15280->15284 15300 418e07 15280->15300 15281 418db2 15281->15280 15285 4129cf __decode_pointer 6 API calls 15281->15285 15315 412954 TlsGetValue 15282->15315 15283 4129cf __decode_pointer 6 API calls 15283->15278 15294 418e1f 15284->15294 15288 418dcf 15285->15288 15290 4129cf __decode_pointer 6 API calls 15288->15290 15290->15280 15296 4129cf __decode_pointer 6 API calls 15294->15296 15294->15300 15296->15300 15300->15283 15302 40d70c __VEC_memzero 15301->15302 15302->15251 15304 41294d 15303->15304 15305 41294f IsDebuggerPresent 15303->15305 15304->15255 15311 41852f 15305->15311 15308 4177b2 SetUnhandledExceptionFilter UnhandledExceptionFilter 15309 4177d7 GetCurrentProcess TerminateProcess 15308->15309 15310 4177cf __invoke_watson 15308->15310 15309->15255 15310->15309 15311->15308 15313 412954 __encode_pointer 6 API calls 15312->15313 15314 4129cd 15313->15314 15314->15277 15314->15281 15316 41298d GetModuleHandleW 15315->15316 15317 41296c 15315->15317 15317->15316 15326 414601 GetProcAddress 15325->15326 15327 414616 ExitProcess 15325->15327 15326->15327 15328 414611 15326->15328 15328->15327 15331 4117e0 15329->15331 15330 411879 15333 40e84a 15330->15333 15345 4113c9 15330->15345 15331->15330 15331->15333 15338 411319 15331->15338 15335 40e863 15333->15335 15349 410ec6 LeaveCriticalSection 15335->15349 15337 40e86a 15337->15226 15339 411360 HeapAlloc 15338->15339 15340 41132c HeapReAlloc 15338->15340 15341 41134a 15339->15341 15343 411383 VirtualAlloc 15339->15343 15340->15341 15342 41134e 15340->15342 15341->15330 15342->15339 15343->15341 15344 41139d HeapFree 15343->15344 15344->15341 15346 4113e0 VirtualAlloc 15345->15346 15348 411427 15346->15348 15348->15333 15349->15337 15353 4015dc 15350->15353 15352 40161e 15352->15174 15354 40bc2f 118 API calls 15353->15354 15355 4015f8 15354->15355 15355->15352 15359 410ec6 LeaveCriticalSection 15356->15359 15358 40e490 15358->15141 15359->15358 15361 40b592 _wcslen 15360->15361 15370 40b4f9 15361->15370 15363 40b5aa _wcscpy 15363->14932 15365 40c383 _memset __EH_prolog 15364->15365 15388 4079d2 15365->15388 15368 40d81b _realloc 66 API calls 15369 40c3b8 15368->15369 15369->14934 15371 40b56b 15370->15371 15372 40b50b 15370->15372 15371->15363 15373 40b534 15372->15373 15375 40b51e 15372->15375 15377 40e345 _realloc 72 API calls 15373->15377 15383 4016ac 15375->15383 15381 40b554 15377->15381 15379 401657 119 API calls 15379->15373 15380 40b563 15380->15371 15381->15380 15382 401657 119 API calls 15381->15382 15382->15380 15384 40de44 __vswprintf_c_l 100 API calls 15383->15384 15385 4016cf 15384->15385 15386 40162e 118 API calls 15385->15386 15387 4016e0 15386->15387 15387->15379 15395 4068d5 15388->15395 15390 4079da 15394 4079f3 15390->15394 15403 4078c7 15390->15403 15394->15368 15394->15369 15396 40e86c _malloc 66 API calls 15395->15396 15397 4068df 15396->15397 15398 40e86c _malloc 66 API calls 15397->15398 15399 4068f0 15398->15399 15400 401614 118 API calls 15399->15400 15401 406909 15399->15401 15402 406922 15400->15402 15401->15390 15402->15390 15406 4078d4 __write_nolock 15403->15406 15407 40794d 15406->15407 15429 401dfc 15406->15429 15434 404a60 15406->15434 15440 407616 15407->15440 15409 407960 15410 40796f 15409->15410 15411 40162e 118 API calls 15409->15411 15418 407973 15410->15418 15458 403ef1 15410->15458 15411->15410 15420 406926 15418->15420 16138 405092 15420->16138 15423 40693a 15425 406951 15423->15425 15426 40d81b _realloc 66 API calls 15423->15426 15424 40d81b _realloc 66 API calls 15424->15423 15427 406961 15425->15427 15428 40d81b _realloc 66 API calls 15425->15428 15426->15425 15427->15394 15428->15427 15523 401cb6 15429->15523 15432 40bea8 _swprintf 100 API calls 15433 401e4b 15432->15433 15433->15406 15435 404a75 15434->15435 15436 404a79 15435->15436 15533 40481a 15435->15533 15436->15406 15438 404a89 15438->15436 15439 404a8e FindClose 15438->15439 15439->15436 15441 407620 __write_nolock 15440->15441 15442 404a60 85 API calls 15441->15442 15443 40763f 15442->15443 15457 407681 15443->15457 15545 403cb7 15443->15545 15457->15409 15459 403f18 __allrem 15458->15459 15460 403f30 15459->15460 15461 403424 121 API calls 15459->15461 15462 402267 15460->15462 15461->15460 15463 402271 __EH_prolog __write_nolock 15462->15463 15754 401e61 15463->15754 15524 401cc0 15523->15524 15525 401ce2 15524->15525 15529 40c212 CompareStringW 15524->15529 15525->15432 15527 401cd1 15527->15525 15530 40c233 15527->15530 15529->15527 15532 40c240 _wcslen 15530->15532 15531 40c275 CompareStringW 15531->15525 15532->15531 15534 404827 __write_nolock 15533->15534 15535 4048a9 FindNextFileW 15534->15535 15536 40483f FindFirstFileW 15534->15536 15538 4048b6 GetLastError 15535->15538 15539 4048cc 15535->15539 15537 404856 15536->15537 15544 40488d ___inittime 15536->15544 15540 406631 79 API calls 15537->15540 15538->15539 15539->15544 15541 404866 15540->15541 15542 404882 GetLastError 15541->15542 15543 40486a FindFirstFileW 15541->15543 15542->15544 15543->15542 15543->15544 15544->15438 15546 403cc1 __EH_prolog 15545->15546 15579 40e7b8 15546->15579 15548 403d15 15548->15457 15551 406e24 15548->15551 15549 403ccc 15549->15548 15591 4017b4 15549->15591 15552 406e4b 15551->15552 15553 406edc __allrem 15551->15553 15552->15553 15554 406e55 15552->15554 15561 406f31 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z _strncpy 15553->15561 15637 403424 15553->15637 15555 4041fd 143 API calls 15554->15555 15558 406e74 15555->15558 15559 404348 143 API calls 15558->15559 15564 406ec1 15558->15564 15560 4041fd 143 API calls 15560->15561 15561->15558 15561->15560 15561->15564 15564->15457 15566 4075d7 15564->15566 15581 40e7c2 15579->15581 15580 40e86c _malloc 66 API calls 15580->15581 15581->15580 15582 40e7dc 15581->15582 15583 414152 _malloc 6 API calls 15581->15583 15587 40e7de std::bad_alloc::bad_alloc 15581->15587 15582->15549 15583->15581 15584 40e804 15597 40e79b 15584->15597 15587->15584 15594 4103d2 15587->15594 15589 40dcaf __CxxThrowException@8 RaiseException 15590 40e81c 15589->15590 15592 4016e2 118 API calls 15591->15592 15593 4017bf 15592->15593 15593->15548 15600 410396 15594->15600 15631 4144f3 15597->15631 15601 4103a2 _flsall 15600->15601 15608 414630 15601->15608 15609 410fa0 __lock 66 API calls 15608->15609 15610 4103a7 15609->15610 15611 4102ab 15610->15611 15632 40e7ab 15631->15632 15633 414513 _strlen 15631->15633 15632->15589 15633->15632 15634 40e86c _malloc 66 API calls 15633->15634 15635 414526 15634->15635 15635->15632 15636 417a3b _strcpy_s 66 API calls 15635->15636 15636->15632 15638 403436 15637->15638 15639 403449 SetFilePointer 15637->15639 15643 403481 ___inittime 15638->15643 15665 40168b 15638->15665 15640 403464 GetLastError 15639->15640 15639->15643 15640->15643 15854 401cff 15754->15854 15757 40b5fd 15855 401d75 15854->15855 15856 401d11 15854->15856 15855->15757 15857 401d3a 15856->15857 15860 4016ac 118 API calls 15856->15860 16139 40509b 16138->16139 16140 4050b1 16138->16140 16141 405070 66 API calls 16139->16141 16140->15423 16140->15424 16142 4050a6 16141->16142 16143 405070 66 API calls 16142->16143 16143->16140 16145 40d384 3 API calls 16144->16145 16146 40d411 16145->16146 16147 408fac 16146->16147 16148 40d3c7 3 API calls 16146->16148 16147->14939 16147->14940 16148->16147 16149->14941 16151 40d3d0 GetDC 16150->16151 16152 40d3f6 16150->16152 16151->16152 16153 40d3df GetDeviceCaps ReleaseDC 16151->16153 16152->14949 16153->16152 16155 40d3b3 16154->16155 16156 40d38d GetDC 16154->16156 16155->14949 16156->16155 16157 40d39c GetDeviceCaps ReleaseDC 16156->16157 16157->16155 16159 40d455 16158->16159 16160 40d468 GetObjectW 16158->16160 16169 40d2bf GetDC CreateCompatibleDC CreateCompatibleDC GetObjectW 16159->16169 16162 40d48b 16160->16162 16163 40d48d CoCreateInstance 16160->16163 16162->16163 16164 40d4ac _memset 16163->16164 16165 409055 SendMessageW 16163->16165 16164->16165 16166 40d526 CreateDIBSection 16164->16166 16165->14945 16165->14953 16166->16165 16167 40d573 16166->16167 16167->16165 16168 40d5c7 DeleteObject 16167->16168 16168->16165 16170 40d306 16169->16170 16171 40d309 9 API calls 16169->16171 16170->16171 16171->16165 16172->14961 16175 4030c2 __write_nolock 16173->16175 16174 403121 CreateFileW 16176 403153 GetLastError 16174->16176 16179 4031a5 16174->16179 16175->16174 16177 406631 79 API calls 16176->16177 16178 403173 16177->16178 16178->16179 16180 403177 CreateFileW GetLastError 16178->16180 16179->14966 16181 40319c 16180->16181 16181->16179 16187 4037da 16182->16187 16185 403879 16185->14972 16186 40168b 119 API calls 16186->16185 16190 403843 16187->16190 16191 4037e7 16187->16191 16188 403818 SetFilePointer 16189 403839 GetLastError 16188->16189 16188->16190 16189->16190 16190->16185 16190->16186 16191->16188 16193 4083d1 16192->16193 16194 40dfe0 _realloc __VEC_memcpy 16193->16194 16195 4083e1 16194->16195 16198 408307 16195->16198 16197 4083f3 16197->14997 16199 408320 16198->16199 16200 408316 16198->16200 16202 408386 GetCurrentProcessId 16199->16202 16203 40833b 16199->16203 16206 4082c8 16200->16206 16205 408356 __init_pointers 16202->16205 16204 4016ac 118 API calls 16203->16204 16203->16205 16204->16205 16205->16197 16207 4082d1 LoadLibraryW 16206->16207 16208 408301 16206->16208 16207->16208 16209 4082e2 GetProcAddress GetProcAddress 16207->16209 16208->16199 16209->16208 16210->15008 16212 40cc9f _wcslen 16211->16212 16213 40e86c _malloc 66 API calls 16212->16213 16216 40cca9 16213->16216 16214 40ce06 16214->15021 16214->15023 16215 40c233 CompareStringW 16215->16216 16216->16214 16216->16215 16219 40c9bd 16217->16219 16218 40ca12 VariantInit 16220 40ca42 16218->16220 16219->16218 16221 40c9d6 PeekMessageW 16219->16221 16220->15023 16222 40c9e8 TranslateMessage DispatchMessageW GetMessageW 16221->16222 16223 40ca09 GetTickCount 16221->16223 16222->16223 16223->16219 16232 40a149 16234 40a14f 16232->16234 16247 409b63 _wcscat _wcslen _wcsrchr _wcscpy 16232->16247 16233 408b5a ExpandEnvironmentStringsW 16233->16247 16234->16247 16263 4097d2 16234->16263 16236 40a6eb 16238 409e6c SetWindowTextW 16238->16247 16240 408d06 120 API calls 16240->16247 16241 40e345 _realloc 72 API calls 16254 409c53 _memset _wcscat _wcslen 16241->16254 16242 409f0a RegOpenKeyExW 16243 409f26 RegQueryValueExW RegCloseKey 16242->16243 16242->16247 16243->16247 16244 4049b2 84 API calls 16244->16247 16245 409c58 SetFileAttributesW 16249 409d16 GetFileAttributesW 16245->16249 16245->16254 16246 4047ed FindClose 16246->16247 16247->16233 16247->16236 16247->16238 16247->16240 16247->16242 16247->16244 16247->16246 16252 408eef 3 API calls 16247->16252 16247->16254 16258 40a061 SendMessageW 16247->16258 16262 40c212 CompareStringW 16247->16262 16289 40d24f GetCurrentDirectoryW 16247->16289 16248 40d81b _realloc 66 API calls 16248->16254 16251 409d24 DeleteFileW 16249->16251 16249->16254 16250 4065a2 102 API calls 16250->16254 16251->16254 16255 40a020 GetDlgItem SetWindowTextW SendMessageW 16252->16255 16253 4049b2 84 API calls 16253->16254 16254->16241 16254->16245 16254->16247 16254->16248 16254->16250 16254->16253 16256 40bea8 _swprintf 100 API calls 16254->16256 16261 409cf2 SHFileOperationW 16254->16261 16255->16247 16257 409d56 GetFileAttributesW 16256->16257 16257->16254 16259 409d67 MoveFileW 16257->16259 16258->16247 16259->16254 16260 409d7f MoveFileExW 16259->16260 16260->16254 16261->16249 16262->16247 16264 4097df _memset _wcslen __write_nolock 16263->16264 16265 4098c8 16264->16265 16272 409a38 16264->16272 16290 40c212 CompareStringW 16264->16290 16267 403b14 81 API calls 16265->16267 16268 4098db 16267->16268 16280 4098f5 _wcscat _wcscpy 16268->16280 16291 406823 16268->16291 16270 409940 ShellExecuteExW 16271 409952 16270->16271 16270->16272 16273 409997 WaitForInputIdle 16271->16273 16274 40997f IsWindowVisible 16271->16274 16275 4099d9 CloseHandle 16271->16275 16272->16247 16299 408c30 WaitForSingleObject 16273->16299 16274->16273 16276 40998c ShowWindow 16274->16276 16278 4099e8 16275->16278 16286 4099f1 16275->16286 16276->16273 16303 40c212 CompareStringW 16278->16303 16280->16270 16281 403b14 81 API calls 16280->16281 16284 409938 16281->16284 16283 4099b6 GetExitCodeProcess 16283->16275 16285 4099c7 16283->16285 16284->16270 16284->16272 16285->16275 16287 4099d4 16285->16287 16286->16272 16288 409a31 ShowWindow 16286->16288 16287->16275 16288->16272 16289->16247 16290->16265 16292 406830 __write_nolock 16291->16292 16293 406843 GetFullPathNameW 16292->16293 16298 406893 16292->16298 16294 406864 16293->16294 16295 406631 79 API calls 16294->16295 16294->16298 16296 406878 16295->16296 16297 40687c GetFullPathNameW 16296->16297 16296->16298 16297->16298 16298->16280 16300 408c65 16299->16300 16301 408c69 16300->16301 16302 408c4c PeekMessageW WaitForSingleObject 16300->16302 16301->16275 16301->16283 16302->16300 16303->16286 16224 4091d8 16225 4091e5 __write_nolock 16224->16225 16226 40822f 103 API calls 16225->16226 16227 4091f9 16226->16227 16228 40bea8 _swprintf 100 API calls 16227->16228 16229 40920b SetDlgItemTextW 16228->16229 16230 4084a5 4 API calls 16229->16230 16231 409228 16230->16231 16304 410a6b 16305 410a7c 16304->16305 16341 410df4 HeapCreate 16305->16341 16308 410abb 16343 412d64 GetModuleHandleW 16308->16343 16312 410a13 _fast_error_exit 66 API calls 16313 410acc __RTC_Initialize 16312->16313 16377 416e30 16313->16377 16315 410ada 16316 410ae6 GetCommandLineA 16315->16316 16318 4145c4 __amsg_exit 66 API calls 16315->16318 16392 416cf9 16316->16392 16320 410ae5 16318->16320 16320->16316 16323 410b0b 16432 4169c6 16323->16432 16324 4145c4 __amsg_exit 66 API calls 16324->16323 16327 410b1c 16447 414683 16327->16447 16328 4145c4 __amsg_exit 66 API calls 16328->16327 16330 410b23 16331 410b2e 16330->16331 16332 4145c4 __amsg_exit 66 API calls 16330->16332 16453 416967 16331->16453 16332->16331 16342 410aaf 16341->16342 16342->16308 16503 410a13 16342->16503 16344 412d78 16343->16344 16345 412d7f 16343->16345 16348 414594 __crt_waiting_on_module_handle 2 API calls 16344->16348 16346 412ee7 16345->16346 16347 412d89 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 16345->16347 16549 412a7e 16346->16549 16349 412dd2 TlsAlloc 16347->16349 16351 412d7e 16348->16351 16353 410ac1 16349->16353 16354 412e20 TlsSetValue 16349->16354 16351->16345 16353->16312 16353->16313 16354->16353 16355 412e31 16354->16355 16514 41487e 16355->16514 16358 412954 __encode_pointer 6 API calls 16359 412e41 16358->16359 16360 412954 __encode_pointer 6 API calls 16359->16360 16361 412e51 16360->16361 16362 412954 __encode_pointer 6 API calls 16361->16362 16363 412e61 16362->16363 16364 412954 __encode_pointer 6 API calls 16363->16364 16365 412e71 16364->16365 16521 410e24 16365->16521 16368 4129cf __decode_pointer 6 API calls 16369 412e92 16368->16369 16369->16346 16525 414af5 16369->16525 16372 4129cf __decode_pointer 6 API calls 16373 412ec5 16372->16373 16373->16346 16374 412ecc 16373->16374 16531 412abb 16374->16531 16376 412ed4 GetCurrentThreadId 16376->16353 16601 411a98 16377->16601 16379 416e3c GetStartupInfoA 16380 414af5 __calloc_crt 66 API calls 16379->16380 16388 416e5d 16380->16388 16381 41707b _flsall 16381->16315 16382 416ff8 GetStdHandle 16387 416fc2 16382->16387 16383 414af5 __calloc_crt 66 API calls 16383->16388 16384 41705d SetHandleCount 16384->16381 16385 41700a GetFileType 16385->16387 16386 416f45 16386->16381 16386->16387 16389 416f6e GetFileType 16386->16389 16391 417175 ___lock_fhandle InitializeCriticalSectionAndSpinCount 16386->16391 16387->16381 16387->16382 16387->16384 16387->16385 16390 417175 ___lock_fhandle InitializeCriticalSectionAndSpinCount 16387->16390 16388->16381 16388->16383 16388->16386 16388->16387 16389->16386 16390->16387 16391->16386 16393 416d17 GetEnvironmentStringsW 16392->16393 16397 416d36 16392->16397 16394 416d2b GetLastError 16393->16394 16395 416d1f 16393->16395 16394->16397 16399 416d61 WideCharToMultiByte 16395->16399 16400 416d52 GetEnvironmentStringsW 16395->16400 16396 416dcf 16398 416dd8 GetEnvironmentStrings 16396->16398 16401 410af6 16396->16401 16397->16395 16397->16396 16398->16401 16402 416de8 16398->16402 16405 416d95 16399->16405 16406 416dc4 FreeEnvironmentStringsW 16399->16406 16400->16399 16400->16401 16419 416c3e 16401->16419 16407 414ab0 __malloc_crt 66 API calls 16402->16407 16408 414ab0 __malloc_crt 66 API calls 16405->16408 16406->16401 16409 416e02 16407->16409 16410 416d9b 16408->16410 16411 416e15 16409->16411 16412 416e09 FreeEnvironmentStringsA 16409->16412 16410->16406 16413 416da3 WideCharToMultiByte 16410->16413 16414 40dfe0 _realloc __VEC_memcpy 16411->16414 16412->16401 16415 416db5 16413->16415 16418 416dbd 16413->16418 16416 416e1f FreeEnvironmentStringsA 16414->16416 16417 40d81b _realloc 66 API calls 16415->16417 16416->16401 16417->16418 16418->16406 16420 416c53 16419->16420 16421 416c58 GetModuleFileNameA 16419->16421 16608 4152f7 16420->16608 16423 416c7f 16421->16423 16602 416aa4 16423->16602 16426 410b00 16426->16323 16426->16324 16427 416cbb 16428 414ab0 __malloc_crt 66 API calls 16427->16428 16429 416cc1 16428->16429 16429->16426 16430 416aa4 _parse_cmdline 76 API calls 16429->16430 16431 416cdb 16430->16431 16431->16426 16433 4169cf 16432->16433 16435 4169d4 _strlen 16432->16435 16434 4152f7 ___initmbctable 110 API calls 16433->16434 16434->16435 16436 414af5 __calloc_crt 66 API calls 16435->16436 16439 410b11 16435->16439 16442 416a09 _strlen 16436->16442 16437 416a67 16438 40d81b _realloc 66 API calls 16437->16438 16438->16439 16439->16327 16439->16328 16440 414af5 __calloc_crt 66 API calls 16440->16442 16441 416a8d 16443 40d81b _realloc 66 API calls 16441->16443 16442->16437 16442->16439 16442->16440 16442->16441 16444 417a3b _strcpy_s 66 API calls 16442->16444 16445 416a4e 16442->16445 16443->16439 16444->16442 16445->16442 16446 41324b __invoke_watson 10 API calls 16445->16446 16446->16445 16449 414691 __IsNonwritableInCurrentImage 16447->16449 16803 416703 16449->16803 16450 4146af __initterm_e 16451 4103d2 __cinit 74 API calls 16450->16451 16452 4146ce __IsNonwritableInCurrentImage __initterm 16450->16452 16451->16452 16452->16330 16454 416975 16453->16454 16457 41697a 16453->16457 16455 4152f7 ___initmbctable 110 API calls 16454->16455 16455->16457 16456 410b34 16459 40b0cf 16456->16459 16457->16456 16458 419ea7 _parse_cmdline 76 API calls 16457->16458 16458->16457 16807 40b64d GetModuleHandleW 16459->16807 16463 40b0f2 _memset 16464 40b104 GetCommandLineW 16463->16464 16465 40b183 GetModuleFileNameW SetEnvironmentVariableW GetModuleHandleW LoadIconW LoadBitmapW 16464->16465 16466 40b114 16464->16466 16819 40d605 LoadLibraryW LoadLibraryW OleInitialize InitCommonControlsEx SHGetMalloc 16465->16819 16814 408a24 16466->16814 16469 40b1df 16820 408218 16469->16820 16472 40b122 OpenFileMappingW 16474 40b137 MapViewOfFile 16472->16474 16475 40b16a CloseHandle 16472->16475 16473 40b175 SetEnvironmentVariableW 16473->16465 16476 40b161 UnmapViewOfFile 16474->16476 16477 40b14a 16474->16477 16475->16465 16476->16475 16478 40dfe0 _realloc __VEC_memcpy 16477->16478 16479 40b152 SetEnvironmentVariableW 16478->16479 16479->16476 16480 40b1ea 16481 40d384 3 API calls 16480->16481 16482 40b201 16481->16482 16483 40d384 3 API calls 16482->16483 16484 40b20b DialogBoxParamW 16483->16484 16485 40b245 16484->16485 16825 40d65f 16485->16825 16504 410a21 16503->16504 16505 410a26 16503->16505 16506 414a77 __FF_MSGBANNER 66 API calls 16504->16506 16507 4148cc __NMSG_WRITE 66 API calls 16505->16507 16506->16505 16508 410a2e 16507->16508 16509 414618 _malloc 3 API calls 16508->16509 16510 410a38 16509->16510 16510->16308 16515 4129c6 _raise 6 API calls 16514->16515 16516 414886 __init_pointers __initp_misc_winsig 16515->16516 16555 412f75 16516->16555 16519 412954 __encode_pointer 6 API calls 16520 412e36 16519->16520 16520->16358 16522 410e2f 16521->16522 16524 410e5d 16522->16524 16558 417175 16522->16558 16524->16346 16524->16368 16527 414afe 16525->16527 16528 412eab 16527->16528 16529 414b1c Sleep 16527->16529 16563 418fe4 16527->16563 16528->16346 16528->16372 16530 414b31 16529->16530 16530->16527 16530->16528 16580 411a98 16531->16580 16533 412ac7 GetModuleHandleW 16534 412ad7 16533->16534 16535 412add 16533->16535 16536 414594 __crt_waiting_on_module_handle 2 API calls 16534->16536 16537 412af5 GetProcAddress GetProcAddress 16535->16537 16538 412b19 16535->16538 16536->16535 16537->16538 16539 410fa0 __lock 62 API calls 16538->16539 16540 412b38 InterlockedIncrement 16539->16540 16581 412b90 16540->16581 16543 410fa0 __lock 62 API calls 16544 412b59 16543->16544 16584 41545e InterlockedIncrement 16544->16584 16546 412b77 16596 412b99 16546->16596 16548 412b84 _flsall 16548->16376 16550 412a88 16549->16550 16551 412a94 16549->16551 16552 4129cf __decode_pointer 6 API calls 16550->16552 16553 412ab6 16551->16553 16554 412aa8 TlsFree 16551->16554 16552->16551 16553->16553 16554->16553 16556 412954 __encode_pointer 6 API calls 16555->16556 16557 412f7f 16556->16557 16557->16519 16562 411a98 16558->16562 16560 417181 InitializeCriticalSectionAndSpinCount 16561 4171c5 _flsall 16560->16561 16561->16522 16562->16560 16564 418ff0 _flsall 16563->16564 16565 419008 16564->16565 16575 419027 _memset 16564->16575 16566 410dab _write_string 65 API calls 16565->16566 16567 41900d 16566->16567 16568 413373 __calloc_impl 6 API calls 16567->16568 16570 41901d _flsall 16568->16570 16569 419099 HeapAlloc 16569->16575 16570->16527 16571 414152 _malloc 6 API calls 16571->16575 16572 410fa0 __lock 65 API calls 16572->16575 16573 4117b2 ___sbh_alloc_block 5 API calls 16573->16575 16575->16569 16575->16570 16575->16571 16575->16572 16575->16573 16576 4190e0 16575->16576 16579 410ec6 LeaveCriticalSection 16576->16579 16578 4190e7 16578->16575 16579->16578 16580->16533 16599 410ec6 LeaveCriticalSection 16581->16599 16583 412b52 16583->16543 16585 41547c InterlockedIncrement 16584->16585 16586 41547f 16584->16586 16585->16586 16587 415489 InterlockedIncrement 16586->16587 16588 41548c 16586->16588 16587->16588 16589 415496 InterlockedIncrement 16588->16589 16590 415499 16588->16590 16589->16590 16591 4154a3 InterlockedIncrement 16590->16591 16592 4154a6 16590->16592 16591->16592 16593 4154bf InterlockedIncrement 16592->16593 16594 4154da InterlockedIncrement 16592->16594 16595 4154cf InterlockedIncrement 16592->16595 16593->16592 16594->16546 16595->16592 16600 410ec6 LeaveCriticalSection 16596->16600 16598 412ba0 16598->16548 16599->16583 16600->16598 16601->16379 16604 416ac3 16602->16604 16606 416b30 16604->16606 16612 419ea7 16604->16612 16605 416c2e 16605->16426 16605->16427 16606->16605 16607 419ea7 76 API calls _parse_cmdline 16606->16607 16607->16606 16609 415300 16608->16609 16611 415307 16608->16611 16618 41515d 16609->16618 16611->16421 16615 419e54 16612->16615 16616 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 16615->16616 16617 419e67 16616->16617 16617->16604 16619 415169 _flsall 16618->16619 16620 412c1b __getptd 66 API calls 16619->16620 16621 415172 16620->16621 16622 414e58 _LocaleUpdate::_LocaleUpdate 68 API calls 16621->16622 16623 41517c 16622->16623 16649 414efc 16623->16649 16626 414ab0 __malloc_crt 66 API calls 16627 41519d 16626->16627 16628 4152bc _flsall 16627->16628 16656 414f78 16627->16656 16628->16611 16631 4152c9 16631->16628 16636 4152dc 16631->16636 16638 40d81b _realloc 66 API calls 16631->16638 16632 4151cd InterlockedDecrement 16633 4151dd 16632->16633 16634 4151ee InterlockedIncrement 16632->16634 16633->16634 16637 40d81b _realloc 66 API calls 16633->16637 16634->16628 16635 415204 16634->16635 16635->16628 16641 410fa0 __lock 66 API calls 16635->16641 16639 410dab _write_string 66 API calls 16636->16639 16640 4151ed 16637->16640 16638->16636 16639->16628 16640->16634 16643 415218 InterlockedDecrement 16641->16643 16644 415294 16643->16644 16645 4152a7 InterlockedIncrement 16643->16645 16644->16645 16647 40d81b _realloc 66 API calls 16644->16647 16666 4152be 16645->16666 16648 4152a6 16647->16648 16648->16645 16650 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 16649->16650 16651 414f10 16650->16651 16652 414f39 16651->16652 16653 414f1b GetOEMCP 16651->16653 16654 414f2b 16652->16654 16655 414f3e GetACP 16652->16655 16653->16654 16654->16626 16654->16628 16655->16654 16657 414efc getSystemCP 78 API calls 16656->16657 16658 414f98 16657->16658 16659 414fa3 setSBCS 16658->16659 16661 414fe7 IsValidCodePage 16658->16661 16665 41500c _memset __setmbcp_nolock 16658->16665 16660 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16659->16660 16662 41515b 16660->16662 16661->16659 16663 414ff9 GetCPInfo 16661->16663 16662->16631 16662->16632 16663->16659 16663->16665 16669 414cc5 GetCPInfo 16665->16669 16802 410ec6 LeaveCriticalSection 16666->16802 16668 4152c5 16668->16628 16670 414cf9 _memset 16669->16670 16671 414dab 16669->16671 16679 4192bc 16670->16679 16675 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16671->16675 16677 414e56 16675->16677 16677->16665 16678 4159ff ___crtLCMapStringA 101 API calls 16678->16671 16680 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 16679->16680 16681 4192cf 16680->16681 16689 419102 16681->16689 16684 4159ff 16685 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 16684->16685 16686 415a12 16685->16686 16755 41565a 16686->16755 16690 419123 GetStringTypeW 16689->16690 16694 41914e 16689->16694 16691 419143 GetLastError 16690->16691 16693 41913b 16690->16693 16691->16694 16692 419235 16717 419600 GetLocaleInfoA 16692->16717 16695 419187 MultiByteToWideChar 16693->16695 16712 41922f 16693->16712 16694->16692 16694->16693 16701 4191b4 16695->16701 16695->16712 16698 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16699 414d66 16698->16699 16699->16684 16700 419286 GetStringTypeA 16704 4192a1 16700->16704 16700->16712 16705 4191c9 _memset ___convertcp 16701->16705 16706 40e86c _malloc 66 API calls 16701->16706 16703 419202 MultiByteToWideChar 16708 419229 16703->16708 16709 419218 GetStringTypeW 16703->16709 16710 40d81b _realloc 66 API calls 16704->16710 16705->16703 16705->16712 16706->16705 16713 41563a 16708->16713 16709->16708 16710->16712 16712->16698 16714 415646 16713->16714 16715 415657 16713->16715 16714->16715 16716 40d81b _realloc 66 API calls 16714->16716 16715->16712 16716->16715 16718 419633 16717->16718 16719 41962e 16717->16719 16748 419ebf 16718->16748 16721 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16719->16721 16722 419259 16721->16722 16722->16700 16722->16712 16723 419649 16722->16723 16724 419689 GetCPInfo 16723->16724 16740 419713 16723->16740 16725 4196a0 16724->16725 16726 4196fe MultiByteToWideChar 16724->16726 16725->16726 16728 4196a6 GetCPInfo 16725->16728 16731 4196b9 _strlen 16726->16731 16726->16740 16727 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16729 41927a 16727->16729 16728->16726 16730 4196b3 16728->16730 16729->16700 16729->16712 16730->16726 16730->16731 16732 40e86c _malloc 66 API calls 16731->16732 16736 4196eb _memset ___convertcp 16731->16736 16732->16736 16733 419748 MultiByteToWideChar 16734 419760 16733->16734 16735 41977f 16733->16735 16737 419784 16734->16737 16738 419767 WideCharToMultiByte 16734->16738 16739 41563a __freea 66 API calls 16735->16739 16736->16733 16736->16740 16741 4197a3 16737->16741 16742 41978f WideCharToMultiByte 16737->16742 16738->16735 16739->16740 16740->16727 16743 414af5 __calloc_crt 66 API calls 16741->16743 16742->16735 16742->16741 16744 4197ab 16743->16744 16744->16735 16745 4197b4 WideCharToMultiByte 16744->16745 16745->16735 16746 4197c6 16745->16746 16747 40d81b _realloc 66 API calls 16746->16747 16747->16735 16751 41a68a 16748->16751 16752 41a6a3 16751->16752 16753 41a45b strtoxl 90 API calls 16752->16753 16754 419ed0 16753->16754 16754->16719 16756 41567b LCMapStringW 16755->16756 16759 415696 16755->16759 16757 41569e GetLastError 16756->16757 16756->16759 16757->16759 16758 415894 16761 419600 ___ansicp 90 API calls 16758->16761 16759->16758 16760 4156f0 16759->16760 16762 415709 MultiByteToWideChar 16760->16762 16785 41588b 16760->16785 16764 4158bc 16761->16764 16770 415736 16762->16770 16762->16785 16763 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16765 414d86 16763->16765 16767 4159b0 LCMapStringA 16764->16767 16768 4158d5 16764->16768 16764->16785 16765->16678 16766 41574f ___convertcp 16769 415787 MultiByteToWideChar 16766->16769 16766->16785 16780 41590c 16767->16780 16771 419649 ___convertcp 73 API calls 16768->16771 16772 4157a0 LCMapStringW 16769->16772 16797 415882 16769->16797 16770->16766 16774 40e86c _malloc 66 API calls 16770->16774 16775 4158e7 16771->16775 16776 4157c1 16772->16776 16772->16797 16773 4159d7 16783 40d81b _realloc 66 API calls 16773->16783 16773->16785 16774->16766 16778 4158f1 LCMapStringA 16775->16778 16775->16785 16781 4157ca 16776->16781 16782 4157f3 16776->16782 16777 40d81b _realloc 66 API calls 16777->16773 16778->16780 16786 415913 16778->16786 16779 41563a __freea 66 API calls 16779->16785 16780->16773 16780->16777 16784 4157dc LCMapStringW 16781->16784 16781->16797 16792 41580e ___convertcp 16782->16792 16793 40e86c _malloc 66 API calls 16782->16793 16783->16785 16784->16797 16785->16763 16788 415924 _memset ___convertcp 16786->16788 16789 40e86c _malloc 66 API calls 16786->16789 16787 415842 LCMapStringW 16790 41585a WideCharToMultiByte 16787->16790 16791 41587c 16787->16791 16788->16780 16795 415962 LCMapStringA 16788->16795 16789->16788 16790->16791 16794 41563a __freea 66 API calls 16791->16794 16792->16787 16792->16797 16793->16792 16794->16797 16798 415982 16795->16798 16799 41597e 16795->16799 16797->16779 16800 419649 ___convertcp 73 API calls 16798->16800 16801 41563a __freea 66 API calls 16799->16801 16800->16799 16801->16780 16802->16668 16804 416709 16803->16804 16805 412954 __encode_pointer 6 API calls 16804->16805 16806 416721 16804->16806 16805->16804 16806->16450 16808 40b65c GetProcAddress 16807->16808 16809 40b0df OleInitialize 16807->16809 16808->16809 16810 40b66c 16808->16810 16811 40c2f4 GetCPInfo 16809->16811 16810->16809 16812 40c318 IsDBCSLeadByte 16811->16812 16812->16812 16813 40c330 16812->16813 16813->16463 16818 408a48 16814->16818 16815 408b53 16815->16472 16815->16473 16816 408431 123 API calls 16816->16818 16817 40c295 78 API calls 16817->16818 16818->16815 16818->16816 16818->16817 16819->16469 16831 407aa2 16820->16831 16822 408224 16854 407f66 GetModuleHandleW FindResourceW 16822->16854 16824 40822b 16824->16480 16832 407aac __EH_prolog _wcschr __write_nolock 16831->16832 16833 407acf GetModuleFileNameW 16832->16833 16835 407af8 _wcscpy 16832->16835 16834 407aeb _wcsrchr 16833->16834 16834->16835 16853 407b2c ctype 16834->16853 16836 4030b8 83 API calls 16835->16836 16847 407b28 _strncmp 16836->16847 16837 407c62 16838 40384e 121 API calls 16837->16838 16837->16853 16840 407c7e 16838->16840 16839 403424 121 API calls 16839->16847 16841 40e86c _malloc 66 API calls 16840->16841 16843 407c88 16841->16843 16842 40370a 124 API calls 16842->16847 16844 40370a 124 API calls 16843->16844 16843->16853 16846 407ca4 16844->16846 16845 40384e 121 API calls 16845->16847 16848 40e86c _malloc 66 API calls 16846->16848 16846->16853 16847->16837 16847->16839 16847->16842 16847->16845 16847->16853 16849 407cbe 16848->16849 16850 40c048 MultiByteToWideChar 16849->16850 16849->16853 16851 407cdf 16850->16851 16853->16822 16855 407f94 16854->16855 16857 407f8e 16854->16857 16856 407d8d 101 API calls 16855->16856 16856->16857 16857->16824 14229 403306 14230 403313 14229->14230 14231 40330f 14229->14231 14232 40331e 14230->14232 14244 4032b8 14230->14244 14232->14231 14236 403953 14232->14236 14250 40d7f0 14236->14250 14239 403976 14252 406631 14239->14252 14240 40332d 14242 40398a 14242->14240 14243 40398e DeleteFileW 14242->14243 14243->14240 14246 4032e2 14244->14246 14247 4032c6 14244->14247 14245 403301 14245->14232 14246->14245 14403 40166a 14246->14403 14247->14246 14248 4032d2 FindCloseChangeNotification 14247->14248 14248->14246 14251 403960 DeleteFileW 14250->14251 14251->14239 14251->14240 14253 40663e __write_nolock 14252->14253 14261 406648 _wcslen _wcscpy _wcsncpy 14253->14261 14262 4062ce 14253->14262 14255 406657 _wcslen 14265 40656d 14255->14265 14257 406666 14258 4066f9 GetCurrentDirectoryW 14257->14258 14259 40666e 14257->14259 14258->14261 14260 4062ce 78 API calls 14259->14260 14260->14261 14261->14242 14269 40b31a 14262->14269 14266 406578 14265->14266 14267 4062ce 78 API calls 14266->14267 14268 406585 14266->14268 14267->14268 14268->14257 14270 40b327 14269->14270 14271 4062dc 14269->14271 14273 40c295 14270->14273 14271->14255 14276 41097d 14273->14276 14279 4108c8 14276->14279 14280 4108e1 14279->14280 14281 40c29e 14279->14281 14288 4103f4 14280->14288 14281->14271 14284 410941 14302 415b47 14284->14302 14285 410918 14296 415b9e 14285->14296 14289 410407 14288->14289 14295 410454 14288->14295 14307 412c1b 14289->14307 14292 410434 14292->14295 14327 414e58 14292->14327 14295->14281 14295->14284 14295->14285 14297 415bb1 14296->14297 14298 415bb7 14296->14298 14297->14281 14298->14297 14299 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 14298->14299 14300 415be7 14299->14300 14398 41982c 14300->14398 14303 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 14302->14303 14306 415b5a LCMapStringW 14303->14306 14305 415b95 14305->14281 14306->14305 14343 412ba2 GetLastError 14307->14343 14309 412c23 14310 41040c 14309->14310 14357 4145c4 14309->14357 14310->14292 14312 4155c4 14310->14312 14313 4155d0 _flsall 14312->14313 14314 412c1b __getptd 66 API calls 14313->14314 14315 4155d5 14314->14315 14316 415603 14315->14316 14317 4155e7 14315->14317 14364 410fa0 14316->14364 14320 412c1b __getptd 66 API calls 14317->14320 14319 41560a 14371 415586 14319->14371 14322 4155ec 14320->14322 14325 4155fa _flsall 14322->14325 14326 4145c4 __amsg_exit 66 API calls 14322->14326 14325->14292 14326->14325 14328 414e64 _flsall 14327->14328 14329 412c1b __getptd 66 API calls 14328->14329 14330 414e69 14329->14330 14331 410fa0 __lock 66 API calls 14330->14331 14334 414e7b 14330->14334 14332 414e99 14331->14332 14333 414ee2 14332->14333 14336 414eb0 InterlockedDecrement 14332->14336 14337 414eca InterlockedIncrement 14332->14337 14395 414ef3 14333->14395 14335 414e89 _flsall 14334->14335 14339 4145c4 __amsg_exit 66 API calls 14334->14339 14335->14295 14336->14337 14340 414ebb 14336->14340 14337->14333 14339->14335 14340->14337 14382 40d81b 14340->14382 14342 414ec9 14342->14337 14344 412a4a ___set_flsgetvalue 8 API calls 14343->14344 14345 412bb9 14344->14345 14346 412c0f SetLastError 14345->14346 14347 414af5 __calloc_crt 63 API calls 14345->14347 14346->14309 14348 412bcd 14347->14348 14348->14346 14349 4129cf __decode_pointer 6 API calls 14348->14349 14350 412be7 14349->14350 14351 412c06 14350->14351 14352 412bee 14350->14352 14354 40d81b _realloc 63 API calls 14351->14354 14353 412abb __initptd 63 API calls 14352->14353 14355 412bf6 GetCurrentThreadId 14353->14355 14356 412c0c 14354->14356 14355->14346 14356->14346 14358 414a77 __FF_MSGBANNER 66 API calls 14357->14358 14359 4145ce 14358->14359 14360 4148cc __NMSG_WRITE 66 API calls 14359->14360 14361 4145d6 14360->14361 14362 4129cf __decode_pointer 6 API calls 14361->14362 14363 4145e1 14362->14363 14363->14310 14365 410fb5 14364->14365 14366 410fc8 EnterCriticalSection 14364->14366 14367 410edd __mtinitlocknum 65 API calls 14365->14367 14366->14319 14368 410fbb 14367->14368 14368->14366 14369 4145c4 __amsg_exit 65 API calls 14368->14369 14370 410fc7 14369->14370 14370->14366 14372 41558a 14371->14372 14378 4155bc 14371->14378 14373 41545e ___addlocaleref 8 API calls 14372->14373 14372->14378 14374 41559d 14373->14374 14375 4154ed ___removelocaleref 8 API calls 14374->14375 14374->14378 14376 4155a8 14375->14376 14377 415315 ___freetlocinfo 66 API calls 14376->14377 14376->14378 14377->14378 14379 41562e 14378->14379 14380 410ec6 _doexit LeaveCriticalSection 14379->14380 14381 415635 14380->14381 14381->14322 14384 40d827 _flsall 14382->14384 14383 40d8a0 __dosmaperr _flsall 14383->14342 14384->14383 14385 40d866 14384->14385 14386 410fa0 __lock 64 API calls 14384->14386 14385->14383 14387 40d87b RtlFreeHeap 14385->14387 14390 40d83e ___sbh_find_block 14386->14390 14387->14383 14388 40d88d 14387->14388 14389 410dab _write_string 64 API calls 14388->14389 14391 40d892 GetLastError 14389->14391 14392 40d858 14390->14392 14393 411003 ___sbh_free_block VirtualFree VirtualFree HeapFree 14390->14393 14391->14383 14394 40d871 _realloc LeaveCriticalSection 14392->14394 14393->14392 14394->14385 14396 410ec6 _doexit LeaveCriticalSection 14395->14396 14397 414efa 14396->14397 14397->14334 14399 4103f4 _LocaleUpdate::_LocaleUpdate 76 API calls 14398->14399 14400 41983f 14399->14400 14401 419845 14400->14401 14402 419849 GetStringTypeW 14400->14402 14401->14297 14402->14401 14404 401673 14403->14404 14405 40167e 14403->14405 14409 40162e 14404->14409 14412 4015ab 14405->14412 14416 40bc2f 14409->14416 14411 401653 14411->14405 14413 4015ba 14412->14413 14414 4015d7 14413->14414 14713 40dcaf 14413->14713 14414->14245 14417 40bc8b 14416->14417 14419 40bc3e 14416->14419 14417->14411 14418 40bcad 14418->14417 14421 40822f 103 API calls 14418->14421 14419->14417 14419->14418 14420 40bcd4 14419->14420 14424 40bd3d 14419->14424 14425 40bd00 14419->14425 14426 40bc84 14419->14426 14427 40bc90 14419->14427 14428 40bcb7 14419->14428 14437 40bc63 14419->14437 14423 40822f 103 API calls 14420->14423 14422 40bcbe 14421->14422 14429 40965c 115 API calls 14422->14429 14423->14437 14424->14417 14424->14418 14424->14427 14424->14428 14431 40822f 103 API calls 14425->14431 14449 408739 14426->14449 14454 40822f 14427->14454 14432 40822f 103 API calls 14428->14432 14429->14417 14435 40bd10 14431->14435 14432->14422 14438 40965c 115 API calls 14435->14438 14440 40965c 14437->14440 14439 40bd18 14438->14439 14439->14411 14441 409665 14440->14441 14442 4096ad 14440->14442 14441->14442 14443 40966f GetLastError 14441->14443 14442->14411 14461 40de44 14443->14461 14446 408739 13 API calls 14447 40969f 14446->14447 14447->14442 14448 4096a6 SetLastError 14447->14448 14448->14442 14450 408746 __write_nolock 14449->14450 14451 408753 wvsprintfW 14450->14451 14452 408773 14450->14452 14688 408625 GetDlgItem 14451->14688 14452->14417 14455 40823f 14454->14455 14456 408274 LoadStringW 14455->14456 14457 408286 LoadStringW 14455->14457 14456->14457 14458 408294 14456->14458 14457->14458 14700 407d8d 14458->14700 14460 4082a2 14460->14437 14464 40dd4c 14461->14464 14465 40dd5c 14464->14465 14467 40dd7c 14464->14467 14479 410dab 14465->14479 14469 40dd8c 14467->14469 14475 40ddac 14467->14475 14471 410dab _write_string 66 API calls 14469->14471 14472 40dd91 14471->14472 14473 413373 __calloc_impl 6 API calls 14472->14473 14477 409694 14473->14477 14474 40ddf3 14474->14477 14478 4130d8 __flsbuf 100 API calls 14474->14478 14475->14474 14475->14477 14485 4130d8 14475->14485 14477->14446 14478->14477 14480 412ba2 __getptd_noexit 66 API calls 14479->14480 14481 40dd61 14480->14481 14482 413373 14481->14482 14506 4129cf TlsGetValue 14482->14506 14484 413383 __invoke_watson 14520 4184fd 14485->14520 14488 4130f3 14491 410dab _write_string 66 API calls 14488->14491 14489 41310a 14490 41310e 14489->14490 14500 41311b __flswbuf 14489->14500 14492 410dab _write_string 66 API calls 14490->14492 14499 4130f8 14491->14499 14492->14499 14493 41317c 14494 41320b 14493->14494 14495 41318b 14493->14495 14496 418374 __locking 100 API calls 14494->14496 14497 4131a2 14495->14497 14502 4131bf 14495->14502 14496->14499 14538 418374 14497->14538 14499->14474 14500->14493 14500->14499 14503 413171 14500->14503 14526 418499 14500->14526 14502->14499 14563 417b28 14502->14563 14503->14493 14535 418450 14503->14535 14507 4129e7 14506->14507 14508 412a08 GetModuleHandleW 14506->14508 14507->14508 14511 4129f1 TlsGetValue 14507->14511 14509 412a23 GetProcAddress 14508->14509 14510 412a18 14508->14510 14513 412a00 14509->14513 14516 414594 14510->14516 14515 4129fc 14511->14515 14513->14484 14515->14508 14515->14513 14517 41459f Sleep GetModuleHandleW 14516->14517 14518 412a1e 14517->14518 14519 4145bd 14517->14519 14518->14509 14518->14513 14519->14517 14519->14518 14521 41850c 14520->14521 14525 4130e8 14520->14525 14522 410dab _write_string 66 API calls 14521->14522 14523 418511 14522->14523 14524 413373 __calloc_impl 6 API calls 14523->14524 14524->14525 14525->14488 14525->14489 14527 4184a6 14526->14527 14529 4184b5 14526->14529 14528 410dab _write_string 66 API calls 14527->14528 14530 4184ab 14528->14530 14531 4184d9 14529->14531 14532 410dab _write_string 66 API calls 14529->14532 14530->14503 14531->14503 14533 4184c9 14532->14533 14534 413373 __calloc_impl 6 API calls 14533->14534 14534->14531 14595 414ab0 14535->14595 14539 418380 _flsall 14538->14539 14540 418388 14539->14540 14544 4183a3 14539->14544 14600 410dbe 14540->14600 14541 4183b1 14545 410dbe __dosmaperr 66 API calls 14541->14545 14544->14541 14548 4183f2 14544->14548 14547 4183b6 14545->14547 14546 410dab _write_string 66 API calls 14558 418395 _flsall 14546->14558 14549 410dab _write_string 66 API calls 14547->14549 14603 419fd2 14548->14603 14552 4183bd 14549->14552 14551 4183f8 14553 418405 14551->14553 14554 41841b 14551->14554 14555 413373 __calloc_impl 6 API calls 14552->14555 14613 417c41 14553->14613 14557 410dab _write_string 66 API calls 14554->14557 14555->14558 14560 418420 14557->14560 14558->14499 14559 418413 14672 418446 14559->14672 14561 410dbe __dosmaperr 66 API calls 14560->14561 14561->14559 14564 417b34 _flsall 14563->14564 14565 417b61 14564->14565 14566 417b45 14564->14566 14568 417b6f 14565->14568 14570 417b90 14565->14570 14567 410dbe __dosmaperr 66 API calls 14566->14567 14569 417b4a 14567->14569 14571 410dbe __dosmaperr 66 API calls 14568->14571 14574 410dab _write_string 66 API calls 14569->14574 14572 417bb0 14570->14572 14573 417bd6 14570->14573 14575 417b74 14571->14575 14576 410dbe __dosmaperr 66 API calls 14572->14576 14577 419fd2 ___lock_fhandle 67 API calls 14573->14577 14587 417b52 _flsall 14574->14587 14578 410dab _write_string 66 API calls 14575->14578 14579 417bb5 14576->14579 14580 417bdc 14577->14580 14581 417b7b 14578->14581 14582 410dab _write_string 66 API calls 14579->14582 14583 417c05 14580->14583 14584 417be9 14580->14584 14585 413373 __calloc_impl 6 API calls 14581->14585 14586 417bbc 14582->14586 14589 410dab _write_string 66 API calls 14583->14589 14675 417aa3 14584->14675 14585->14587 14591 413373 __calloc_impl 6 API calls 14586->14591 14587->14499 14590 417c0a 14589->14590 14593 410dbe __dosmaperr 66 API calls 14590->14593 14591->14587 14592 417bfa 14685 417c37 14592->14685 14593->14592 14597 414ab9 14595->14597 14596 40e86c _malloc 65 API calls 14596->14597 14597->14596 14598 414aef 14597->14598 14599 414ad0 Sleep 14597->14599 14598->14493 14599->14597 14601 412ba2 __getptd_noexit 66 API calls 14600->14601 14602 410dc3 14601->14602 14602->14546 14604 419fde _flsall 14603->14604 14605 41a039 14604->14605 14608 410fa0 __lock 66 API calls 14604->14608 14606 41a05b _flsall 14605->14606 14607 41a03e EnterCriticalSection 14605->14607 14606->14551 14607->14606 14609 41a00a 14608->14609 14610 41a021 14609->14610 14611 417175 ___lock_fhandle InitializeCriticalSectionAndSpinCount 14609->14611 14612 41a069 ___lock_fhandle LeaveCriticalSection 14610->14612 14611->14610 14612->14605 14614 417c50 __write_nolock 14613->14614 14615 417c82 14614->14615 14616 417ca9 14614->14616 14646 417c77 14614->14646 14617 410dbe __dosmaperr 66 API calls 14615->14617 14620 417d11 14616->14620 14621 417ceb 14616->14621 14619 417c87 14617->14619 14618 412945 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14622 418372 14618->14622 14624 410dab _write_string 66 API calls 14619->14624 14623 417d25 14620->14623 14626 417aa3 __lseeki64_nolock 68 API calls 14620->14626 14625 410dbe __dosmaperr 66 API calls 14621->14625 14622->14559 14628 418499 __flswbuf 66 API calls 14623->14628 14627 417c8e 14624->14627 14629 417cf0 14625->14629 14626->14623 14631 413373 __calloc_impl 6 API calls 14627->14631 14632 417d30 14628->14632 14630 410dab _write_string 66 API calls 14629->14630 14633 417cf9 14630->14633 14631->14646 14634 417fd6 14632->14634 14638 412c1b __getptd 66 API calls 14632->14638 14635 413373 __calloc_impl 6 API calls 14633->14635 14636 4182a5 WriteFile 14634->14636 14637 417fe6 14634->14637 14635->14646 14639 417fb8 14636->14639 14640 4182d8 GetLastError 14636->14640 14641 4180c4 14637->14641 14659 417ffa 14637->14659 14642 417d4b GetConsoleMode 14638->14642 14643 418323 14639->14643 14639->14646 14648 4182f6 14639->14648 14640->14639 14662 4181a4 14641->14662 14664 4180d3 14641->14664 14642->14634 14644 417d76 14642->14644 14643->14646 14647 410dab _write_string 66 API calls 14643->14647 14644->14634 14645 417d88 GetConsoleCP 14644->14645 14645->14639 14667 417dab 14645->14667 14646->14618 14650 418346 14647->14650 14652 418301 14648->14652 14653 418315 14648->14653 14649 418068 WriteFile 14649->14640 14649->14659 14654 410dbe __dosmaperr 66 API calls 14650->14654 14651 41820a WideCharToMultiByte 14651->14640 14656 418241 WriteFile 14651->14656 14655 410dab _write_string 66 API calls 14652->14655 14658 410dd1 __dosmaperr 66 API calls 14653->14658 14654->14646 14660 418306 14655->14660 14661 418278 GetLastError 14656->14661 14656->14662 14657 418148 WriteFile 14657->14640 14657->14664 14658->14646 14659->14639 14659->14643 14659->14649 14663 410dbe __dosmaperr 66 API calls 14660->14663 14661->14662 14662->14639 14662->14643 14662->14651 14662->14656 14663->14646 14664->14639 14664->14643 14664->14657 14665 415a7c __write_nolock 76 API calls 14665->14667 14666 4187eb 78 API calls __fassign 14666->14667 14667->14639 14667->14640 14667->14665 14667->14666 14668 417e57 WideCharToMultiByte 14667->14668 14670 41a099 11 API calls __putwch_nolock 14667->14670 14671 417edc WriteFile 14667->14671 14668->14639 14669 417e88 WriteFile 14668->14669 14669->14640 14669->14667 14670->14667 14671->14640 14671->14667 14673 41a072 __unlock_fhandle LeaveCriticalSection 14672->14673 14674 41844e 14673->14674 14674->14558 14676 419f5b __lseeki64_nolock 66 API calls 14675->14676 14677 417ac1 14676->14677 14678 417ac9 14677->14678 14679 417ada SetFilePointer 14677->14679 14680 410dab _write_string 66 API calls 14678->14680 14681 417af2 GetLastError 14679->14681 14682 417ace 14679->14682 14680->14682 14681->14682 14683 417afc 14681->14683 14682->14592 14684 410dd1 __dosmaperr 66 API calls 14683->14684 14684->14682 14686 41a072 __unlock_fhandle LeaveCriticalSection 14685->14686 14687 417c3f 14686->14687 14687->14587 14689 408655 14688->14689 14690 408687 SendMessageW SendMessageW 14688->14690 14697 40c77c 14689->14697 14692 4086d7 SendMessageW SendMessageW SendMessageW 14690->14692 14693 4086bb 14690->14693 14695 408721 SendMessageW 14692->14695 14696 408703 SendMessageW 14692->14696 14693->14692 14695->14452 14696->14695 14698 408660 ShowWindow SendMessageW SendMessageW 14697->14698 14699 40c786 DestroyWindow 14697->14699 14698->14690 14699->14698 14701 407d9a __write_nolock 14700->14701 14702 407df5 _strlen 14701->14702 14707 407e54 _wcsrchr _wcscpy _wcschr _wcsncpy 14701->14707 14708 40c009 WideCharToMultiByte 14701->14708 14703 40c009 WideCharToMultiByte 14702->14703 14705 407e22 _strlen 14703->14705 14710 40bea8 14705->14710 14707->14460 14709 40c033 14708->14709 14709->14702 14711 40de44 __vswprintf_c_l 100 API calls 14710->14711 14712 40bec0 14711->14712 14712->14707 14714 40dce4 RaiseException 14713->14714 14715 40dcd8 14713->14715 14714->14414 14715->14714 18202 40dd0b 18205 40dcfb 18202->18205 18204 40dd18 ctype 18208 412fdc 18205->18208 18207 40dd09 18207->18204 18209 412fe8 _flsall 18208->18209 18210 410fa0 __lock 66 API calls 18209->18210 18214 412fef 18210->18214 18211 413028 18218 413043 18211->18218 18213 41301f 18216 40d81b _realloc 66 API calls 18213->18216 18214->18211 18214->18213 18217 40d81b _realloc 66 API calls 18214->18217 18215 413039 _flsall 18215->18207 18216->18211 18217->18213 18221 410ec6 LeaveCriticalSection 18218->18221 18220 41304a 18220->18215 18221->18220 16883 40332f 16884 403342 16883->16884 16885 403419 16883->16885 16886 403348 GetStdHandle 16884->16886 16890 403353 16884->16890 16886->16890 16887 40339e WriteFile 16887->16890 16888 403371 16889 403373 WriteFile 16888->16889 16888->16890 16889->16888 16889->16890 16890->16885 16890->16887 16890->16888 16890->16889 16892 40340d 16890->16892 16894 401604 16890->16894 16903 401797 16892->16903 16895 40160f 16894->16895 16896 40160a __write_nolock 16894->16896 16895->16890 16897 40822f 103 API calls 16896->16897 16898 40bfb7 16897->16898 16899 40bea8 _swprintf 100 API calls 16898->16899 16900 40bfc9 GetLastError 16899->16900 16901 40822f 103 API calls 16900->16901 16902 40bfe0 MessageBoxW SetLastError 16901->16902 16902->16890 16908 40173f 16903->16908 16905 4017a7 16906 4015ab RaiseException 16905->16906 16907 4017b0 16906->16907 16907->16885 16909 401ebd 118 API calls 16908->16909 16910 401751 16909->16910 16910->16905 17240 414231 17247 418ace 17240->17247 17243 414244 17244 40d81b _realloc 66 API calls 17243->17244 17246 41424f 17244->17246 17260 4189f4 17247->17260 17249 414236 17249->17243 17250 4188a5 17249->17250 17251 4188b1 _flsall 17250->17251 17252 410fa0 __lock 66 API calls 17251->17252 17259 4188bd 17252->17259 17253 418926 17301 41893b 17253->17301 17255 418932 _flsall 17255->17243 17257 4188fb DeleteCriticalSection 17258 40d81b _realloc 66 API calls 17257->17258 17258->17259 17259->17253 17259->17257 17288 41a72c 17259->17288 17261 418a00 _flsall 17260->17261 17262 410fa0 __lock 66 API calls 17261->17262 17264 418a0f 17262->17264 17263 418aa7 17278 418ac5 17263->17278 17264->17263 17269 4189ac 104 API calls __fflush_nolock 17264->17269 17270 414292 17264->17270 17275 418a96 17264->17275 17266 418ab3 _flsall 17266->17249 17269->17264 17271 4142b5 EnterCriticalSection 17270->17271 17272 41429f 17270->17272 17271->17264 17273 410fa0 __lock 66 API calls 17272->17273 17274 4142a8 17273->17274 17274->17264 17281 414300 17275->17281 17277 418aa4 17277->17264 17287 410ec6 LeaveCriticalSection 17278->17287 17280 418acc 17280->17266 17282 414310 17281->17282 17283 414323 LeaveCriticalSection 17281->17283 17286 410ec6 LeaveCriticalSection 17282->17286 17283->17277 17285 414320 17285->17277 17286->17285 17287->17280 17289 41a738 _flsall 17288->17289 17290 41a769 17289->17290 17291 41a74c 17289->17291 17298 41a761 _flsall 17290->17298 17304 414251 17290->17304 17292 410dab _write_string 66 API calls 17291->17292 17293 41a751 17292->17293 17295 413373 __calloc_impl 6 API calls 17293->17295 17295->17298 17298->17259 17415 410ec6 LeaveCriticalSection 17301->17415 17303 418942 17303->17255 17305 414263 17304->17305 17306 414285 EnterCriticalSection 17304->17306 17305->17306 17308 41426b 17305->17308 17307 41427b 17306->17307 17310 41a6b5 17307->17310 17309 410fa0 __lock 66 API calls 17308->17309 17309->17307 17311 41a6e5 17310->17311 17312 41a6c9 17310->17312 17324 41a6de 17311->17324 17329 418944 17311->17329 17313 410dab _write_string 66 API calls 17312->17313 17314 41a6ce 17313->17314 17316 413373 __calloc_impl 6 API calls 17314->17316 17316->17324 17320 4184fd __fileno 66 API calls 17321 41a6ff 17320->17321 17339 41a925 17321->17339 17323 41a705 17323->17324 17325 40d81b _realloc 66 API calls 17323->17325 17326 41a7a0 17324->17326 17325->17324 17408 4142c4 17326->17408 17328 41a7a6 17328->17298 17330 41895d 17329->17330 17334 41897f 17329->17334 17331 4184fd __fileno 66 API calls 17330->17331 17330->17334 17332 418978 17331->17332 17333 418374 __locking 100 API calls 17332->17333 17333->17334 17335 41c91f 17334->17335 17336 41a6f9 17335->17336 17337 41c92f 17335->17337 17336->17320 17337->17336 17338 40d81b _realloc 66 API calls 17337->17338 17338->17336 17340 41a931 _flsall 17339->17340 17341 41a954 17340->17341 17342 41a939 17340->17342 17343 41a962 17341->17343 17348 41a9a3 17341->17348 17344 410dbe __dosmaperr 66 API calls 17342->17344 17345 410dbe __dosmaperr 66 API calls 17343->17345 17346 41a93e 17344->17346 17347 41a967 17345->17347 17349 410dab _write_string 66 API calls 17346->17349 17350 410dab _write_string 66 API calls 17347->17350 17351 419fd2 ___lock_fhandle 67 API calls 17348->17351 17352 41a946 _flsall 17349->17352 17353 41a96e 17350->17353 17354 41a9a9 17351->17354 17352->17323 17355 413373 __calloc_impl 6 API calls 17353->17355 17356 41a9c4 17354->17356 17357 41a9b6 17354->17357 17355->17352 17358 410dab _write_string 66 API calls 17356->17358 17362 41a889 17357->17362 17360 41a9be 17358->17360 17377 41a9e8 17360->17377 17380 419f5b 17362->17380 17364 41a8ef 17393 419ed5 17364->17393 17365 41a899 17365->17364 17366 41a8cd 17365->17366 17368 419f5b __lseeki64_nolock 66 API calls 17365->17368 17366->17364 17369 419f5b __lseeki64_nolock 66 API calls 17366->17369 17371 41a8c4 17368->17371 17372 41a8d9 CloseHandle 17369->17372 17374 419f5b __lseeki64_nolock 66 API calls 17371->17374 17372->17364 17375 41a8e5 GetLastError 17372->17375 17373 41a919 17373->17360 17374->17366 17375->17364 17407 41a072 LeaveCriticalSection 17377->17407 17379 41a9f0 17379->17352 17381 419f80 17380->17381 17382 419f68 17380->17382 17384 410dbe __dosmaperr 66 API calls 17381->17384 17387 419fc5 17381->17387 17383 410dbe __dosmaperr 66 API calls 17382->17383 17385 419f6d 17383->17385 17388 419fae 17384->17388 17386 410dab _write_string 66 API calls 17385->17386 17389 419f75 17386->17389 17387->17365 17390 410dab _write_string 66 API calls 17388->17390 17389->17365 17391 419fb5 17390->17391 17392 413373 __calloc_impl 6 API calls 17391->17392 17392->17387 17394 419f41 17393->17394 17395 419ee6 17393->17395 17396 410dab _write_string 66 API calls 17394->17396 17395->17394 17400 419f11 17395->17400 17397 419f46 17396->17397 17398 410dbe __dosmaperr 66 API calls 17397->17398 17399 419f37 17398->17399 17399->17373 17402 410dd1 17399->17402 17400->17399 17401 419f31 SetStdHandle 17400->17401 17401->17399 17403 410dbe __dosmaperr 66 API calls 17402->17403 17404 410ddc __dosmaperr 17403->17404 17405 410dab _write_string 66 API calls 17404->17405 17406 410def 17405->17406 17406->17373 17407->17379 17409 4142d5 17408->17409 17410 4142f4 LeaveCriticalSection 17408->17410 17409->17410 17411 4142dc 17409->17411 17410->17328 17414 410ec6 LeaveCriticalSection 17411->17414 17413 4142f1 17413->17328 17414->17413 17415->17303 17416 412c35 17417 412c41 _flsall 17416->17417 17418 412c59 17417->17418 17420 412d43 _flsall 17417->17420 17421 40d81b _realloc 66 API calls 17417->17421 17419 412c67 17418->17419 17422 40d81b _realloc 66 API calls 17418->17422 17423 412c75 17419->17423 17424 40d81b _realloc 66 API calls 17419->17424 17421->17418 17422->17419 17425 412c83 17423->17425 17426 40d81b _realloc 66 API calls 17423->17426 17424->17423 17427 412c91 17425->17427 17429 40d81b _realloc 66 API calls 17425->17429 17426->17425 17428 412c9f 17427->17428 17430 40d81b _realloc 66 API calls 17427->17430 17431 412cad 17428->17431 17432 40d81b _realloc 66 API calls 17428->17432 17429->17427 17430->17428 17433 412cbe 17431->17433 17434 40d81b _realloc 66 API calls 17431->17434 17432->17431 17435 410fa0 __lock 66 API calls 17433->17435 17434->17433 17436 412cc6 17435->17436 17437 412cd2 InterlockedDecrement 17436->17437 17438 412ceb 17436->17438 17437->17438 17439 412cdd 17437->17439 17452 412d4f 17438->17452 17439->17438 17442 40d81b _realloc 66 API calls 17439->17442 17442->17438 17443 410fa0 __lock 66 API calls 17444 412cff 17443->17444 17451 412d30 17444->17451 17455 4154ed 17444->17455 17448 40d81b _realloc 66 API calls 17448->17420 17499 412d5b 17451->17499 17502 410ec6 LeaveCriticalSection 17452->17502 17454 412cf8 17454->17443 17456 412d14 17455->17456 17457 4154fe InterlockedDecrement 17455->17457 17456->17451 17469 415315 17456->17469 17458 415513 InterlockedDecrement 17457->17458 17459 415516 17457->17459 17458->17459 17460 415520 InterlockedDecrement 17459->17460 17461 415523 17459->17461 17460->17461 17462 415530 17461->17462 17463 41552d InterlockedDecrement 17461->17463 17464 41553a InterlockedDecrement 17462->17464 17465 41553d 17462->17465 17463->17462 17464->17465 17466 415556 InterlockedDecrement 17465->17466 17467 415566 InterlockedDecrement 17465->17467 17468 415571 InterlockedDecrement 17465->17468 17466->17465 17467->17465 17468->17456 17470 415399 17469->17470 17478 41532c 17469->17478 17471 40d81b _realloc 66 API calls 17470->17471 17472 4153e6 17470->17472 17473 4153ba 17471->17473 17490 41540d 17472->17490 17527 4192fe 17472->17527 17475 40d81b _realloc 66 API calls 17473->17475 17480 4153cd 17475->17480 17476 415381 17481 40d81b _realloc 66 API calls 17476->17481 17477 415360 17477->17476 17486 40d81b _realloc 66 API calls 17477->17486 17478->17470 17478->17477 17483 40d81b _realloc 66 API calls 17478->17483 17485 40d81b _realloc 66 API calls 17480->17485 17487 41538e 17481->17487 17482 415452 17488 40d81b _realloc 66 API calls 17482->17488 17489 415355 17483->17489 17484 40d81b _realloc 66 API calls 17484->17490 17491 4153db 17485->17491 17492 415376 17486->17492 17494 40d81b _realloc 66 API calls 17487->17494 17495 415458 17488->17495 17503 4194d8 17489->17503 17490->17482 17493 40d81b 66 API calls _realloc 17490->17493 17497 40d81b _realloc 66 API calls 17491->17497 17519 419493 17492->17519 17493->17490 17494->17470 17495->17451 17497->17472 17615 410ec6 LeaveCriticalSection 17499->17615 17501 412d3d 17501->17448 17502->17454 17504 4194e5 17503->17504 17518 419562 17503->17518 17505 4194f6 17504->17505 17506 40d81b _realloc 66 API calls 17504->17506 17507 419508 17505->17507 17508 40d81b _realloc 66 API calls 17505->17508 17506->17505 17509 40d81b _realloc 66 API calls 17507->17509 17511 41951a 17507->17511 17508->17507 17509->17511 17510 40d81b _realloc 66 API calls 17512 41952c 17510->17512 17511->17510 17511->17512 17513 40d81b _realloc 66 API calls 17512->17513 17515 41953e 17512->17515 17513->17515 17514 419550 17517 40d81b _realloc 66 API calls 17514->17517 17514->17518 17515->17514 17516 40d81b _realloc 66 API calls 17515->17516 17516->17514 17517->17518 17518->17477 17520 4194a0 17519->17520 17521 4194d4 17519->17521 17522 4194b0 17520->17522 17524 40d81b _realloc 66 API calls 17520->17524 17521->17476 17523 4194c2 17522->17523 17525 40d81b _realloc 66 API calls 17522->17525 17523->17521 17526 40d81b _realloc 66 API calls 17523->17526 17524->17522 17525->17523 17526->17521 17528 41930f 17527->17528 17614 415406 17527->17614 17529 40d81b _realloc 66 API calls 17528->17529 17530 419317 17529->17530 17531 40d81b _realloc 66 API calls 17530->17531 17532 41931f 17531->17532 17533 40d81b _realloc 66 API calls 17532->17533 17534 419327 17533->17534 17535 40d81b _realloc 66 API calls 17534->17535 17536 41932f 17535->17536 17537 40d81b _realloc 66 API calls 17536->17537 17538 419337 17537->17538 17539 40d81b _realloc 66 API calls 17538->17539 17540 41933f 17539->17540 17541 40d81b _realloc 66 API calls 17540->17541 17542 419346 17541->17542 17543 40d81b _realloc 66 API calls 17542->17543 17544 41934e 17543->17544 17545 40d81b _realloc 66 API calls 17544->17545 17546 419356 17545->17546 17547 40d81b _realloc 66 API calls 17546->17547 17548 41935e 17547->17548 17549 40d81b _realloc 66 API calls 17548->17549 17550 419366 17549->17550 17551 40d81b _realloc 66 API calls 17550->17551 17552 41936e 17551->17552 17553 40d81b _realloc 66 API calls 17552->17553 17554 419376 17553->17554 17555 40d81b _realloc 66 API calls 17554->17555 17556 41937e 17555->17556 17557 40d81b _realloc 66 API calls 17556->17557 17558 419386 17557->17558 17559 40d81b _realloc 66 API calls 17558->17559 17560 41938e 17559->17560 17561 40d81b _realloc 66 API calls 17560->17561 17562 419399 17561->17562 17563 40d81b _realloc 66 API calls 17562->17563 17564 4193a1 17563->17564 17565 40d81b _realloc 66 API calls 17564->17565 17566 4193a9 17565->17566 17567 40d81b _realloc 66 API calls 17566->17567 17568 4193b1 17567->17568 17569 40d81b _realloc 66 API calls 17568->17569 17570 4193b9 17569->17570 17571 40d81b _realloc 66 API calls 17570->17571 17572 4193c1 17571->17572 17573 40d81b _realloc 66 API calls 17572->17573 17574 4193c9 17573->17574 17575 40d81b _realloc 66 API calls 17574->17575 17576 4193d1 17575->17576 17577 40d81b _realloc 66 API calls 17576->17577 17578 4193d9 17577->17578 17579 40d81b _realloc 66 API calls 17578->17579 17614->17484 17615->17501

                        Control-flow Graph

                        APIs
                          • Part of subcall function 0040B64D: GetModuleHandleW.KERNEL32(kernel32,0040B0DF,00000001), ref: 0040B652
                          • Part of subcall function 0040B64D: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040B662
                        • OleInitialize.OLE32(00000000), ref: 0040B0E2
                          • Part of subcall function 0040C2F4: GetCPInfo.KERNEL32(00000000,?,?,?,?,0040B0F2), ref: 0040C305
                          • Part of subcall function 0040C2F4: IsDBCSLeadByte.KERNEL32(00000000), ref: 0040C319
                        • _memset.LIBCMT ref: 0040B0FF
                        • GetCommandLineW.KERNEL32 ref: 0040B107
                        • OpenFileMappingW.KERNEL32(00000004,00000000,winrarsfxmappingfile.tmp), ref: 0040B12A
                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00007000), ref: 0040B13D
                        • SetEnvironmentVariableW.KERNEL32(sfxcmd,00429478), ref: 0040B15B
                        • UnmapViewOfFile.KERNEL32(?), ref: 0040B164
                        • CloseHandle.KERNEL32(?), ref: 0040B16D
                        • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0040B17D
                        • GetModuleFileNameW.KERNEL32(00000000,00428478,00000800), ref: 0040B18F
                        • SetEnvironmentVariableW.KERNEL32(sfxname,00428478), ref: 0040B19B
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040B1A2
                        • LoadIconW.USER32(00000000,00000064), ref: 0040B1B9
                        • LoadBitmapW.USER32(00000065), ref: 0040B1CC
                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,0040A847,00000000), ref: 0040B22B
                        • DeleteObject.GDI32 ref: 0040B28C
                        • DeleteObject.GDI32(?), ref: 0040B298
                        • Sleep.KERNEL32(?), ref: 0040B2D9
                        • OleUninitialize.OLE32 ref: 0040B2DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: File$EnvironmentHandleModuleVariable$DeleteLoadObjectView$AddressBitmapByteCloseCommandDialogIconInfoInitializeLeadLineMappingNameOpenParamProcSleepUninitializeUnmap_memset
                        • String ID: STARTDLG$sfxcmd$sfxname$winrarsfxmappingfile.tmp$%C
                        • API String ID: 3777249056-841220935
                        • Opcode ID: 3ed3843971e9cfe683b1bf37d58e784be8da9e7e1e92226e70d090edaf2b6e0b
                        • Instruction ID: d57a0d56a34921795b4af96bbcbb4082dac24877fedc564b5ad1d380923ea46d
                        • Opcode Fuzzy Hash: 3ed3843971e9cfe683b1bf37d58e784be8da9e7e1e92226e70d090edaf2b6e0b
                        • Instruction Fuzzy Hash: 56518FB0D01205AFC710BBA1AD9999E3F79EB18708F10817FF602A72E1DB785945CB6D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __allrem$H_prolog_memset
                        • String ID: 3$H$Insidious_protected.exe$z01$zip$zipx$zx01$%C$%C$%C$%C$%C$%C
                        • API String ID: 2356925579-2458116952
                        • Opcode ID: 93d7a3149169eaeacd2c7ef8a7ba533d2073d00fa4ffcbda9f31182d9ee583c6
                        • Instruction ID: 8828c648aefdc230862320269ab57490d26fcb27702a3dfb38db9710d3fe6dab
                        • Opcode Fuzzy Hash: 93d7a3149169eaeacd2c7ef8a7ba533d2073d00fa4ffcbda9f31182d9ee583c6
                        • Instruction Fuzzy Hash: 1E82CF745443409BD720DF66DD89A6BB7E8BB8A704F10483FF980A32E1D7B89944CB5E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1248 40481a-40483d call 40d7f0 1251 4048a9-4048b4 FindNextFileW 1248->1251 1252 40483f-404850 FindFirstFileW 1248->1252 1255 4048b6-4048c6 GetLastError 1251->1255 1256 4048cc-4048d0 1251->1256 1253 4048d6-40499c call 40b382 call 4064ba call 40de70 call 40b6d1 * 3 1252->1253 1254 404856-404868 call 406631 1252->1254 1258 4049a1-4049af 1253->1258 1263 404882-40488b GetLastError 1254->1263 1264 40486a-404880 FindFirstFileW 1254->1264 1255->1256 1256->1253 1256->1258 1266 40489c 1263->1266 1267 40488d-404890 1263->1267 1264->1253 1264->1263 1270 40489e-4048a4 1266->1270 1267->1266 1269 404892-404895 1267->1269 1269->1266 1272 404897-40489a 1269->1272 1270->1258 1272->1270
                        APIs
                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000000,?,00404A89,000000FF,?,?), ref: 00404848
                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,00404A89,000000FF,?,?), ref: 00404878
                        • GetLastError.KERNEL32(?,?,00000800,?,00404A89,000000FF,?,?), ref: 00404882
                        • FindNextFileW.KERNEL32(000000FF,?,?,?,00000000,?,00404A89,000000FF,?,?), ref: 004048AC
                        • GetLastError.KERNEL32(?,00404A89,000000FF,?,?), ref: 004048BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: FileFind$ErrorFirstLast$Next
                        • String ID:
                        • API String ID: 869497890-0
                        • Opcode ID: d86ee8be5f792bd21fd25c0da1c784a6bf8e5caed65adbe5ddeae9c78af4578d
                        • Instruction ID: 483df7094ef5f58f7109c0edb8e3df7190878b44969ca4b5edca9a910ae85842
                        • Opcode Fuzzy Hash: d86ee8be5f792bd21fd25c0da1c784a6bf8e5caed65adbe5ddeae9c78af4578d
                        • Instruction Fuzzy Hash: 224183B59006549BCB20DF68CC84ADA77F8EF48354F10897AF56EE2290D734AA84CB58
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID:
                        • API String ID: 2102423945-0
                        • Opcode ID: 6659296daf81f644785d86ff953efa74c78b7b711dd00ccefc7226c385f79afe
                        • Instruction ID: 77ddf0ce1f92c3b09370f94160ba925cd0023407679e7fb8a963a825e18ef5b7
                        • Opcode Fuzzy Hash: 6659296daf81f644785d86ff953efa74c78b7b711dd00ccefc7226c385f79afe
                        • Instruction Fuzzy Hash: FDE13E76900A19CBCB10DB94CC846AFB6B1FB46324F20033BC865B32E2D37959429F5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 40a847-40a87a call 40dc90 call 40d7f0 call 40150b 7 40a884-40a88d 0->7 8 40a87c-40a87f 0->8 9 40a893-40a894 7->9 10 40ae16-40ae29 7->10 11 40b0bf-40b0cc 8->11 12 40a8a5-40a8a7 9->12 13 40a896-40a89b 9->13 14 40ae3a-40ae41 10->14 15 40ae2b-40ae34 SendMessageW 10->15 18 40b0be 12->18 16 40a906-40a922 GetDlgItemTextW 13->16 17 40a89d-40a89e 13->17 19 40ae53-40ae9e call 408f9a GetDlgItem SendMessageW call 40d24f GetDlgItem 14->19 20 40ae43-40ae4d SendDlgItemMessageW 14->20 15->14 21 40a924-40a92a 16->21 22 40a937-40a93d 16->22 23 40a8a0-40a8a3 17->23 24 40a8de-40a8eb 17->24 18->11 51 40aea0 19->51 52 40aea6-40aed9 SetWindowTextW call 40d266 call 4088cb 19->52 20->19 26 40a933-40a935 21->26 27 40a92c 21->27 28 40a94e-40a960 GetDlgItem 22->28 29 40a93f-40a949 22->29 23->12 30 40a8ac-40a8c3 call 40822f call 401000 23->30 32 40a8f9 24->32 33 40a8ed-40a8f3 24->33 34 40a8fa-40a901 EndDialog 26->34 27->26 36 40a962-40a983 SendMessageW * 2 28->36 37 40a988-40a997 SetFocus 28->37 35 40ad9d-40ada3 29->35 40 40b0bb-40b0bd 30->40 60 40a8c9-40a8d9 SetDlgItemTextW 30->60 32->34 33->32 33->40 34->40 41 40ada5-40adab 35->41 42 40ae07-40ae09 KiUserCallbackDispatcher 35->42 36->37 44 40a9a5-40a9ec call 40b382 call 409157 call 40822f call 40bea8 37->44 45 40a999-40a9a3 call 40822f 37->45 40->18 41->42 48 40adad-40adcf call 40822f SetDlgItemTextW 41->48 47 40ae0f-40ae11 42->47 61 40a9f2-40a9ff call 408625 44->61 45->61 47->18 65 40add1-40add6 48->65 66 40add8-40ade4 48->66 51->52 73 40aee9-40aeef 52->73 74 40aedb-40aee4 call 409b11 52->74 60->40 76 40aa01-40aa08 call 408e65 61->76 77 40aa0d-40aa1f call 403bb9 61->77 72 40adea-40ae05 call 40822f * 2 MessageBoxW 65->72 66->72 72->47 81 40aef5-40af03 73->81 82 40af7f-40af8b 73->82 74->73 76->77 97 40aa21-40aa2a GetLastError 77->97 98 40aa35-40aa46 call 40d23c 77->98 87 40af06-40af09 81->87 88 40afad-40afb3 82->88 89 40af8d-40afab call 40822f SetDlgItemTextW call 40822f SetDlgItemTextW 82->89 92 40af13-40af1a 87->92 93 40af0b-40af11 87->93 95 40b049-40b050 88->95 96 40afb9-40afc1 call 409b11 88->96 89->88 103 40af24-40af4d call 40d794 call 40822f call 40d794 92->103 104 40af1c-40af22 92->104 93->92 101 40af4e-40af58 93->101 105 40b052-40b056 EnableWindow 95->105 106 40b05c-40b062 95->106 116 40afc6-40afcd 96->116 108 40aa31 97->108 109 40aa2c-40aa2f 97->109 117 40aa57-40aa5d 98->117 118 40aa48-40aa51 GetLastError 98->118 101->87 111 40af5a-40af60 101->111 103->101 104->101 104->103 105->106 114 40b064-40b071 call 4014c8 * 2 106->114 115 40b076-40b07d 106->115 108->98 109->98 109->108 111->82 119 40af62-40af7a call 40d027 111->119 114->115 120 40b0a3-40b0a9 115->120 121 40b07f-40b085 115->121 125 40affa-40b001 116->125 126 40afcf-40afd5 116->126 130 40aac7-40aaca 117->130 131 40aa5f-40aa62 117->131 118->117 127 40aa53 118->127 119->82 120->40 134 40b0ab-40b0b9 call 40822f SetDlgItemTextW 120->134 121->120 129 40b087-40b093 121->129 132 40b003-40b011 SetForegroundWindow 125->132 133 40b03b-40b044 call 409b11 125->133 126->125 137 40afd7-40aff9 call 40d027 call 40d81b 126->137 127->117 142 40b095-40b09b SendMessageW 129->142 143 40b09d PostMessageW 129->143 140 40acd0-40ad18 call 4014e6 * 2 call 4014c8 call 4014e6 SetDlgItemTextW GetDlgItem 130->140 141 40aad0-40aad6 130->141 144 40aa64-40aa9d GetTickCount call 40bea8 call 40307b call 4031f3 131->144 145 40aadb-40aae5 131->145 132->133 146 40b013-40b019 132->146 133->95 134->40 137->125 197 40ad34-40ad6f call 409b11 * 2 call 4096b0 call 409b11 140->197 198 40ad1a-40ad2e GetWindowLongW SetWindowLongW 140->198 141->145 151 40aad8 141->151 142->120 143->120 182 40aaa2-40aaa7 144->182 152 40ac73-40acc5 call 40822f call 40bea8 call 401568 call 40822f MessageBoxW 145->152 153 40aaeb-40ab9a GetModuleFileNameW call 4083f8 call 40bea8 CreateFileMappingW 145->153 146->133 155 40b01b-40b035 DialogBoxParamW 146->155 151->145 152->140 180 40ac03-40ac33 ShellExecuteExW call 4083ad * 2 153->180 181 40ab9c-40aba4 GetCommandLineW 153->181 155->27 155->133 207 40ac35-40ac56 WaitForInputIdle Sleep 180->207 208 40ac58 180->208 186 40abb6-40abfd call 40859f * 3 MapViewOfFile call 40dfe0 UnmapViewOfFile 181->186 187 40aba6-40abb1 call 40b382 181->187 188 40aab8-40aac2 call 403507 182->188 189 40aaa9-40aab2 GetLastError 182->189 186->180 187->186 188->130 189->188 196 40aab4 189->196 196->188 222 40ad71-40ad77 197->222 223 40ad8f-40ad97 call 4014c8 197->223 198->197 211 40ac5c-40ac5f 207->211 208->211 214 40ac61-40ac64 CloseHandle 211->214 215 40ac6a-40ac6d 211->215 214->215 215->32 215->152 222->223 225 40ad79-40ad7f 222->225 223->35 225->223 227 40ad81-40ad8a call 409b11 225->227 227->223
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp$$C$%C
                        • API String ID: 3519838083-2548614106
                        • Opcode ID: a6c2bb385e9bc1d9f5cd260cc57925290932fa0272df4d32275fbf75a4450ebb
                        • Instruction ID: 5178f83fe43fa3fda9d46bd972861b4db92c67d4781c9b8d348c08c9d1727edc
                        • Opcode Fuzzy Hash: a6c2bb385e9bc1d9f5cd260cc57925290932fa0272df4d32275fbf75a4450ebb
                        • Instruction Fuzzy Hash: 7522D3B1940344BEEB20AB60AD45EDF376DEB14304F00417AF645B61E2CB7D4A94CB6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 229 409b11-409b29 call 40dc90 call 40d7f0 234 40a6ee-40a6f9 229->234 235 409b2f-409b55 call 408b5a 229->235 235->234 238 409b5b-409b5e 235->238 239 409b63-409b7d 238->239 240 409b84-409b97 call 409091 239->240 243 409b99 240->243 244 409b9d-409bb5 call 40c212 243->244 247 409bc5-409bc9 244->247 248 409bb7-409bbe 244->248 250 40a6bf-40a6e5 call 408b5a 247->250 251 409bcf-409bd2 247->251 248->244 249 409bc0 248->249 249->250 250->239 266 40a6eb-40a6ed 250->266 252 409dc0-409dc4 251->252 253 409e81-409e85 251->253 254 409e62-409e66 251->254 255 409bd9-409bdd 251->255 252->250 260 409dca-409dd9 252->260 253->250 258 409e8b-409e93 253->258 254->250 257 409e6c-409e7c SetWindowTextW 254->257 255->250 259 409be3-409c4d call 40d24f call 406232 call 4047d7 call 404800 call 403c8e call 4049b2 255->259 257->250 258->250 262 409e99-409eb3 258->262 326 409c53 259->326 327 409dac-409dbb call 4047ed 259->327 264 409de8-409dec 260->264 265 409ddb-409de7 call 40d794 260->265 267 409eb5-409ebb 262->267 268 409ebe-409ec7 call 40d77a 262->268 271 409df6-409dfe call 408d06 264->271 272 409dee-409df4 264->272 265->264 266->234 267->268 268->250 285 409ecd-409ed4 268->285 276 409e00-409e04 271->276 272->276 281 409e06-409e08 276->281 282 409e0a-409e16 call 40d77a 276->282 283 409e18-409e3c call 40d77a call 40e345 281->283 282->283 313 409e43-409e50 call 40d794 283->313 314 409e3e-409e40 283->314 289 409ef0-409ef4 285->289 290 409ed6-409edb 285->290 295 409fd5 289->295 296 409efa-409efd 289->296 290->289 293 409edd-409ee4 290->293 293->250 299 409eea-409eeb 293->299 297 409fd6-409fdd call 40d7c2 295->297 301 409f0a-409f24 RegOpenKeyExW 296->301 302 409eff-409f04 296->302 312 409fe2-409fe3 297->312 299->297 303 409f26-409f60 RegQueryValueExW RegCloseKey 301->303 304 409f6f-409f77 301->304 302->295 302->301 308 409f62 303->308 309 409f65-409f67 303->309 310 409fa4-409fc2 call 40d77a * 2 304->310 311 409f79-409f8f call 40d77a 304->311 308->309 309->304 317 409fe4-409ff6 call 40e9d6 310->317 346 409fc4-409fd3 call 40d794 310->346 311->310 328 409f91-409fa3 call 40d794 311->328 312->317 313->250 330 409e56-409e5d call 40d81b 313->330 314->313 335 40a004-40a052 call 40d7c2 call 408eef GetDlgItem SetWindowTextW SendMessageW call 40e6c2 317->335 336 409ff8-409ffd 317->336 332 409c58-409c6e SetFileAttributesW 326->332 327->250 328->310 330->250 339 409c74-409ca8 call 4065a2 call 406202 call 40d77a 332->339 340 409d16-409d22 GetFileAttributesW 332->340 364 40a057-40a05b 335->364 336->335 343 409fff-40a001 336->343 371 409caa-409cba call 40d77a 339->371 372 409cbc-409cca call 4061c9 339->372 349 409d90-409da6 call 4049b2 340->349 350 409d24-409d33 DeleteFileW 340->350 343->335 346->312 349->327 349->332 350->349 354 409d35-409d39 350->354 359 409d41-409d65 call 40bea8 GetFileAttributesW 354->359 369 409d67-409d7d MoveFileW 359->369 370 409d3b-409d3e 359->370 364->250 367 40a061-40a076 SendMessageW 364->367 367->250 369->349 373 409d7f-409d8a MoveFileExW 369->373 370->359 371->372 378 409cd0-409d10 call 40d77a call 40d700 SHFileOperationW 371->378 372->327 372->378 373->349 378->340
                        APIs
                        • __EH_prolog.LIBCMT ref: 00409B16
                          • Part of subcall function 00408B5A: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00408C08
                        • SetFileAttributesW.KERNEL32(?,00000000,?,00000000,?,?,00000800,?,00000000,75C05540,?,0040A7FB,?,00000003), ref: 00409C61
                        • _wcslen.LIBCMT ref: 00409C9C
                        • _wcslen.LIBCMT ref: 00409CB1
                        • _wcslen.LIBCMT ref: 00409CD7
                        • _memset.LIBCMT ref: 00409CED
                        • SHFileOperationW.SHELL32 ref: 00409D10
                        • GetFileAttributesW.KERNEL32(?), ref: 00409D1D
                        • DeleteFileW.KERNEL32(?), ref: 00409D2B
                        • _wcscat.LIBCMT ref: 00409DE1
                        • _wcslen.LIBCMT ref: 00409E19
                        • _realloc.LIBCMT ref: 00409E2B
                        • _wcscat.LIBCMT ref: 00409E45
                        • SetWindowTextW.USER32(?,?), ref: 00409E76
                        • _wcslen.LIBCMT ref: 00409EBF
                        • _wcscpy.LIBCMT ref: 00409FDD
                        • _wcsrchr.LIBCMT ref: 00409FED
                        • _wcscpy.LIBCMT ref: 0040A00C
                        • GetDlgItem.USER32(?,00000066), ref: 0040A025
                        • SetWindowTextW.USER32(00000000,?), ref: 0040A035
                        • SendMessageW.USER32(00000000,00000143,00000000,%s.%d.tmp), ref: 0040A044
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0040A070
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcslen$File$AttributesMessageSendTextWindow_wcscat_wcscpy$DeleteEnvironmentExpandH_prologItemOperationStrings_memset_realloc_wcsrchr
                        • String ID: "$%s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$\$ptB
                        • API String ID: 3339014310-1695825237
                        • Opcode ID: 42d3bcfdc166a98c85a5e60752234009d6106980f2918d5e415d089bd9690482
                        • Instruction ID: 3df918e2903721f6b302a02e720def44bd50fc7f7a87231eab9095fc7ae84b3e
                        • Opcode Fuzzy Hash: 42d3bcfdc166a98c85a5e60752234009d6106980f2918d5e415d089bd9690482
                        • Instruction Fuzzy Hash: 05F11DB1C00219AADB20DBA4DC45FEE7778BF04314F0444BBF649B21D1EB789A99CB59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 846 4097d2-4097e8 call 40d7f0 849 409a39-409a3c 846->849 850 4097ee-4097fa call 40d77a 846->850 850->849 853 409800-409823 call 40d700 850->853 856 409825-40982b 853->856 857 40982d 853->857 858 409830-409835 856->858 857->858 859 409886-40988b 858->859 860 409837 858->860 861 409892-409895 859->861 862 40988d-409890 859->862 863 409839-40983d 860->863 864 4098a7-4098bb call 4064df 861->864 865 409897-40989e 861->865 862->861 862->864 866 409858-40985d 863->866 867 40983f 863->867 881 4098d3-4098df call 403b14 864->881 882 4098bd-4098ca call 40c212 864->882 865->864 870 4098a0 865->870 868 409872-409879 866->868 869 40985f-409865 866->869 871 409848-40984d 867->871 874 409880-409883 868->874 875 40987b-40987d 868->875 869->868 873 409867-40986e 869->873 870->864 876 409841-409846 871->876 877 40984f 871->877 873->863 879 409870 873->879 874->859 875->874 876->871 880 409851-409854 876->880 877->866 879->859 880->866 888 4098e1-4098fb call 406823 881->888 889 4098fe-409907 881->889 882->881 887 4098cc 882->887 887->881 888->889 891 409940-40994c ShellExecuteExW 889->891 892 409909-40990b 889->892 893 409952-409968 891->893 894 409a38 891->894 892->891 896 40990d-40993a call 40d7c2 call 40d794 call 403b14 892->896 897 409979-40997d 893->897 898 40996a-40996e 893->898 894->849 896->891 896->894 901 409997-4099b4 WaitForInputIdle call 408c30 897->901 902 40997f-40998a IsWindowVisible 897->902 898->897 900 409970-409977 898->900 900->897 904 4099d9-4099e6 CloseHandle 900->904 901->904 916 4099b6-4099c5 GetExitCodeProcess 901->916 902->901 905 40998c-409993 ShowWindow 902->905 908 4099f5-4099fc 904->908 909 4099e8-4099f3 call 40c212 904->909 905->901 914 409a10-409a20 908->914 915 4099fe-409a02 908->915 909->908 920 409a25-409a29 909->920 914->920 915->914 919 409a04-409a0e 915->919 916->904 921 4099c7-4099d2 916->921 919->920 920->894 922 409a2b-409a2f 920->922 921->904 923 4099d4 921->923 922->894 924 409a31-409a36 ShowWindow 922->924 923->904 924->894
                        APIs
                        • _wcslen.LIBCMT ref: 004097EF
                        • _memset.LIBCMT ref: 0040980A
                        • _wcscpy.LIBCMT ref: 00409917
                        • _wcscat.LIBCMT ref: 00409924
                        • ShellExecuteExW.SHELL32(?), ref: 00409944
                        • IsWindowVisible.USER32(00000000), ref: 00409982
                        • ShowWindow.USER32(00000000,00000000), ref: 00409991
                        • WaitForInputIdle.USER32(?,000007D0), ref: 0040999F
                        • GetExitCodeProcess.KERNEL32(?,00000000), ref: 004099BD
                        • CloseHandle.KERNEL32(?), ref: 004099DC
                        • ShowWindow.USER32(00000000,00000001), ref: 00409A36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_memset_wcscat_wcscpy_wcslen
                        • String ID: .exe$.inf
                        • API String ID: 2379411779-3750412487
                        • Opcode ID: 4f6f64e0b160e46855d292abad54f2291d928e6b184ee7e9fbbfab5a87af0261
                        • Instruction ID: f4ff59a1633e2c667f3ddf577d7facdf97bd6102329e280969c609ca04d80c50
                        • Opcode Fuzzy Hash: 4f6f64e0b160e46855d292abad54f2291d928e6b184ee7e9fbbfab5a87af0261
                        • Instruction Fuzzy Hash: AE718DB1D10258AADF21ABA5D844BEE7BB4AF11304F04C47BE545B63E2D77C8D88CB58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 925 410a6b-410a7a 926 410aa3 925->926 927 410a7c-410a88 925->927 929 410aa6-410ab2 call 410df4 926->929 927->926 928 410a8a-410a91 927->928 928->926 930 410a93-410aa1 928->930 933 410ab4-410abb call 410a13 929->933 934 410abc-410ac3 call 412d64 929->934 930->929 933->934 939 410ac5-410acc call 410a13 934->939 940 410acd-410adc call 417084 call 416e30 934->940 939->940 947 410ae6-410b02 GetCommandLineA call 416cf9 call 416c3e 940->947 948 410ade-410ae5 call 4145c4 940->948 955 410b04-410b0b call 4145c4 947->955 956 410b0c-410b13 call 4169c6 947->956 948->947 955->956 961 410b15-410b1c call 4145c4 956->961 962 410b1d-410b26 call 414683 956->962 961->962 967 410b28-410b2e call 4145c4 962->967 968 410b2f-410b37 call 416967 962->968 967->968 973 410b39-410b3d 968->973 974 410b3f-410b41 968->974 975 410b42-410b55 call 40b0cf 973->975 974->975 978 410b57-410b58 call 414834 975->978 979 410b5d-410bb9 call 414860 call 411add 975->979 978->979
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp__wincmdln
                        • String ID:
                        • API String ID: 3545360858-0
                        • Opcode ID: 4bb5c671ee3ac2c23fdc9181cf4c97ff24886f210c2e60dfaeee520cc7309d43
                        • Instruction ID: ca0c0601ed1c06a3c9cbe31dcce00aa83164059a9375805e0dd5900028765e0c
                        • Opcode Fuzzy Hash: 4bb5c671ee3ac2c23fdc9181cf4c97ff24886f210c2e60dfaeee520cc7309d43
                        • Instruction Fuzzy Hash: 6421C7B1904305AADB14BBB2A902FEE2664AF5074CF10446FF545AA1C3EFFCD9C0869C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 987 407aa2-407acd call 40dc90 call 40d7f0 call 40e9b0 994 407af8-407b2a call 40d7c2 call 40307b call 4030b8 987->994 995 407acf-407aef GetModuleFileNameW call 40e9d6 987->995 1006 407b40-407b4a 994->1006 1007 407b2c-407b3b call 403507 994->1007 1000 407af5 995->1000 1001 407d7e-407d8a 995->1001 1000->994 1009 407b4b-407b4f 1006->1009 1013 407d7d 1007->1013 1011 407b55-407b75 call 403424 call 40370a 1009->1011 1012 407c6c-407c93 call 40384e call 40e86c 1009->1012 1021 407b7a-407b84 1011->1021 1022 407d73-407d7c call 403507 1012->1022 1023 407c99-407cab call 40370a 1012->1023 1013->1001 1024 407c38-407c5c call 40384e 1021->1024 1025 407b8a-407b94 1021->1025 1022->1013 1041 407cb4-407cc3 call 40e86c 1023->1041 1042 407cad-407cb2 1023->1042 1024->1009 1038 407c62-407c66 1024->1038 1028 407b96-407b9e 1025->1028 1029 407bbb-407bbf 1025->1029 1028->1029 1033 407ba0-407bb9 call 4101eb 1028->1033 1034 407bc1-407bcd 1029->1034 1035 407bed-407bf0 1029->1035 1033->1029 1056 407c30-407c35 1033->1056 1034->1035 1037 407bcf-407bd7 1034->1037 1039 407bf2-407bfa 1035->1039 1040 407c1b-407c24 1035->1040 1037->1035 1044 407bd9-407beb call 40e936 1037->1044 1038->1012 1045 407d6d 1038->1045 1039->1040 1046 407bfc-407c15 call 4101eb 1039->1046 1040->1025 1047 407c2a 1040->1047 1041->1045 1061 407cc9-407ce7 call 40c048 call 40d81b 1041->1061 1048 407ce9-407cf3 1042->1048 1044->1035 1062 407c2c 1044->1062 1045->1022 1046->1040 1046->1045 1047->1024 1052 407cf5 1048->1052 1053 407cf7-407d04 1048->1053 1052->1053 1058 407d62-407d6a 1053->1058 1059 407d06-407d10 1053->1059 1056->1024 1058->1045 1059->1058 1063 407d12-407d16 1059->1063 1061->1048 1062->1056 1065 407d18-407d1f 1063->1065 1066 407d49-407d4d 1063->1066 1071 407d21-407d24 1065->1071 1072 407d44 1065->1072 1069 407d55 1066->1069 1070 407d4f-407d53 1066->1070 1076 407d57 1069->1076 1070->1069 1075 407d58-407d60 1070->1075 1077 407d40-407d42 1071->1077 1078 407d26-407d29 1071->1078 1074 407d46-407d47 1072->1074 1074->1076 1075->1058 1075->1059 1076->1075 1077->1074 1079 407d2b-407d2e 1078->1079 1080 407d3c-407d3e 1078->1080 1081 407d30-407d32 1079->1081 1082 407d38-407d3a 1079->1082 1080->1074 1081->1075 1083 407d34-407d36 1081->1083 1082->1074 1083->1074
                        APIs
                        • __EH_prolog.LIBCMT ref: 00407AA7
                        • _wcschr.LIBCMT ref: 00407ABE
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,004304CC,00408224,0040B1EA,00428478,0040B1EA,00428478), ref: 00407AD7
                        • _wcsrchr.LIBCMT ref: 00407AE6
                        • _wcscpy.LIBCMT ref: 00407AFC
                        • _malloc.LIBCMT ref: 00407C83
                          • Part of subcall function 00403424: SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00403457
                          • Part of subcall function 00403424: GetLastError.KERNEL32(?,?), ref: 00403464
                        • _strncmp.LIBCMT ref: 00407BAF
                        • _strncmp.LIBCMT ref: 00407C0B
                        • _malloc.LIBCMT ref: 00407CB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: File_malloc_strncmp$ErrorH_prologLastModuleNamePointer_wcschr_wcscpy_wcsrchr
                        • String ID: *messages***$*messages***$a
                        • API String ID: 644328012-1639468518
                        • Opcode ID: a53c8419995fca6f2c939008709fb56e46fc402e33a1dff5eaab8f74c75112e3
                        • Instruction ID: c6f3c105c0aff719da8d468756e78d9dc0aca496acacd8783ae445e20c1b837a
                        • Opcode Fuzzy Hash: a53c8419995fca6f2c939008709fb56e46fc402e33a1dff5eaab8f74c75112e3
                        • Instruction Fuzzy Hash: AB81F3B1E082059ADB34EF64CC81BAA77A5AF00314F10457FE255B72D1DB78AA84CA1A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1084 407fcc-408029 call 407ee5 GetWindowRect GetClientRect 1087 4080c8-4080d1 1084->1087 1088 40802f-408033 1084->1088 1091 408111-408130 GetSystemMetrics GetWindow 1087->1091 1092 4080d3-40810a GetWindowTextW call 407d8d SetWindowTextW 1087->1092 1089 408039-408078 1088->1089 1090 40810c 1088->1090 1093 40807a 1089->1093 1094 40807c-40807e 1089->1094 1090->1091 1096 408209-40820b 1091->1096 1092->1091 1093->1094 1097 408080 1094->1097 1098 408082-408099 GetWindowLongW 1094->1098 1099 408211-408215 1096->1099 1100 408135-40813c 1096->1100 1097->1098 1102 4080a2-4080c5 SetWindowPos GetWindowRect 1098->1102 1103 40809b 1098->1103 1100->1099 1104 408142-40815b GetWindowTextW 1100->1104 1102->1087 1103->1102 1105 408183-408187 1104->1105 1106 40815d-40817d call 407d8d SetWindowTextW 1104->1106 1108 4081f3-408204 GetWindow 1105->1108 1109 408189-4081ed GetWindowRect SetWindowPos 1105->1109 1106->1105 1108->1099 1111 408206 1108->1111 1109->1108 1111->1096
                        APIs
                          • Part of subcall function 00407EE5: _wcschr.LIBCMT ref: 00407F15
                        • GetWindowRect.USER32(?,?), ref: 00407FF5
                        • GetClientRect.USER32(?,?), ref: 00408002
                        • GetWindowLongW.USER32(?,000000F0), ref: 0040808E
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 004080B2
                        • GetWindowRect.USER32(?,?), ref: 004080BF
                        • GetWindowTextW.USER32(?,?,00000400), ref: 004080DE
                        • SetWindowTextW.USER32(?,?), ref: 00408104
                        • GetSystemMetrics.USER32(00000008), ref: 00408113
                        • GetWindow.USER32(?,00000005), ref: 00408120
                        • GetWindowTextW.USER32(00000000,?,00000400), ref: 0040814D
                        • SetWindowTextW.USER32(00000000,00000000), ref: 0040817D
                        • GetWindowRect.USER32(00000000,?), ref: 00408190
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000110,00000000,00000110,00000204), ref: 004081ED
                        • GetWindow.USER32(00000000,00000002), ref: 004081F8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                        • String ID:
                        • API String ID: 4134264131-0
                        • Opcode ID: 4e335b59b2b0836172729f8b09db6739b9811854a4a4a40ff880fd7bd4817fdf
                        • Instruction ID: 261550131460bc36a1be5f62b836713dbb94d5e036b5bf44189eba827056865d
                        • Opcode Fuzzy Hash: 4e335b59b2b0836172729f8b09db6739b9811854a4a4a40ff880fd7bd4817fdf
                        • Instruction Fuzzy Hash: FC714D71E00219AFDF00DFA8CD89AEEBBB9FF08300F048169F955B61A0D774AA55CB54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1112 408625-408653 GetDlgItem 1113 408655-408680 call 40c77c ShowWindow SendMessageW * 2 1112->1113 1114 408687-4086b9 SendMessageW * 2 1112->1114 1113->1114 1116 4086d7-408701 SendMessageW * 3 1114->1116 1117 4086bb-4086d0 1114->1117 1119 408721-408736 SendMessageW 1116->1119 1120 408703-40871f SendMessageW 1116->1120 1117->1116 1120->1119
                        APIs
                        • GetDlgItem.USER32(00000068,00000000), ref: 00408636
                        • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,00408773,00000001,?,?,0040969F,0041D7C0,0043BBB0,0043BBB0,00001000), ref: 00408663
                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0040866F
                        • SendMessageW.USER32(00000000,000000C2,00000000,0041D43C), ref: 0040867E
                        • SendMessageW.USER32(004015F8,000000B1,05F5E100,05F5E100), ref: 00408692
                        • SendMessageW.USER32(004015F8,0000043A,00000000,?), ref: 004086A9
                        • SendMessageW.USER32(004015F8,00000444,00000001,0000005C), ref: 004086E4
                        • SendMessageW.USER32(004015F8,000000C2,00000000,00000456), ref: 004086F3
                        • SendMessageW.USER32(004015F8,000000B1,05F5E100,05F5E100), ref: 004086FB
                        • SendMessageW.USER32(004015F8,00000444,00000001,0000005C), ref: 0040871F
                        • SendMessageW.USER32(004015F8,000000C2,00000000,0041D788), ref: 00408730
                          • Part of subcall function 0040C77C: DestroyWindow.USER32(?,75C05540,00408660,?,?,?,?,?,00408773,00000001,?,?,0040969F,0041D7C0,0043BBB0,0043BBB0), ref: 0040C787
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: MessageSend$Window$DestroyItemShow
                        • String ID: \
                        • API String ID: 2996232536-2967466578
                        • Opcode ID: d6e7c705ba31acfccb53db16f7e6e7c5ae895060a034b3a6ebcb54c7efead5f3
                        • Instruction ID: 32f9a7f45389758d2d2031b5d49947bbb71d0b8e86a955004bf0f6ecb32a7135
                        • Opcode Fuzzy Hash: d6e7c705ba31acfccb53db16f7e6e7c5ae895060a034b3a6ebcb54c7efead5f3
                        • Instruction Fuzzy Hash: 23316D71E4025CBAEB119BA0DC4AFAF7F79EB81724F204129F614AA1E1C7B55E00DB54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1121 40b705-40b75a SystemTimeToFileTime 1122 40b760-40b769 1121->1122 1123 40b806-40b809 1121->1123 1125 40b76b 1122->1125 1126 40b76e-40b778 call 405d56 1122->1126 1124 40b80d-40b811 1123->1124 1125->1126 1129 40b790-40b7d5 FileTimeToSystemTime TzSpecificLocalTimeToSystemTime SystemTimeToFileTime * 2 call 40de70 1126->1129 1130 40b77a-40b78e LocalFileTimeToFileTime 1126->1130 1133 40b7da-40b7fc 1129->1133 1131 40b7ff-40b804 1130->1131 1131->1124 1133->1131
                        APIs
                        • SystemTimeToFileTime.KERNEL32(?,0040B86B,00000000,Insidious_protected.exe,00000000), ref: 0040B756
                        • LocalFileTimeToFileTime.KERNEL32(0040B86B,?), ref: 0040B782
                        • FileTimeToSystemTime.KERNEL32(0040B86B,?), ref: 0040B798
                        • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 0040B7A8
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0040B7B6
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0040B7C0
                        Strings
                        • Insidious_protected.exe, xrefs: 0040B70C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Time$File$System$Local$Specific
                        • String ID: Insidious_protected.exe
                        • API String ID: 3144155402-4103763255
                        • Opcode ID: 22f571d4865aaf71d37df5e1628921a048db732d013d33c4063d9ddf4b876500
                        • Instruction ID: 5bbc25a735c96d36ca214e397a62eb82a28b71e78d21cf7be82755281a89755c
                        • Opcode Fuzzy Hash: 22f571d4865aaf71d37df5e1628921a048db732d013d33c4063d9ddf4b876500
                        • Instruction Fuzzy Hash: F0311D7AD002199BCB14DFE4C844AEFB7B9EF58710F04856AE906E7250E734A945CBA8

                        Control-flow Graph

                        APIs
                        • LoadLibraryW.KERNELBASE(riched32.dll,00000000,00428478,?,?,?,0040B1DF), ref: 0040D620
                        • LoadLibraryW.KERNEL32(riched20.dll,?,0040B1DF), ref: 0040D629
                        • OleInitialize.OLE32(00000000), ref: 0040D630
                        • InitCommonControlsEx.COMCTL32(?), ref: 0040D648
                        • SHGetMalloc.SHELL32(0044F2C8), ref: 0040D653
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: LibraryLoad$CommonControlsInitInitializeMalloc
                        • String ID: riched20.dll$riched32.dll
                        • API String ID: 448729520-3294723617
                        • Opcode ID: dfde648020e8d2e77999505d18f2b6bc9da5998a24a4abbf0ab5e16432347288
                        • Instruction ID: 4a5b08072e185e12d8dca61140c8d1c0ecc092a16b98db7709fbc05b4e5efacc
                        • Opcode Fuzzy Hash: dfde648020e8d2e77999505d18f2b6bc9da5998a24a4abbf0ab5e16432347288
                        • Instruction Fuzzy Hash: 32F082F1E40304ABE7106FA5DC0DBCABFE8EF44726F10846AE04597150D7FCA5858B94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1135 401f26-401f5a 1136 401f60 call 40471e 1135->1136 1137 40202f 1135->1137 1140 401f65-401f6c 1136->1140 1139 402034-402045 call 403e66 1137->1139 1146 402047-40204c 1139->1146 1147 4020ad-4020ba 1139->1147 1142 401f96-401f9d 1140->1142 1143 401f6e-401f7c call 403bb9 call 40471e 1140->1143 1142->1139 1148 401fa3-401fc1 call 40e560 1142->1148 1143->1142 1167 401f7e-401f91 call 401701 1143->1167 1151 40207d-402099 call 401779 call 403dde 1146->1151 1152 40204e-402058 call 405bd5 1146->1152 1149 4020bf 1147->1149 1148->1139 1164 401fc3 1148->1164 1154 4020c5-4020d3 1149->1154 1185 4020a6-4020a8 1151->1185 1186 40209b-4020a1 call 403d29 call 403953 1151->1186 1162 40205d-40205f 1152->1162 1159 4020f0 call 40441b 1154->1159 1160 4020d5 1154->1160 1176 4020f5-4020f8 1159->1176 1165 4020e0-4020ee 1160->1165 1166 4020d7-4020de 1160->1166 1168 402190-402199 call 40be9d 1162->1168 1169 402065-402078 1162->1169 1172 401fc5-401fcb 1164->1172 1173 401fcd-401fcf 1164->1173 1165->1176 1166->1159 1166->1165 1188 402261-402266 1167->1188 1195 4021a5-4021aa 1168->1195 1196 40219b-4021a1 1168->1196 1169->1168 1172->1139 1172->1173 1174 401fd1 1173->1174 1175 401ffc-40202d call 4034a5 1173->1175 1180 401fd3-401fdd 1174->1180 1181 401fdf-401ff0 call 403692 1174->1181 1175->1139 1183 402179-402180 1176->1183 1184 4020fa-402114 1176->1184 1180->1175 1180->1181 1181->1139 1208 401ff2 1181->1208 1190 402182-402184 call 403fe9 1183->1190 1191 402189-40218e 1183->1191 1184->1154 1193 402116-40215f call 40bc0b call 40bea3 call 40be9d 1184->1193 1185->1188 1186->1185 1190->1191 1191->1168 1193->1183 1245 402161-402174 call 403fe9 1193->1245 1198 4021b6-4021bd 1195->1198 1199 4021ac-4021b1 call 401614 1195->1199 1196->1195 1197 4021a3 1196->1197 1197->1195 1206 4021c8-4021d5 1198->1206 1207 4021bf-4021c6 1198->1207 1199->1198 1211 4021d7-4021de 1206->1211 1212 4021e2-4021ea 1206->1212 1207->1206 1207->1211 1208->1175 1213 401ff4-401ffa 1208->1213 1216 4021e0 1211->1216 1217 40222f-402233 1211->1217 1218 4021f2-402201 1212->1218 1219 4021ec-4021f0 1212->1219 1213->1139 1213->1175 1224 402226-40222d 1216->1224 1222 402240-402247 1217->1222 1223 402235-40223b call 4034a5 1217->1223 1226 402203-402205 1218->1226 1227 402207 1218->1227 1219->1218 1225 40220e-402215 1219->1225 1231 40224e-402250 1222->1231 1233 402249 call 403d29 1222->1233 1223->1222 1224->1217 1224->1231 1228 402222 1225->1228 1229 402217-40221e 1225->1229 1234 402209 call 401ebd 1226->1234 1227->1234 1228->1224 1229->1228 1235 402220 1229->1235 1238 402252-402253 call 403953 1231->1238 1239 402258-40225d call 403dde 1231->1239 1233->1231 1234->1225 1235->1228 1238->1239 1239->1188 1245->1149
                        APIs
                          • Part of subcall function 0040471E: __EH_prolog.LIBCMT ref: 00404723
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00401FB6
                          • Part of subcall function 00403BB9: _wcsncpy.LIBCMT ref: 00403C1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_wcsncpy
                        • String ID: Insidious_protected.exe$%C$%C$%C
                        • API String ID: 3476342429-2968601968
                        • Opcode ID: d2dea757669d6f8f47eadae6b72f084bf541510d1b49ce8f2f96d40c940cd85a
                        • Instruction ID: 05b127c4fe7383887dffd68ab5725401fd3f80d4cad4ee37ce688bea4f3a74d9
                        • Opcode Fuzzy Hash: d2dea757669d6f8f47eadae6b72f084bf541510d1b49ce8f2f96d40c940cd85a
                        • Instruction Fuzzy Hash: 62814278444340ABE725AF62ED49B267B68FB46318F0409BFE640662F2C7FD5841CB5E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1278 40d81b-40d82c call 411a98 1281 40d8a3-40d8a8 call 411add 1278->1281 1282 40d82e-40d835 1278->1282 1284 40d837-40d84f call 410fa0 call 410fd3 1282->1284 1285 40d87a 1282->1285 1296 40d851-40d859 call 411003 1284->1296 1297 40d85a-40d86a call 40d871 1284->1297 1288 40d87b-40d88b RtlFreeHeap 1285->1288 1288->1281 1290 40d88d-40d8a2 call 410dab GetLastError call 410d69 1288->1290 1290->1281 1296->1297 1297->1281 1303 40d86c-40d86f 1297->1303 1303->1288
                        APIs
                        • __lock.LIBCMT ref: 0040D839
                          • Part of subcall function 00410FA0: __mtinitlocknum.LIBCMT ref: 00410FB6
                          • Part of subcall function 00410FA0: __amsg_exit.LIBCMT ref: 00410FC2
                          • Part of subcall function 00410FA0: EnterCriticalSection.KERNEL32(004108DE,004108DE,?,00419065,00000004,00420350,0000000C,00414B0B,00000000,004108ED,00000000,00000000,00000000,?,00412BCD,00000001), ref: 00410FCA
                        • ___sbh_find_block.LIBCMT ref: 0040D844
                        • ___sbh_free_block.LIBCMT ref: 0040D853
                        • RtlFreeHeap.NTDLL(00000000,00000000,0041FE80,0000000C,00410F81,00000000,0041FF98,0000000C,00410FBB,00000000,004108DE,?,00419065,00000004,00420350,0000000C), ref: 0040D883
                        • GetLastError.KERNEL32(?,00419065,00000004,00420350,0000000C,00414B0B,00000000,004108ED,00000000,00000000,00000000,?,00412BCD,00000001,00000214), ref: 0040D894
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2714421763-0
                        • Opcode ID: c81d29328be3b54ace9c2d11a55a04b89105eb8e9b480dadeaeaf92fab1c7d4d
                        • Instruction ID: af1c78eec61d512f84d4e41fb4861fc9c36813d237e12c42305e10bca5b8d2ac
                        • Opcode Fuzzy Hash: c81d29328be3b54ace9c2d11a55a04b89105eb8e9b480dadeaeaf92fab1c7d4d
                        • Instruction Fuzzy Hash: 18012172D45205AAEB207BF2AC06B9E3B64AF00765F20853BF524B61D1CA7CD5C58B5C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1304 40332f-40333c 1305 403342-403346 1304->1305 1306 40341e-403421 1304->1306 1307 403353 1305->1307 1308 403348-403350 GetStdHandle 1305->1308 1309 403354-40335a 1307->1309 1308->1307 1310 40335c-403361 1309->1310 1311 40339e-4033b7 WriteFile 1309->1311 1312 403363-40336f 1310->1312 1313 4033bd-4033c0 1310->1313 1314 4033b9-4033bb 1311->1314 1315 403371 1312->1315 1316 403373-40338f WriteFile 1312->1316 1317 403419-40341d 1313->1317 1318 4033c2-4033c5 1313->1318 1314->1313 1314->1317 1315->1316 1316->1313 1319 403391-40339a 1316->1319 1317->1306 1318->1317 1320 4033c7-4033da call 401604 1318->1320 1319->1312 1321 40339c 1319->1321 1324 4033dc-4033e2 1320->1324 1325 40340d-403414 call 401797 1320->1325 1321->1314 1324->1309 1326 4033e8-4033ea 1324->1326 1325->1317 1326->1309 1328 4033f0-403408 1326->1328 1328->1309
                        APIs
                        • GetStdHandle.KERNEL32(000000F5), ref: 0040334A
                        • WriteFile.KERNEL32(?,?,00004000,?,00000000), ref: 00403382
                        • WriteFile.KERNELBASE(?,?,00000001,?,00000000), ref: 004033AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: FileWrite$Handle
                        • String ID: %C
                        • API String ID: 4209713984-3809956945
                        • Opcode ID: a9643f32aac3daab67999d3b644ccf86bdd193be6fe2b56b764e4c59382622d4
                        • Instruction ID: 2dc3462982948d48ce302b0a3144507d264e6b9110b200b9f906a5c3db34951e
                        • Opcode Fuzzy Hash: a9643f32aac3daab67999d3b644ccf86bdd193be6fe2b56b764e4c59382622d4
                        • Instruction Fuzzy Hash: CD319171600504BFCF259F65C8C09AFBBADEB40315704853FE956E7680DB38AE49CB68

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1331 403424-403434 1332 403436-403439 1331->1332 1333 403449-403462 SetFilePointer 1331->1333 1334 40349a-40349c 1332->1334 1335 40343b-403444 call 40168b 1332->1335 1336 403481-403493 call 40de70 1333->1336 1337 403464-40346c GetLastError 1333->1337 1341 403496-403499 1334->1341 1335->1333 1346 403495 1336->1346 1337->1336 1339 40346e-403471 1337->1339 1342 403473-40347c call 40168b 1339->1342 1343 40349e-4034a3 1339->1343 1342->1336 1343->1346 1346->1341
                        APIs
                        • SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00403457
                        • GetLastError.KERNEL32(?,?), ref: 00403464
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID: %C$%C
                        • API String ID: 2976181284-1692530249
                        • Opcode ID: 734bc4441152d9cec18fc6328ac9ac0219701a9f8ac5486d7a4319ae3140b9bc
                        • Instruction ID: a760d664a4a400ddd70e09886c3e25aec840b8dbf450109aaede35d7a9dc8571
                        • Opcode Fuzzy Hash: 734bc4441152d9cec18fc6328ac9ac0219701a9f8ac5486d7a4319ae3140b9bc
                        • Instruction Fuzzy Hash: 8A01F5B2A016007FD721DFB98D558AB7AAE8B84329718873FF512E72C0D6789E005369
                        APIs
                        • GetClassNameW.USER32(?,?,00000050), ref: 0040D27D
                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 0040D2B4
                          • Part of subcall function 0040C212: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00405DF8,?,00000000,?,00405F12,00000000,-00000002,?,00000000,?), ref: 0040C228
                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0040D2A4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                        • String ID: EDIT
                        • API String ID: 4243998846-3080729518
                        • Opcode ID: dfbba17f677646281e0e54038946bb1fa333e56a82108a43fe7aa13f0e55805d
                        • Instruction ID: 70a2c63e647cff1e597a3efd37ff6db0c7979c2aad88ac04f5ab4a10e76e560e
                        • Opcode Fuzzy Hash: dfbba17f677646281e0e54038946bb1fa333e56a82108a43fe7aa13f0e55805d
                        • Instruction Fuzzy Hash: BAF08272A002187BD72066949C06FEB766CAF86B50F0440BAB901F21C4D7BCD84585A9
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _strncpy$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 2527496121-0
                        • Opcode ID: 19e50b008b4658fa21b0c27a63ab43a29862b5335952d4b6e9e2b9134e1f662a
                        • Instruction ID: 37f2b4e87ceac4fde3c73d1ab2e74293ea1a9b2cdedbcefb9f8aa31ded633277
                        • Opcode Fuzzy Hash: 19e50b008b4658fa21b0c27a63ab43a29862b5335952d4b6e9e2b9134e1f662a
                        • Instruction Fuzzy Hash: B8A1F3B9940210DFDB00DF66EC85AAAB7B5FB4A304B10853BF501F72A1D3386944CB9E
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _memcmp$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 3520290970-0
                        • Opcode ID: db4bc5e3892a665b8094a4b6b323cb9d97fd4e83f79044384c6a9c80e6d96c9c
                        • Instruction ID: 080ddb6a2ee496fa35000e28bec213432631479fc4cbee947d50b2c2966644db
                        • Opcode Fuzzy Hash: db4bc5e3892a665b8094a4b6b323cb9d97fd4e83f79044384c6a9c80e6d96c9c
                        • Instruction Fuzzy Hash: BF61DE79A402408FD704DF2AEC85A26B7E5FB8A314F05463AE446E32E1D339A9518F4D
                        APIs
                        • CreateFileW.KERNELBASE(?,-80000000,00000004,00000000,00000003,-00000001,00000000,00000000,?,?,00000000,00407B28,?,00000004,00000000,004304CC), ref: 0040314A
                        • GetLastError.KERNEL32(?,?,00000000,00407B28,?,00000004,00000000,004304CC,00408224), ref: 00403153
                        • CreateFileW.KERNEL32(?,-80000000,00000004,00000000,00000003,004304CC,00000000,?,00000004,00000800,?,?,00000000,00407B28,?,00000004), ref: 0040318B
                        • GetLastError.KERNEL32(?,?,00000000,00407B28,?,00000004,00000000,004304CC,00408224), ref: 0040318F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CreateErrorFileLast
                        • String ID:
                        • API String ID: 1214770103-0
                        • Opcode ID: 69f17081b05974f75f066300581d12fac4f9308836e1d83287dc8c8da1305538
                        • Instruction ID: 6a616903468d6fc9bc4fa4b7a5897ad0fe6b564ba0473e3e33f83866f129c5d6
                        • Opcode Fuzzy Hash: 69f17081b05974f75f066300581d12fac4f9308836e1d83287dc8c8da1305538
                        • Instruction Fuzzy Hash: BA3138715487445BE7208F20CC08BEB7BE8AB99319F104A2EF9D4662C1D7BA9688C759
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00403548
                        • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00403560
                        • GetLastError.KERNEL32 ref: 00403593
                        • GetLastError.KERNEL32 ref: 004035AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ErrorLast$FileHandleRead
                        • String ID:
                        • API String ID: 2244327787-0
                        • Opcode ID: 174acd4133269efc958d813212449a8b55358c6582c226f45ca70363050f4567
                        • Instruction ID: 378e46cd8326ea090f19bb4a4ab19f1c7b58aab8906e04cdbe6c1bbf8d33c875
                        • Opcode Fuzzy Hash: 174acd4133269efc958d813212449a8b55358c6582c226f45ca70363050f4567
                        • Instruction Fuzzy Hash: BD116A71900614FBCF209F518C44AAE7BACAB45726B20C43BE866A63E0D63DDB44CF59
                        APIs
                        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004084B6
                        • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004084C7
                        • TranslateMessage.USER32(?), ref: 004084D1
                        • DispatchMessageW.USER32(?), ref: 004084DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Message$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 4217535847-0
                        • Opcode ID: 33cfaf38ff1d17b82a730a3108ae8a4ab55ee456749a29be8890f64b76243662
                        • Instruction ID: 6f0fe6e341dee1fa6ab5e8ba43ed3a7659e7e4cc53c1acada6c1951dd0998f38
                        • Opcode Fuzzy Hash: 33cfaf38ff1d17b82a730a3108ae8a4ab55ee456749a29be8890f64b76243662
                        • Instruction Fuzzy Hash: EBE07DB2D0212AA7CF206BF69D4CDDB7F6CEE45295B008461B516E2055E638D505C7F4
                        APIs
                        • _malloc.LIBCMT ref: 004068DA
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        • _malloc.LIBCMT ref: 004068EB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _malloc$AllocateHeap
                        • String ID: %C
                        • API String ID: 680241177-3809956945
                        • Opcode ID: 8fa845a059a2273e850ae215fba16e36a87c37d8bd3ba94684cc149b1a1c3d02
                        • Instruction ID: f25e7433506e50618c825338faeea3a372f436f0786c4cf2e6a434b8100d550e
                        • Opcode Fuzzy Hash: 8fa845a059a2273e850ae215fba16e36a87c37d8bd3ba94684cc149b1a1c3d02
                        • Instruction Fuzzy Hash: CAE04FF55413018BE708AF73AD613167690B749302F14487FE245DA3E2DBB98680DA9D
                        APIs
                        • __EH_prolog.LIBCMT ref: 004088D0
                          • Part of subcall function 004030B8: CreateFileW.KERNELBASE(?,-80000000,00000004,00000000,00000003,-00000001,00000000,00000000,?,?,00000000,00407B28,?,00000004,00000000,004304CC), ref: 0040314A
                          • Part of subcall function 004030B8: GetLastError.KERNEL32(?,?,00000000,00407B28,?,00000004,00000000,004304CC,00408224), ref: 00403153
                          • Part of subcall function 004030B8: CreateFileW.KERNEL32(?,-80000000,00000004,00000000,00000003,004304CC,00000000,?,00000004,00000800,?,?,00000000,00407B28,?,00000004), ref: 0040318B
                          • Part of subcall function 004030B8: GetLastError.KERNEL32(?,?,00000000,00407B28,?,00000004,00000000,004304CC,00408224), ref: 0040318F
                        • _malloc.LIBCMT ref: 0040891F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CreateErrorFileLast$H_prolog_malloc
                        • String ID:
                        • API String ID: 928478399-0
                        • Opcode ID: 6c7bc776024be0f38af15900471800ecab5342983bf5fe2b4428152a180f18e9
                        • Instruction ID: af75c5c3f61dab0db4e772ad40b12251dbdff41f7e90c86f78db533c2ca525c3
                        • Opcode Fuzzy Hash: 6c7bc776024be0f38af15900471800ecab5342983bf5fe2b4428152a180f18e9
                        • Instruction Fuzzy Hash: D84116B19001459ACB25EF26CE81AFBBBB8AF80744F10457FF0D2B21C6DF385A44CA19
                        APIs
                        • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00403B53
                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?), ref: 00403B82
                        • GetLastError.KERNEL32(?), ref: 00403B9B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CreateDirectory$ErrorLast
                        • String ID:
                        • API String ID: 2485089472-0
                        • Opcode ID: 134931742555f01c06e675544a765d89c93efbbab21240d5b6528f89d1d27979
                        • Instruction ID: ada026dd858b62535116d16b0fc8e61e92a0abac6e2ea0c817aafab2c4e25d56
                        • Opcode Fuzzy Hash: 134931742555f01c06e675544a765d89c93efbbab21240d5b6528f89d1d27979
                        • Instruction Fuzzy Hash: 1101B12150020465EA21AA655C46FBF3BBC4B4578EF0444BBF905F22C3CBBCAB468669
                        APIs
                        • __EH_prolog.LIBCMT ref: 004096B5
                        • _wcscpy.LIBCMT ref: 004096CB
                          • Part of subcall function 0040B585: _wcslen.LIBCMT ref: 0040B59B
                          • Part of subcall function 0040B585: _wcscpy.LIBCMT ref: 0040B5B1
                        • _wcscpy.LIBCMT ref: 004096E9
                          • Part of subcall function 0040C379: __EH_prolog.LIBCMT ref: 0040C37E
                          • Part of subcall function 0040C379: _memset.LIBCMT ref: 0040C39A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy$H_prolog$_memset_wcslen
                        • String ID:
                        • API String ID: 1035453590-0
                        • Opcode ID: 85028ef7af54ba925f52f1f2c0b026bb93607c77ce08f917491adfd55f38a607
                        • Instruction ID: 9385f72c06a9c3f6c8b6f6c4f904dda6e003d498acd0c1f068b5ac1ee9de1c49
                        • Opcode Fuzzy Hash: 85028ef7af54ba925f52f1f2c0b026bb93607c77ce08f917491adfd55f38a607
                        • Instruction Fuzzy Hash: 8801F771908340AEE318BFA5AC037987BE0D759324F14A13FF544A22D2EBBD1544D72D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _malloc
                        • String ID: Insidious_protected.exe
                        • API String ID: 1579825452-4103763255
                        • Opcode ID: 52c3626f2751f69f24e89228c0d32a06ac48217f4e2e3be4acb83d1f3cfcf686
                        • Instruction ID: 31f96ff4feb285d9d35e8ccfd98a29cbefabdc914b74177bb1b5f8bc44618496
                        • Opcode Fuzzy Hash: 52c3626f2751f69f24e89228c0d32a06ac48217f4e2e3be4acb83d1f3cfcf686
                        • Instruction Fuzzy Hash: 1241E4F95002059ADB109BA9DD41AAB73ACBBC6714F04497BBA04F32D0EB3D9905C76C
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID: Insidious_protected.exe
                        • API String ID: 3519838083-4103763255
                        • Opcode ID: 3938673a033b9dd14c09c554c3c7bc61b3196db68da13d00d41b535fa22ec721
                        • Instruction ID: 1d83f848220c98dba59824dc75ccb59d17bb99b18624038830d9cfd506414480
                        • Opcode Fuzzy Hash: 3938673a033b9dd14c09c554c3c7bc61b3196db68da13d00d41b535fa22ec721
                        • Instruction Fuzzy Hash: 1911C4706512109AEB14BFB29841BEE73A8BF4630AF0005BFA512F72C1CBBC4B41865E
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?,0044F228,00000000,00403D76,Insidious_protected.exe,00000002,0040224E,00000800,Insidious_protected.exe,00000000,00000000,?,00402E52,Insidious_protected.exe,?,00000000), ref: 004032D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID: %C
                        • API String ID: 2591292051-3809956945
                        • Opcode ID: 97008d35de079676f20230335c76dd72e3f19db0853ee40f41ee96937d1190a9
                        • Instruction ID: 5bb5aa529a0d0d97646ba7db97ca710dc1100286c7f3e566707f79bb908482f6
                        • Opcode Fuzzy Hash: 97008d35de079676f20230335c76dd72e3f19db0853ee40f41ee96937d1190a9
                        • Instruction Fuzzy Hash: 98F0E2708427004BD7305A3549987923BDC4B26736F088B6FD4A6A32D0C37A59484A08
                        APIs
                        • FlushFileBuffers.KERNEL32(?), ref: 004035DE
                        • SetFileTime.KERNELBASE(?,00000000,00000000,00000000), ref: 00403685
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: File$BuffersFlushTime
                        • String ID:
                        • API String ID: 1392018926-0
                        • Opcode ID: 7df2379f5cd97fe98474e28b4313f7bd3df58a158f3490c243867178cbd1ed25
                        • Instruction ID: e1ad3b957dbcc57746205d5bcd72076f578c2163b88b10de8aecc39b862debd5
                        • Opcode Fuzzy Hash: 7df2379f5cd97fe98474e28b4313f7bd3df58a158f3490c243867178cbd1ed25
                        • Instruction Fuzzy Hash: 7B219331A00144BFDB25DF68C945BEE7FA8AF11305F18846AE455EB381D73ADB04D758
                        APIs
                        • CreateFileW.KERNELBASE(?,-C0000001,00000000,00000000,00000002,00000000,00000000), ref: 00403254
                        • CreateFileW.KERNEL32(?,?,?,00000000,00000002,00000000,00000000,?,?,00000800), ref: 00403288
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 1b2dd0e39bb6e00ec3aaaaf99b9eb140e12771b89bb1c99adc90d189f382f208
                        • Instruction ID: 332adf7cc3b731833f1ab828a5fa5664195dc67f0f4f7ef1f8e0c45b87959769
                        • Opcode Fuzzy Hash: 1b2dd0e39bb6e00ec3aaaaf99b9eb140e12771b89bb1c99adc90d189f382f208
                        • Instruction Fuzzy Hash: 7821CFB1400308AFEB209F648C81EEB7BADDB04318F00857EF995A72D1D679AE499B54
                        APIs
                        • LoadStringW.USER32(?,?,00000200), ref: 00408280
                        • LoadStringW.USER32(?,?,00000200), ref: 00408292
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: LoadString
                        • String ID:
                        • API String ID: 2948472770-0
                        • Opcode ID: 0631cc9e82c363a88e934473138221265b686e374de765a59e9ab88fe1dda9ef
                        • Instruction ID: 50edad42b3b41fc9210787acf14ae3121ef2bf0dd453227f092802d67a30c19c
                        • Opcode Fuzzy Hash: 0631cc9e82c363a88e934473138221265b686e374de765a59e9ab88fe1dda9ef
                        • Instruction Fuzzy Hash: 8201D1317012506BDA20AB25AC44F57BBA9EBAA794F00853FF654E32A0D634A801876C
                        APIs
                        • SetFilePointer.KERNELBASE(000000FF,?,000000FF,?), ref: 0040382D
                        • GetLastError.KERNEL32 ref: 00403839
                          • Part of subcall function 00403692: __EH_prolog.LIBCMT ref: 00403697
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ErrorFileH_prologLastPointer
                        • String ID:
                        • API String ID: 4236474358-0
                        • Opcode ID: 17be3f1768d5dc1d888a20b1bfbe63a84144a8f87b3acbf2e7de889a7c44794f
                        • Instruction ID: eee6ea69d8a225832f0c7763727deebb6656cd7b1e6a94125ba32e4dedf64551
                        • Opcode Fuzzy Hash: 17be3f1768d5dc1d888a20b1bfbe63a84144a8f87b3acbf2e7de889a7c44794f
                        • Instruction Fuzzy Hash: E8016D32400204EBCB24AF14C80969A7BACFF41726F10C67AF821A62D0D778DA419A68
                        APIs
                        • SetFileAttributesW.KERNELBASE(?,?), ref: 00403917
                        • SetFileAttributesW.KERNEL32(?,?,?,?,00000800), ref: 00403944
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 6d4569a6d5f815af8cd1a5457ee674526d6f67a06c3f314daa1c94bb01951ff7
                        • Instruction ID: d309606821e36f72f52ea796afbc127b5eb9e07e06162314ad518787e2b8f23a
                        • Opcode Fuzzy Hash: 6d4569a6d5f815af8cd1a5457ee674526d6f67a06c3f314daa1c94bb01951ff7
                        • Instruction Fuzzy Hash: 94F0A03144112ABADF016E658C01FDA3F5CAF047D5F048033BC84A7290DB75DE959AA4
                        APIs
                        • DeleteFileW.KERNELBASE(?), ref: 0040396B
                        • DeleteFileW.KERNEL32(?,?,?,00000800), ref: 00403995
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 511c5bc484263403d73ddc761b1b95f26b73f59386a1a951844afbf64271688b
                        • Instruction ID: c240b13ab5386feddb1a6796cbe09621d086284c2072f8147ee9ca94d8e483df
                        • Opcode Fuzzy Hash: 511c5bc484263403d73ddc761b1b95f26b73f59386a1a951844afbf64271688b
                        • Instruction Fuzzy Hash: B3E02B7144122967DB006B659C01FDA3F5C5F043C9F0440337C84E3290DAB5DD959EA4
                        APIs
                        • GetFileAttributesW.KERNELBASE(?), ref: 004038C8
                        • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 004038F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 65bac9f0f56e7e5c3de53a90db4686630a11417ffe565acc19bd6904b0f7cb78
                        • Instruction ID: 697e00d9cc0694138ddd7ecaba4ad5503ddde54c4b19ab33ed49bc6c9650ffed
                        • Opcode Fuzzy Hash: 65bac9f0f56e7e5c3de53a90db4686630a11417ffe565acc19bd6904b0f7cb78
                        • Instruction Fuzzy Hash: A6E09233A101682ADF10AA6DCC01BDE7BDD9B893A5F044177BA14E32D0DAB4DE459BA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ItemText_swprintf
                        • String ID:
                        • API String ID: 3011073432-0
                        • Opcode ID: 2ea71572d7da70f60e3c909202c5333359d82a3edc3cff3c0aaf861df074d51d
                        • Instruction ID: 016bef170dc9f7ca047ee5f047edfc45f3b1e3963b11a9c1f59ea1b2a3aa8d56
                        • Opcode Fuzzy Hash: 2ea71572d7da70f60e3c909202c5333359d82a3edc3cff3c0aaf861df074d51d
                        • Instruction Fuzzy Hash: AAF0EC7150020935FB11AB618D07F9B366C9704749F04047A7301760E3DA7D9D105669
                        APIs
                        • FreeLibrary.KERNELBASE(00000000,00000000,00428478,0040B255), ref: 0040D670
                        • FreeLibrary.KERNELBASE(?,00000000,00428478,0040B255), ref: 0040D67A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 59a7071d1dd9d4a1944e93e12377b33d0db7f1e6a7b182eb56bb3c8187735fc0
                        • Instruction ID: 4d1337d42fa01acff7bf8ed68dc391a9dd876f6a6f70e47e060c561f5973a248
                        • Opcode Fuzzy Hash: 59a7071d1dd9d4a1944e93e12377b33d0db7f1e6a7b182eb56bb3c8187735fc0
                        • Instruction Fuzzy Hash: B7E0E6B9A011249BC7109B69DC04A8BF3ACAF8D711305457BE844E7260C775EC458A9C
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ItemShowWindow
                        • String ID:
                        • API String ID: 3351165006-0
                        • Opcode ID: 31a5e7e24aa95587fff124dc82553afabecacd6f260f20cc2a013528be6f39cc
                        • Instruction ID: 30ec9a62d7da40616be5be578f38c97bd2770da9cb0895eed67ff41408063d34
                        • Opcode Fuzzy Hash: 31a5e7e24aa95587fff124dc82553afabecacd6f260f20cc2a013528be6f39cc
                        • Instruction Fuzzy Hash: BDC012B2858201BECB010BB0DC09C6EBBE8EBE4212F00C968B4B5C1060C338C010EB11
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 004014D6
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 004014DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CallbackDispatcherItemUser
                        • String ID:
                        • API String ID: 4250310104-0
                        • Opcode ID: 07ebeb89ee4c6af418ed372072c4f1c95858f34b63c729f887c8e98a6337a498
                        • Instruction ID: e775300b26e6957e38a0c3122958c693087dcc2de40fac5117b1360baf30b69a
                        • Opcode Fuzzy Hash: 07ebeb89ee4c6af418ed372072c4f1c95858f34b63c729f887c8e98a6337a498
                        • Instruction Fuzzy Hash: A1C04CB6808250BFCB015BA0DD08C6FBFA9EBD4311F10C859F5B581020C735C410DB15
                        APIs
                        • ___crtCorExitProcess.LIBCMT ref: 00414620
                          • Part of subcall function 004145ED: GetModuleHandleW.KERNEL32(mscoree.dll,?,00414625,00000000,?,0040E8A5,000000FF,0000001E,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018), ref: 004145F7
                          • Part of subcall function 004145ED: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00414607
                        • ExitProcess.KERNEL32 ref: 00414629
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ExitProcess$AddressHandleModuleProc___crt
                        • String ID:
                        • API String ID: 2427264223-0
                        • Opcode ID: 6970ef0178e54aa9717a80ee9d14ee9f2d85b4b94952842216fcc8fef513ddd7
                        • Instruction ID: 9ed74dd50bbc36ba6bd84203e3fa8fa92a8ff8f09efc0f339a9509f6ab691be6
                        • Opcode Fuzzy Hash: 6970ef0178e54aa9717a80ee9d14ee9f2d85b4b94952842216fcc8fef513ddd7
                        • Instruction Fuzzy Hash: 87B09231000188BBCB022F16DC0EC897F2AEB813A4B508025F91809131DF7AAED2DAC8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __allrem
                        • String ID:
                        • API String ID: 2933888876-0
                        • Opcode ID: 914fa3578b17cd8cdaf5fab10e1313f3b9488ccf4dd02e1e5fd15f4c0cbd4b0e
                        • Instruction ID: 87ea4bd2bccbd63926f54bd168f848c5c2d1f9e5dbfdf31fcc32d64d6a53170e
                        • Opcode Fuzzy Hash: 914fa3578b17cd8cdaf5fab10e1313f3b9488ccf4dd02e1e5fd15f4c0cbd4b0e
                        • Instruction Fuzzy Hash: FB31B979A80241AFD704CF2AEC45A167BB9FB8A355B14843BE804E73A1C735AD40CB9C
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcsncpy
                        • String ID:
                        • API String ID: 1735881322-0
                        • Opcode ID: 778b778de92af2b5b72a591af9bb9c6ac669e65f108f804b0c34e230359d3f9f
                        • Instruction ID: b05e02ebd5e216b60606902b3f8da382eb8798967ef3b767e0a29ad076cd886d
                        • Opcode Fuzzy Hash: 778b778de92af2b5b72a591af9bb9c6ac669e65f108f804b0c34e230359d3f9f
                        • Instruction Fuzzy Hash: 6F21A4726402146AEF209F65C945BDA3BAC9F12709F10806BF945FB2C1E77CAB858798
                        APIs
                          • Part of subcall function 004061C9: _wcspbrk.LIBCMT ref: 004061DA
                        • FindClose.KERNEL32(00000000,?,000000FF,?,?), ref: 00404A90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CloseFind_wcspbrk
                        • String ID:
                        • API String ID: 2190230203-0
                        • Opcode ID: f31bc1aec1a922c4ffedab45dbeecf25ba6dbc12309cf884b7d8273ca4e124eb
                        • Instruction ID: 35b0391d9f9142b57bba3dac1277128befa2d9774ead74b552662865d59bb03a
                        • Opcode Fuzzy Hash: f31bc1aec1a922c4ffedab45dbeecf25ba6dbc12309cf884b7d8273ca4e124eb
                        • Instruction Fuzzy Hash: 9DF09676005380EACA216B758804FC77F955F85325F04CA5FB2F9621D2C7795059CB79
                        APIs
                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00410E09
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CreateHeap
                        • String ID:
                        • API String ID: 10892065-0
                        • Opcode ID: 995eee72f0e8b1853d775572dadcc08bce08ee03d3777e5bacff91ab447788ef
                        • Instruction ID: adbf63a435582c79e20d188c52b69549abffd9a0c27f516a1d9d914bf20f01d3
                        • Opcode Fuzzy Hash: 995eee72f0e8b1853d775572dadcc08bce08ee03d3777e5bacff91ab447788ef
                        • Instruction Fuzzy Hash: C1D05E7AAA0309AADB005F726C09BA23BDCA384395F248876F91CC6150E6B4C6909A08
                        APIs
                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,?), ref: 004088BD
                          • Part of subcall function 004084A5: PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004084B6
                          • Part of subcall function 004084A5: GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004084C7
                          • Part of subcall function 004084A5: TranslateMessage.USER32(?), ref: 004084D1
                          • Part of subcall function 004084A5: DispatchMessageW.USER32(?), ref: 004084DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Message$DispatchItemPeekSendTranslate
                        • String ID:
                        • API String ID: 4142818094-0
                        • Opcode ID: 59f074edfc4051e71d322ad4293447d6875f80f313aa9442ed8b377053ee9ec8
                        • Instruction ID: 2f62d7af735f7a1776b5f8959e9d8ba76cfb3bd6be75bafea868b809adcdf3d2
                        • Opcode Fuzzy Hash: 59f074edfc4051e71d322ad4293447d6875f80f313aa9442ed8b377053ee9ec8
                        • Instruction Fuzzy Hash: 7BC012701403017EE7016B10DE07F197611BB50719F40843D73C0740F1C9B589319A0E
                        APIs
                        • _doexit.LIBCMT ref: 00414840
                          • Part of subcall function 00414708: __lock.LIBCMT ref: 00414716
                          • Part of subcall function 00414708: __decode_pointer.LIBCMT ref: 0041474D
                          • Part of subcall function 00414708: __decode_pointer.LIBCMT ref: 00414762
                          • Part of subcall function 00414708: __decode_pointer.LIBCMT ref: 0041478C
                          • Part of subcall function 00414708: __decode_pointer.LIBCMT ref: 004147A2
                          • Part of subcall function 00414708: __decode_pointer.LIBCMT ref: 004147AF
                          • Part of subcall function 00414708: __initterm.LIBCMT ref: 004147DE
                          • Part of subcall function 00414708: __initterm.LIBCMT ref: 004147EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __decode_pointer$__initterm$__lock_doexit
                        • String ID:
                        • API String ID: 1597249276-0
                        • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                        • Instruction ID: b32a3fcfb1ec7a781ebf046ce57eb00434f4a1e126996ad03adeacd0fd33dce8
                        • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                        • Instruction Fuzzy Hash: 93B092B258020833DA202582AC03F463A4987C2B64F260021FA1C1A1E1AAA2A9A18489
                        APIs
                        • SetEndOfFile.KERNELBASE(?,00402240,00000800,Insidious_protected.exe,00000000,00000000,?,00402E52,Insidious_protected.exe,?,00000000,00000000,Insidious_protected.exe,Insidious_protected.exe,00000004), ref: 004034A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: File
                        • String ID:
                        • API String ID: 749574446-0
                        • Opcode ID: 3248346f4acb0c94312a20494ffe2fba7fcd5ef10402f30ffc0e6628f2a26c1b
                        • Instruction ID: 1d255113645bd2ae7eb809bc185da6401d80b2aa1bf547e8818ed4a6c524d46d
                        • Opcode Fuzzy Hash: 3248346f4acb0c94312a20494ffe2fba7fcd5ef10402f30ffc0e6628f2a26c1b
                        • Instruction Fuzzy Hash: 66B011B08A000AAA8E002B30CC08C203A20EA22B0A32882B0A002C80A0CB22C002AA08
                        APIs
                        • SetCurrentDirectoryW.KERNELBASE(?,00408CBE,0041D480,00000000,?,00000006,?,00000800), ref: 0040D240
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID:
                        • API String ID: 1611563598-0
                        • Opcode ID: 64c64d8d87d43941dfac70749241e0796d0e04e61c0cba4a8a44b57a4ed2b815
                        • Instruction ID: a056bfc463363d554647154bee46ca17ce2c496768e0877e9ac1f29c138014e4
                        • Opcode Fuzzy Hash: 64c64d8d87d43941dfac70749241e0796d0e04e61c0cba4a8a44b57a4ed2b815
                        • Instruction Fuzzy Hash: 04A012701940174B8A004B30CC0991579506760702F10D6307102C10A0EB304410A504
                        APIs
                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 004092B1
                        • DestroyIcon.USER32(00000000), ref: 004092BC
                        • EndDialog.USER32(?,00000006), ref: 004092C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: DestroyDialogIconItemMessageSend
                        • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                        • API String ID: 3309745630-1840816070
                        • Opcode ID: 64203b1b0f507b5fb51e6d029f3df7d66fdf5bb27848074fbed6d2061144eb3b
                        • Instruction ID: a5f8c2d2f81a33b88b4662c48bd41d559d21d25c75d0bff53fe3a4002b46307f
                        • Opcode Fuzzy Hash: 64203b1b0f507b5fb51e6d029f3df7d66fdf5bb27848074fbed6d2061144eb3b
                        • Instruction Fuzzy Hash: ADA142B294011CBBEB21EBA0DC85FEF776CEB08704F004476BA15E61D1D779AE458B68
                        APIs
                        • ShowWindow.USER32(?,00000000,00000000,?,?), ref: 0040D03D
                          • Part of subcall function 0040CFC0: LoadCursorW.USER32(00000000,00007F00), ref: 0040CFF7
                          • Part of subcall function 0040CFC0: RegisterClassExW.USER32(00000030), ref: 0040D018
                        • GetWindowRect.USER32(?,?), ref: 0040D060
                        • GetParent.USER32(?), ref: 0040D075
                        • MapWindowPoints.USER32(00000000,00000000), ref: 0040D07A
                        • DestroyWindow.USER32(?), ref: 0040D088
                        • CoCreateInstance.OLE32(0041DEE8,00000000,00000004,0041DED8,?), ref: 0040D0B0
                        • GetParent.USER32(?), ref: 0040D0CB
                        • CreateWindowExW.USER32(00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 0040D0EA
                        • ShowWindow.USER32(?,00000005,?), ref: 0040D11E
                        • SetWindowTextW.USER32(?,00000000), ref: 0040D128
                        • ShowWindow.USER32(?,00000005), ref: 0040D141
                        • UpdateWindow.USER32(?), ref: 0040D14A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Window$Show$CreateParent$ClassCursorDestroyInstanceLoadPointsRectRegisterTextUpdate
                        • String ID: RarHtmlClassName
                        • API String ID: 3427168278-1658105358
                        • Opcode ID: f2e0e5cce557d2bab1d2a55fc36763729a63b39272e955793d44065d85f29a01
                        • Instruction ID: 067478607c8cc62066d4fd9add0998a1adb0bc400972f882095bd25ee71812b1
                        • Opcode Fuzzy Hash: f2e0e5cce557d2bab1d2a55fc36763729a63b39272e955793d44065d85f29a01
                        • Instruction Fuzzy Hash: E1417171A00705EFCB209FA4DC49FAF7BB5EF45741F00852AF926AA290CB38D904DB58
                        APIs
                        • LoadLibraryW.KERNEL32(Crypt32.dll,?,00408320,?,00000000,?,004083F3,?,00000000,?,00000081,Insidious_protected.exe,00000000), ref: 004082D6
                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 004082EF
                        • GetProcAddress.KERNEL32(00427454,CryptUnprotectMemory), ref: 004082FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                        • API String ID: 2238633743-1753850145
                        • Opcode ID: b031360c89dd83f77915d7f430b089058aa64246dc2d553d84620c9b4105b76f
                        • Instruction ID: 656f52d4d693ac61dda6207ed72b599d4ba5c61f90d55f67dcfbc1968c558d90
                        • Opcode Fuzzy Hash: b031360c89dd83f77915d7f430b089058aa64246dc2d553d84620c9b4105b76f
                        • Instruction Fuzzy Hash: CDE012B19007515ED7205B79A908B86BFD85FA4B10F15842FE4C5A3690D6B9E4818F58
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 004177A0
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004177B5
                        • UnhandledExceptionFilter.KERNEL32(0041E788), ref: 004177C0
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 004177DC
                        • TerminateProcess.KERNEL32(00000000), ref: 004177E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 93c9d776b0eaaa1d978d96a5b090cb8c2b62e730f3cc6c957347c3f92daaccab
                        • Instruction ID: 035c45d87a1aa62b72ede0916bbd921df1af0febba1fabf3b659742c5dde9242
                        • Opcode Fuzzy Hash: 93c9d776b0eaaa1d978d96a5b090cb8c2b62e730f3cc6c957347c3f92daaccab
                        • Instruction Fuzzy Hash: F921F4B9A11200EFD310DF68FD856857BA0FB0A314F51503AE908A3B60EBB45989CF4D
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _memset$_malloc
                        • String ID:
                        • API String ID: 3506388080-0
                        • Opcode ID: 707a00fc54deded68eb4cbbcaebf2fb5fd02508cd3390affb55d5bc005419b07
                        • Instruction ID: 9b3033f59d41f5d66c71c7558caa4ea00f23f275f63cac75b0a64b7f28ae0d64
                        • Opcode Fuzzy Hash: 707a00fc54deded68eb4cbbcaebf2fb5fd02508cd3390affb55d5bc005419b07
                        • Instruction Fuzzy Hash: 24E14735A00609CFDB18DF68D8806EE7BA1FF89354F15417AED1AA7390D635E885CF88
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0040850A
                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,00422028,?,?), ref: 00408557
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: FormatInfoLocaleNumber
                        • String ID:
                        • API String ID: 2169056816-0
                        • Opcode ID: 9dca6353d2896db002140ecc41b4ca80ca283260bb16757442f232363cb43269
                        • Instruction ID: 52dee88febe126e7441ea7bf2177991917d8f33e498c559a9870259f487697ca
                        • Opcode Fuzzy Hash: 9dca6353d2896db002140ecc41b4ca80ca283260bb16757442f232363cb43269
                        • Instruction Fuzzy Hash: 37015E75900218AAD720CF60ED81BABB7B8EF49714F50503AFA04E7160D7B4991587A9
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00405D7B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: b5b8fa2df2497f87c17261bd5542519b1d2c8f14f99cb3fdf1152e7f24c8fdc6
                        • Instruction ID: 72ef1710b2736ab39214b1b25895f54ee8ccd9f770067c6e3c2008dc02cbc78c
                        • Opcode Fuzzy Hash: b5b8fa2df2497f87c17261bd5542519b1d2c8f14f99cb3fdf1152e7f24c8fdc6
                        • Instruction Fuzzy Hash: 2CF03070A005088FDB34DF18ED856D677B5EB44319F5041B6D619A3390C2749982DF6A
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000167B6), ref: 004167FD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 5e02ff1849e9eb2e349dafdd1fca965de4877c45f3731cec0da06b4a3c554dc9
                        • Instruction ID: 739129c56bb40b63c769ace36b604afe11817dd5c78557d772855357cc35b6e2
                        • Opcode Fuzzy Hash: 5e02ff1849e9eb2e349dafdd1fca965de4877c45f3731cec0da06b4a3c554dc9
                        • Instruction Fuzzy Hash: B09002B065113456470057705D0D58635A46A4861A75244616111C5094DA948440951D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                        • Instruction ID: 67af26ef77d06bae2b09f1da9d75006bd89d7d4e3b8c2f00404a4ca8048ea74b
                        • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                        • Instruction Fuzzy Hash: 68D15C73C0A9B34AC735852E505813BEA626FD168031EC3B39C943FBCAD27B5D1A95D4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                        • Instruction ID: 5b10cc7bf5fc1ba985863ca11a0e02683e4afb888425776a1258c81e89ace435
                        • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                        • Instruction Fuzzy Hash: 9BD15E73D0A9B346C735856E506823BEA626FD168031EC3B39C943F7C9D23B5D0A95D4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                        • Instruction ID: 5acc3d6d7b90cabb0e02a22ce797cb3114b430c234c436541d605409912c81e1
                        • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                        • Instruction Fuzzy Hash: 56C16973C0A9B34AC736856E545813BEA626F9168031EC3B38C903FBCAD27B5D0A95D4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                        • Instruction ID: 15a581cdeaf620f004f6578edeac54b991bc467f41e101020d6b06fa5e5526b5
                        • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                        • Instruction Fuzzy Hash: 59C15C73D1A9B346C735856E405813BEA626FD169032EC3B28C903FBCAD23B9D0A95D4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bad13b278c2aa9192d9b33ffab0ca144604925584443bb84ce5710eef1145456
                        • Instruction ID: 4fee017f7656e223dfae8120273f35c5753f64f468f9b33f4964965e45f2659b
                        • Opcode Fuzzy Hash: bad13b278c2aa9192d9b33ffab0ca144604925584443bb84ce5710eef1145456
                        • Instruction Fuzzy Hash: D321C636B145714BD7149E6AACC046633A2D7C671279A4137EF406F3B5C1387923DAE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                        • Instruction ID: f1f49216dbc806232b3c7a3e5565794b4db976bfd775f1eafaf16b15534c25d2
                        • Opcode Fuzzy Hash: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                        • Instruction Fuzzy Hash: 33F0AE725007055ADB109E58D94676777F8EB00708F24882FD596F62C0C379D541CBCE
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy_wcslen_wcsncpy
                        • String ID: UNC$\\?\
                        • API String ID: 677062453-253988292
                        • Opcode ID: 05924f15b3839e00ccd93292c39cc6597b5dbe2876e3a7e9c4f257d4b1bd4bc3
                        • Instruction ID: a370ad723c5ce6d19b833b1596ed6c19150a6b6500e06b292635d8537dec146e
                        • Opcode Fuzzy Hash: 05924f15b3839e00ccd93292c39cc6597b5dbe2876e3a7e9c4f257d4b1bd4bc3
                        • Instruction Fuzzy Hash: 7341C776D00214A6DB20AE518C41FEB33786F15728F15083FF546732C2EB7CD5A586AD
                        APIs
                        • _wcslen.LIBCMT ref: 0040CB6B
                        • _malloc.LIBCMT ref: 0040CB78
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        • _wcscpy.LIBCMT ref: 0040CB91
                        • _wcscat.LIBCMT ref: 0040CB9C
                        • _wcscat.LIBCMT ref: 0040CBA7
                        • _wcscat.LIBCMT ref: 0040CBE2
                        • _wcscat.LIBCMT ref: 0040CBF3
                        • _wcslen.LIBCMT ref: 0040CC0C
                        • GlobalAlloc.KERNEL32(00000040,-00000009,?,<html>,00000006,?,?,?,00000000), ref: 0040CC1D
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000106,00000000,00000000,?,?,?,00000000), ref: 0040CC3E
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000,?,?,?,00000000), ref: 0040CC66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscat$Global_wcslen$AllocAllocateByteCharCreateHeapMultiStreamWide_malloc_wcscpy
                        • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                        • API String ID: 4158105118-4209811716
                        • Opcode ID: 0a6887836068bec9c5cf132fd04c04b75e7d4ac98899b0ee681dfd2167bbc091
                        • Instruction ID: ac203a1a09652490711e52fdf1ea15be3db4f3947fb013b8c7cf9ccaa06cff7b
                        • Opcode Fuzzy Hash: 0a6887836068bec9c5cf132fd04c04b75e7d4ac98899b0ee681dfd2167bbc091
                        • Instruction Fuzzy Hash: B8311472D04200FAEB10A7A18CC6EAE77789F02724F14827BF8057B2D2DB7C594597AC
                        APIs
                        • GetDC.USER32(00000000), ref: 0040D2CB
                        • CreateCompatibleDC.GDI32(00000000), ref: 0040D2DB
                        • CreateCompatibleDC.GDI32(?), ref: 0040D2E2
                        • GetObjectW.GDI32(?,00000018,?), ref: 0040D2F0
                        • CreateCompatibleBitmap.GDI32(?,00000200,0040D463), ref: 0040D312
                        • SelectObject.GDI32(00000000,?), ref: 0040D325
                        • SelectObject.GDI32(?,00000200), ref: 0040D330
                        • StretchBlt.GDI32(?,00000000,00000000,00000200,0040D463,00000000,00000000,00000000,?,?,00CC0020), ref: 0040D34E
                        • SelectObject.GDI32(00000000,?), ref: 0040D358
                        • SelectObject.GDI32(?,0040D463), ref: 0040D360
                        • DeleteDC.GDI32(00000000), ref: 0040D369
                        • DeleteDC.GDI32(?), ref: 0040D36E
                        • ReleaseDC.USER32(00000000,?), ref: 0040D374
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Object$Select$CompatibleCreate$Delete$BitmapReleaseStretch
                        • String ID:
                        • API String ID: 3950507155-0
                        • Opcode ID: cdadd7120e27af5b190d937b9c28e6c341fa13ba7bad2dbb6a8fae77adacf070
                        • Instruction ID: db57e01469eac2f6e1f32761615210311fdd493afb2db33602f0e34e8e9715ee
                        • Opcode Fuzzy Hash: cdadd7120e27af5b190d937b9c28e6c341fa13ba7bad2dbb6a8fae77adacf070
                        • Instruction Fuzzy Hash: 5C218E76C00218FBCF119FA1DD48CDEBFB9FB48260B108466F914A2120C7359A61EFA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy$ChangeNotify_wcschr_wcsncpy
                        • String ID: "$.lnk
                        • API String ID: 1911921660-4024015082
                        • Opcode ID: 1954c656903fc7399cd62d6b56b3d12bcfd1324b6e067c2484166a1160e28561
                        • Instruction ID: 18cd1ca0b5a64a1430c2140ab4aac65e22f1a3a915c48dc61c436cbd3c819869
                        • Opcode Fuzzy Hash: 1954c656903fc7399cd62d6b56b3d12bcfd1324b6e067c2484166a1160e28561
                        • Instruction Fuzzy Hash: 70913572D0022899DF25EBA5CC45EEE73BCFB04704F1445ABE509F3081EB789BA48B59
                        APIs
                        • GetTempPathW.KERNEL32(?,?), ref: 0040A1A0
                          • Part of subcall function 00406202: _wcslen.LIBCMT ref: 00406208
                          • Part of subcall function 00406202: _wcscat.LIBCMT ref: 00406227
                        • _swprintf.LIBCMT ref: 0040A1DC
                          • Part of subcall function 0040BEA8: __vswprintf_c_l.LIBCMT ref: 0040BEBB
                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040A1FE
                        • _wcschr.LIBCMT ref: 0040A231
                        • _wcscpy.LIBCMT ref: 0040A275
                        • _wcscpy.LIBCMT ref: 0040A29E
                        • _wcscpy.LIBCMT ref: 0040A2B1
                        • MessageBoxW.USER32(?,00000000,00000000,00000024), ref: 0040A2E1
                        • EndDialog.USER32(?,00000001), ref: 0040A303
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy$DialogItemMessagePathTempText__vswprintf_c_l_swprintf_wcscat_wcschr_wcslen
                        • String ID: %s%s%d
                        • API String ID: 1897388972-1000756122
                        • Opcode ID: 69e43e68f1f40c2d5f45ce756f3d38e13771394d88c52d0899c5382198fe3a50
                        • Instruction ID: ed26e913539d0acb4bb363ecd01f626dd6aac51989bf1b5164b44c69409d6486
                        • Opcode Fuzzy Hash: 69e43e68f1f40c2d5f45ce756f3d38e13771394d88c52d0899c5382198fe3a50
                        • Instruction Fuzzy Hash: 235156B18002189EDB21DB50DC44BEE77BCBB04318F0445FBE749E7191E7799AA88B5A
                        APIs
                        • _wcslen.LIBCMT ref: 0040C8AB
                        • _malloc.LIBCMT ref: 0040C8B9
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        • _wcscpy.LIBCMT ref: 0040C8D7
                        • _wcslen.LIBCMT ref: 0040C8DD
                        • _wcscpy.LIBCMT ref: 0040C925
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy_wcslen$AllocateHeap_malloc
                        • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                        • API String ID: 2405444336-406990186
                        • Opcode ID: 1f43a3725d2a064b523f89da600bb760bb92fefa6aebe8669d6549279e74a8e8
                        • Instruction ID: 09ef6740cda63987b22ca33d8a591d2aee420375d6faba84490147c37b44941a
                        • Opcode Fuzzy Hash: 1f43a3725d2a064b523f89da600bb760bb92fefa6aebe8669d6549279e74a8e8
                        • Instruction Fuzzy Hash: BF21DBB2D00314EADB20AB54D881AAEB3B4DF45724B20463FF441B72D1E7BC699587DC
                        APIs
                        • GetDC.USER32(00000000), ref: 0040D435
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0040D440
                        • ReleaseDC.USER32(00000000,00000000), ref: 0040D44A
                        • GetObjectW.GDI32(00000200,00000018,?), ref: 0040D471
                        • CoCreateInstance.OLE32(0041DF18,00000000,00000001,0041DE00,?,?), ref: 0040D49E
                          • Part of subcall function 0040D2BF: GetDC.USER32(00000000), ref: 0040D2CB
                          • Part of subcall function 0040D2BF: CreateCompatibleDC.GDI32(00000000), ref: 0040D2DB
                          • Part of subcall function 0040D2BF: CreateCompatibleDC.GDI32(?), ref: 0040D2E2
                          • Part of subcall function 0040D2BF: GetObjectW.GDI32(?,00000018,?), ref: 0040D2F0
                          • Part of subcall function 0040D2BF: CreateCompatibleBitmap.GDI32(?,00000200,0040D463), ref: 0040D312
                          • Part of subcall function 0040D2BF: SelectObject.GDI32(00000000,?), ref: 0040D325
                          • Part of subcall function 0040D2BF: SelectObject.GDI32(?,00000200), ref: 0040D330
                          • Part of subcall function 0040D2BF: StretchBlt.GDI32(?,00000000,00000000,00000200,0040D463,00000000,00000000,00000000,?,?,00CC0020), ref: 0040D34E
                          • Part of subcall function 0040D2BF: SelectObject.GDI32(00000000,?), ref: 0040D358
                          • Part of subcall function 0040D2BF: SelectObject.GDI32(?,0040D463), ref: 0040D360
                          • Part of subcall function 0040D2BF: DeleteDC.GDI32(00000000), ref: 0040D369
                          • Part of subcall function 0040D2BF: DeleteDC.GDI32(?), ref: 0040D36E
                          • Part of subcall function 0040D2BF: ReleaseDC.USER32(00000000,?), ref: 0040D374
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Object$CreateSelect$Compatible$DeleteRelease$BitmapCapsDeviceInstanceStretch
                        • String ID: (
                        • API String ID: 189428636-3887548279
                        • Opcode ID: 907b3cc167c8d4b930c6acb38bf00dc7c7065ea850d81804d32ac6c691964cbd
                        • Instruction ID: d6fcf25a289fd65e9cb41bc4207407373451364aaade831e684b17d24746c2f3
                        • Opcode Fuzzy Hash: 907b3cc167c8d4b930c6acb38bf00dc7c7065ea850d81804d32ac6c691964cbd
                        • Instruction Fuzzy Hash: 6561FC75A00218BFCB00CFE5CC88D9EBBB9EF89714B10846AF805EB290D775DA45CB64
                        APIs
                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040A79E
                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0040A7B3
                        • GetDlgItem.USER32(?,00000065), ref: 0040A7C2
                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0040A7D7
                        • GetSysColor.USER32(0000000F), ref: 0040A7DB
                        • SendMessageW.USER32(?,00000443,00000000,00000000), ref: 0040A7EB
                        • SetForegroundWindow.USER32(?), ref: 0040A805
                        • EndDialog.USER32(?,00000001), ref: 0040A838
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: MessageSend$Item$ColorDialogForegroundWindow
                        • String ID: LICENSEDLG
                        • API String ID: 3794146707-2177901306
                        • Opcode ID: 4aa04ebb881a2f8e27ed9a2eaf2b2970aafca0b6ff9fc0121fe28f3043193e4f
                        • Instruction ID: 0d65b17007a185fb784e99a011f3f588a2ffc1dd3e816e3bd4fbfcbfd7b0be9d
                        • Opcode Fuzzy Hash: 4aa04ebb881a2f8e27ed9a2eaf2b2970aafca0b6ff9fc0121fe28f3043193e4f
                        • Instruction Fuzzy Hash: 7421F372540305BEDB206F61AC49EAB3B3DFB84B10F00D436B615A61E1C679C922CB2D
                        APIs
                        • GetWindow.USER32(?,00000005), ref: 00408FBA
                        • GetClassNameW.USER32(00000000,?,00000800), ref: 00408FF3
                          • Part of subcall function 0040C212: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00405DF8,?,00000000,?,00405F12,00000000,-00000002,?,00000000,?), ref: 0040C228
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00409011
                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00409028
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00409037
                          • Part of subcall function 0040D3C7: GetDC.USER32(00000000), ref: 0040D3D3
                          • Part of subcall function 0040D3C7: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0040D3E2
                          • Part of subcall function 0040D3C7: ReleaseDC.USER32(00000000,00000000), ref: 0040D3F0
                          • Part of subcall function 0040D384: GetDC.USER32(00000000), ref: 0040D390
                          • Part of subcall function 0040D384: GetDeviceCaps.GDI32(00000000,00000058), ref: 0040D39F
                          • Part of subcall function 0040D384: ReleaseDC.USER32(00000000,00000000), ref: 0040D3AD
                          • Part of subcall function 0040D429: GetDC.USER32(00000000), ref: 0040D435
                          • Part of subcall function 0040D429: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0040D440
                          • Part of subcall function 0040D429: ReleaseDC.USER32(00000000,00000000), ref: 0040D44A
                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0040905E
                        • DeleteObject.GDI32(00000000), ref: 00409069
                        • GetWindow.USER32(00000000,00000002), ref: 00409072
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CapsDeviceReleaseWindow$MessageObjectSend$ClassCompareDeleteLongNameString
                        • String ID: STATIC
                        • API String ID: 139228892-1882779555
                        • Opcode ID: edf058f1961644c74f2ef94dea3d07453db63d7a220c6db96151921dfa923a3d
                        • Instruction ID: 44987b1723e6818d33ff9fcbaf1988b7f97071194c65a4f2956ea2b46da2b8fa
                        • Opcode Fuzzy Hash: edf058f1961644c74f2ef94dea3d07453db63d7a220c6db96151921dfa923a3d
                        • Instruction Fuzzy Hash: E321F272A40215BBEB216BA0DC46FFF767CAB45704F108136FA10B61D2CB7C9D429A6C
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _strlen$_swprintf_wcschr_wcscpy_wcsncpy_wcsrchr
                        • String ID: %08x
                        • API String ID: 3224783807-3682738293
                        • Opcode ID: da9f49d18cecde2bd0dbbf6a54d293e856696592837e9dd826bd4ebee0ed1230
                        • Instruction ID: 2ef3df8fa2506286d335814b10598aad5fb2e8dbfa3dffe9d47252d3f5b1333a
                        • Opcode Fuzzy Hash: da9f49d18cecde2bd0dbbf6a54d293e856696592837e9dd826bd4ebee0ed1230
                        • Instruction Fuzzy Hash: 2441C672A14219AADB24AA65CC85BBB379CDF00354F10047BB905F72D1EA7CAD5086AE
                        APIs
                        • _malloc.LIBCMT ref: 00408D1A
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        • _wcslen.LIBCMT ref: 00408D5A
                        • _wcscat.LIBCMT ref: 00408D71
                        • _wcslen.LIBCMT ref: 00408D77
                        • _wcscpy.LIBCMT ref: 00408DA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcslen$AllocateHeap_malloc_wcscat_wcscpy
                        • String ID: }$%C
                        • API String ID: 2020890722-2849737465
                        • Opcode ID: af12a75299afceffce0d557cd976948405d4f5bbb61c9129acda9089dd51115c
                        • Instruction ID: 4bc0604b1b6b0d3142740a06b788c1dfa6a07c4edf555c8bd9041bbf7a17e823
                        • Opcode Fuzzy Hash: af12a75299afceffce0d557cd976948405d4f5bbb61c9129acda9089dd51115c
                        • Instruction Fuzzy Hash: AB110A2190031A59E7246BA19DC57EB73A8DF20354F10067FE684F32D1EFBC9D88825D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcschr$__vswprintf_c_l_swprintf_wcsncpy
                        • String ID: %c:\$%s.%d.tmp
                        • API String ID: 2474501127-1021493711
                        • Opcode ID: 049bbedcb83de66b0cf617957c9c60a5fe3f86e3569eb364f6355803db2aa85d
                        • Instruction ID: 0d88ba1989d1328e5d1e1858cad1bf16c2028fab9cfc81fa6875348d8aa2afe7
                        • Opcode Fuzzy Hash: 049bbedcb83de66b0cf617957c9c60a5fe3f86e3569eb364f6355803db2aa85d
                        • Instruction Fuzzy Hash: 900104A2504701A5DB206B768C05D1B27ECDFC5360B024C3FF586E71C2EA39D46082AD
                        APIs
                        • GetTickCount.KERNEL32 ref: 0040C9AA
                        • GetTickCount.KERNEL32 ref: 0040C9AF
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040C9DE
                        • TranslateMessage.USER32(?), ref: 0040C9EC
                        • DispatchMessageW.USER32(?), ref: 0040C9F6
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040CA03
                        • GetTickCount.KERNEL32 ref: 0040CA09
                        • VariantInit.OLEAUT32(?), ref: 0040CA16
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Message$CountTick$DispatchInitPeekTranslateVariant
                        • String ID:
                        • API String ID: 4242828014-0
                        • Opcode ID: 7dc17329f8ab9b4acd667758837caa8ab9a695279b76d5e366d602091f4d296d
                        • Instruction ID: 2a5c07fabde081b60c3ce0978204a0f8b04126b562af26a8b153a63d938f9069
                        • Opcode Fuzzy Hash: 7dc17329f8ab9b4acd667758837caa8ab9a695279b76d5e366d602091f4d296d
                        • Instruction Fuzzy Hash: E721F9B1D00209AFDB00DBE4D888EDEBBBCEF48354F108466F515E7290D678DA45CB60
                        APIs
                        • _wcslen.LIBCMT ref: 0040CC9A
                        • _malloc.LIBCMT ref: 0040CCA4
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AllocateHeap_malloc_wcslen
                        • String ID: </p>$</style>$<br>$<style>
                        • API String ID: 4208083856-1200123991
                        • Opcode ID: d66708e4bee72c366d5af01bc254bf5b422d8d28f6b0c1b4a2ec0cb54556c494
                        • Instruction ID: c96dfc2f76d271fab0385415cf6730c151aca97c24db104c876b2958a4d346dc
                        • Opcode Fuzzy Hash: d66708e4bee72c366d5af01bc254bf5b422d8d28f6b0c1b4a2ec0cb54556c494
                        • Instruction Fuzzy Hash: 49412625A40352E6DB306B698881BBB67A4DF01750F28423BEDC5B72C0E67C4DC2929D
                        APIs
                        • IsWindowVisible.USER32(?), ref: 004095C1
                        • DialogBoxParamW.USER32(GETPASSWORD1,?,00408804,?,00000081), ref: 00409605
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: DialogParamVisibleWindow
                        • String ID: GETPASSWORD1$Insidious_protected.exe$$C$$C
                        • API String ID: 3157717868-2741612905
                        • Opcode ID: c3044ebf47bdcdc3c5a1b15811e15d13a590ff08298752b4a743a976122f91e4
                        • Instruction ID: 7ef985a99e08697849c09b8ebd474c7c1b799b19120f86ad4084530d831195f5
                        • Opcode Fuzzy Hash: c3044ebf47bdcdc3c5a1b15811e15d13a590ff08298752b4a743a976122f91e4
                        • Instruction Fuzzy Hash: F611E672A002546BDB22DF619D41FD73B98AB08768F54407AFA48BB2C2C7B99C40C76C
                        APIs
                        • __getptd.LIBCMT ref: 00414E64
                          • Part of subcall function 00412C1B: __getptd_noexit.LIBCMT ref: 00412C1E
                          • Part of subcall function 00412C1B: __amsg_exit.LIBCMT ref: 00412C2B
                        • __amsg_exit.LIBCMT ref: 00414E84
                        • __lock.LIBCMT ref: 00414E94
                        • InterlockedDecrement.KERNEL32(?), ref: 00414EB1
                        • InterlockedIncrement.KERNEL32(021B1680), ref: 00414EDC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                        • String ID: @'B
                        • API String ID: 4271482742-3452749323
                        • Opcode ID: 24f3661bc821a93c8c07a293ab1a6f9c1933bfd4b7d154654915bcffb3cd1b4b
                        • Instruction ID: 3d56504365c8954cdb8498363856b56e35b22bb529887cea4aafece61b2d84cb
                        • Opcode Fuzzy Hash: 24f3661bc821a93c8c07a293ab1a6f9c1933bfd4b7d154654915bcffb3cd1b4b
                        • Instruction Fuzzy Hash: CE018435E01721ABCB20AF6698057DE7760BF80725F55411BE50167291CB7C69C2CFDD
                        APIs
                        • GetTickCount.KERNEL32 ref: 0040C7AA
                        • GetTickCount.KERNEL32 ref: 0040C7C5
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040C7D9
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040C7EA
                        • TranslateMessage.USER32(?), ref: 0040C7F4
                        • DispatchMessageW.USER32(?), ref: 0040C7FE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Message$CountTick$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 3906477200-0
                        • Opcode ID: 66ebdeccde8ee75a2315abd6acd22cbaba3830cdc794b0c4734d1373dfc9c57e
                        • Instruction ID: 376f0f11d5641e447b2ea21117352dcec2394663a5ee3f19735b7a3e23491d5d
                        • Opcode Fuzzy Hash: 66ebdeccde8ee75a2315abd6acd22cbaba3830cdc794b0c4734d1373dfc9c57e
                        • Instruction Fuzzy Hash: 4A313C76D00119EFCB10EFA9C888CDEBBB8EF89711B1045A9E856E7250D738DE41CB64
                        APIs
                        • __CreateFrameInfo.LIBCMT ref: 00412014
                          • Part of subcall function 0040DB8A: __getptd.LIBCMT ref: 0040DB98
                          • Part of subcall function 0040DB8A: __getptd.LIBCMT ref: 0040DBA6
                        • __getptd.LIBCMT ref: 0041201E
                          • Part of subcall function 00412C1B: __getptd_noexit.LIBCMT ref: 00412C1E
                          • Part of subcall function 00412C1B: __amsg_exit.LIBCMT ref: 00412C2B
                        • __getptd.LIBCMT ref: 0041202C
                        • __getptd.LIBCMT ref: 0041203A
                        • __getptd.LIBCMT ref: 00412045
                        • _CallCatchBlock2.LIBCMT ref: 0041206B
                          • Part of subcall function 0040DC2F: __CallSettingFrame@12.LIBCMT ref: 0040DC7B
                          • Part of subcall function 00412112: __getptd.LIBCMT ref: 00412121
                          • Part of subcall function 00412112: __getptd.LIBCMT ref: 0041212F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                        • String ID:
                        • API String ID: 1602911419-0
                        • Opcode ID: 79127e1acb94af09b3682d15fa16cb4a979bdf92a0f50c9501d666122f1e058e
                        • Instruction ID: 95bde61fb703ff281dffc119755cf773db709447b83acf7e6797d88b201d0f55
                        • Opcode Fuzzy Hash: 79127e1acb94af09b3682d15fa16cb4a979bdf92a0f50c9501d666122f1e058e
                        • Instruction Fuzzy Hash: FB11F971D00209DFDB00EFA5C946BED7BB0FF04314F10806AF915A7251EB7899959F58
                        APIs
                          • Part of subcall function 004082C8: LoadLibraryW.KERNEL32(Crypt32.dll,?,00408320,?,00000000,?,004083F3,?,00000000,?,00000081,Insidious_protected.exe,00000000), ref: 004082D6
                          • Part of subcall function 004082C8: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 004082EF
                          • Part of subcall function 004082C8: GetProcAddress.KERNEL32(00427454,CryptUnprotectMemory), ref: 004082FB
                        • GetCurrentProcessId.KERNEL32(?,00000000,?,004083F3,?,00000000,?,00000081,Insidious_protected.exe,00000000), ref: 00408386
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AddressProc$CurrentLibraryLoadProcess
                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed$TtB$%C
                        • API String ID: 137661620-1509265896
                        • Opcode ID: 86b13bd7f49d619905730e53acb2aaa6a9a9a84eacaf14e7c25fb94e949a2929
                        • Instruction ID: 9f20b2228802001658b7d11ce79bf0a4444b116573522d04e06fec9c1765d9c7
                        • Opcode Fuzzy Hash: 86b13bd7f49d619905730e53acb2aaa6a9a9a84eacaf14e7c25fb94e949a2929
                        • Instruction Fuzzy Hash: 7F1120313042156BDB182B249DA18BE2B098B91B58B14403FF882AA2C1CA3E9C41828C
                        APIs
                        • EndDialog.USER32(?,00000001), ref: 004087BE
                        • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 004087D4
                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 004087EE
                        • SetDlgItemTextW.USER32(?,00000066), ref: 004087F9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ItemText$Dialog
                        • String ID: RENAMEDLG
                        • API String ID: 1770891597-3299779563
                        • Opcode ID: d8f41ce4e266a861fb4fcc861bdc3d592782ea95af7dc605313e0c225c77e399
                        • Instruction ID: 463d72d10546f484edac49cce2090d1c80408815d017192c2068b10d8d8b5491
                        • Opcode Fuzzy Hash: d8f41ce4e266a861fb4fcc861bdc3d592782ea95af7dc605313e0c225c77e399
                        • Instruction Fuzzy Hash: 3E01B1329402187ADB214F559D41FBB3B29EB85B60F20403AF640BB1D4CFB9A851A7AD
                        APIs
                          • Part of subcall function 00408E28: _wcscpy.LIBCMT ref: 00408E2D
                        • RegCreateKeyExW.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000000,00000000,00020006,00000000,?,?,00427470), ref: 00408EB2
                        • _wcslen.LIBCMT ref: 00408EC0
                        • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,?), ref: 00408EDB
                        • RegCloseKey.ADVAPI32(?), ref: 00408EE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CloseCreateValue_wcscpy_wcslen
                        • String ID: Software\WinRAR SFX
                        • API String ID: 3170333323-754673328
                        • Opcode ID: 89fbf02f4700a63a4faa05e9d3a1bac9b2c221ba539115d50698577ab5c0daaf
                        • Instruction ID: 9d6c81601a530ea3d46fa80f593390f2793d206afa2821f0fb758a740cbd716c
                        • Opcode Fuzzy Hash: 89fbf02f4700a63a4faa05e9d3a1bac9b2c221ba539115d50698577ab5c0daaf
                        • Instruction Fuzzy Hash: 440184B2900118FFEB21EB90DC81EEB7B6CFB1834DF00407BB545A20A1DB745E8596A8
                        APIs
                        • __getptd.LIBCMT ref: 004155D0
                          • Part of subcall function 00412C1B: __getptd_noexit.LIBCMT ref: 00412C1E
                          • Part of subcall function 00412C1B: __amsg_exit.LIBCMT ref: 00412C2B
                        • __getptd.LIBCMT ref: 004155E7
                        • __amsg_exit.LIBCMT ref: 004155F5
                        • __lock.LIBCMT ref: 00415605
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                        • String ID: p,B
                        • API String ID: 3521780317-173275728
                        • Opcode ID: 29dd96af6df33596283f41a396b1db3031160135b2a9860d60d90c5f7b068dd9
                        • Instruction ID: 95c246e00262fb95b7df246ef96c53d8821a6ab59442334282e877b7616aa3a0
                        • Opcode Fuzzy Hash: 29dd96af6df33596283f41a396b1db3031160135b2a9860d60d90c5f7b068dd9
                        • Instruction Fuzzy Hash: 37F06231A41B00EFD730AB6699067DD7391AF80714F50051FA145972D2DBBC99C2CA9D
                        APIs
                        • __getptd.LIBCMT ref: 00411D55
                          • Part of subcall function 00412C1B: __getptd_noexit.LIBCMT ref: 00412C1E
                          • Part of subcall function 00412C1B: __amsg_exit.LIBCMT ref: 00412C2B
                        • __getptd.LIBCMT ref: 00411D66
                        • __getptd.LIBCMT ref: 00411D74
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: MOC$csm
                        • API String ID: 803148776-1389381023
                        • Opcode ID: 4b58c62c1d8fda6bcbdeba30c0dd6a49c2d2ef8e3760677edea50f4faeb14c8f
                        • Instruction ID: 6056bf204653a677408a928a1936b5c202879f68da0b333c12717c7dcb3bf699
                        • Opcode Fuzzy Hash: 4b58c62c1d8fda6bcbdeba30c0dd6a49c2d2ef8e3760677edea50f4faeb14c8f
                        • Instruction Fuzzy Hash: 8BE0BF35510204CFD720ABA5D546BE93794FB45318F1501A7E60CCB363E77CE9E099DA
                        APIs
                        • _wcslen.LIBCMT ref: 0040C23B
                        • _wcslen.LIBCMT ref: 0040C24C
                        • _wcslen.LIBCMT ref: 0040C25C
                        • _wcslen.LIBCMT ref: 0040C26A
                        • CompareStringW.KERNEL32(00000400,00001001,?,?,00000000,?,?,00000000,?,004060B0,__rar_,00000000,00000006,00000000,?,?), ref: 0040C287
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcslen$CompareString
                        • String ID:
                        • API String ID: 3397213944-0
                        • Opcode ID: 539581ce91066caaaca0d544010f77869ea598773d5288c481892fc531839a60
                        • Instruction ID: 607b75a1f3f3c6e258f929f79a2d6300dec3fd3149b6c909b49876d1ef7a763d
                        • Opcode Fuzzy Hash: 539581ce91066caaaca0d544010f77869ea598773d5288c481892fc531839a60
                        • Instruction Fuzzy Hash: 7AF0BB32548014FFDF126FE1EC45D9E3F15EB817B4B20857BF519AA0A0C53584529798
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _malloc
                        • String ID: fC$Insidious_protected.exe
                        • API String ID: 1579825452-1298666182
                        • Opcode ID: 2d0abdb4fce345bae843cf5941826d3438d829beba0f7c4426954832abc3cf27
                        • Instruction ID: a36d7d607162a0f1ac2de4b5e50e4bc22442abd742dc3b5072d2206784ee4736
                        • Opcode Fuzzy Hash: 2d0abdb4fce345bae843cf5941826d3438d829beba0f7c4426954832abc3cf27
                        • Instruction Fuzzy Hash: 3D412D39900246DFCB20EF65AC819AA3774F746314F0005BFE551B71E1D3B96949DB9C
                        APIs
                        • EndDialog.USER32(?,00000001), ref: 0040884B
                        • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00408863
                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00408891
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ItemText$Dialog
                        • String ID: GETPASSWORD1
                        • API String ID: 1770891597-3292211884
                        • Opcode ID: 799c69e105170c3fb5b4e90e0aae874d53305eb056d4763fd4d4ae5c0a58be1a
                        • Instruction ID: 73cdba67f06312ee80ab74cbbbb36010cb2cee92803c7d703ba7a547cc1c2f53
                        • Opcode Fuzzy Hash: 799c69e105170c3fb5b4e90e0aae874d53305eb056d4763fd4d4ae5c0a58be1a
                        • Instruction Fuzzy Hash: D511CE33800028BACB217F519D08EFB3B6CEF49754F44843ABA8AB60D0CA7C8951D669
                        APIs
                          • Part of subcall function 00408E28: _wcscpy.LIBCMT ref: 00408E2D
                        • RegOpenKeyExW.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000001,?,?), ref: 00408F2A
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00408F57
                        • RegCloseKey.ADVAPI32(?), ref: 00408F90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue_wcscpy
                        • String ID: Software\WinRAR SFX
                        • API String ID: 2005349754-754673328
                        • Opcode ID: f25b39ebea6cba1bd61767499e529a676a6983342539e87ca3057c545d8fdf4d
                        • Instruction ID: 1e3823624aa98c73168fa2599348f8c22fa06b2db68c987b128ea3124faf909c
                        • Opcode Fuzzy Hash: f25b39ebea6cba1bd61767499e529a676a6983342539e87ca3057c545d8fdf4d
                        • Instruction Fuzzy Hash: 08113A75900209FAEF11DB90CD44BDE7B79EB18349F1081B6B944E2190DB789A84DB68
                        APIs
                        • SHGetMalloc.SHELL32(?), ref: 0040100D
                        • SHBrowseForFolderW.SHELL32(?), ref: 00401048
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: BrowseFolderMalloc
                        • String ID: A
                        • API String ID: 3812826013-3554254475
                        • Opcode ID: 43d456faba1a16d42ee686c0e2e1898d705b11fb71b446694e5bb100d18f35d1
                        • Instruction ID: c41c84f9e104560aeda900d8f75b2e5b5d9dff3c1693a0b0b444806572ca8eb6
                        • Opcode Fuzzy Hash: 43d456faba1a16d42ee686c0e2e1898d705b11fb71b446694e5bb100d18f35d1
                        • Instruction Fuzzy Hash: 570169B2C00219AFCB00CFA4D808BEFBBF8AF49311F108466E801E7250D778DA459BA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID:
                        • String ID: RENAMEDLG$REPLACEFILEDLG
                        • API String ID: 0-56093855
                        • Opcode ID: aa5b23480ba91bb145cd7db82804d48210dab98c159b2bc7883062c3c888b338
                        • Instruction ID: 03722f6a65b70be9b5dbea0166f25c03f5e089c5643d78a510cf0ec615934ed9
                        • Opcode Fuzzy Hash: aa5b23480ba91bb145cd7db82804d48210dab98c159b2bc7883062c3c888b338
                        • Instruction Fuzzy Hash: 9201BC72604245AFC711CB24FC50E223BE9E798364F00493BF251E22A2C3369D05EB2A
                        APIs
                        • ___BuildCatchObject.LIBCMT ref: 004123AC
                          • Part of subcall function 00412307: ___BuildCatchObjectHelper.LIBCMT ref: 0041233D
                        • _UnwindNestedFrames.LIBCMT ref: 004123C3
                        • ___FrameUnwindToState.LIBCMT ref: 004123D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                        • String ID: csm
                        • API String ID: 2163707966-1018135373
                        • Opcode ID: d68b1ec44d10367104d788be264f99a6cf02fb1826003edcdf12d24b5c3420e2
                        • Instruction ID: a27c7eadc4f1e79dcded4d35126c13205b26df4e2591622e015d9dc1736215d3
                        • Opcode Fuzzy Hash: d68b1ec44d10367104d788be264f99a6cf02fb1826003edcdf12d24b5c3420e2
                        • Instruction Fuzzy Hash: CD014B31000109BBDF126F61CD45EEB7F6AEF08344F008016FD2854161D77AD9B1DBA8
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00407F75
                        • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00407F84
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: FindHandleModuleResource
                        • String ID: LTR$RTL
                        • API String ID: 3537982541-719208805
                        • Opcode ID: e81dc6c232fbf25c9f4303eaecd6c32cf878fa6ade90f3459c38fdb627002fe4
                        • Instruction ID: 2a42f86a24c64e65aa1e3a83fcec0674efe4904a9426f6b454c042fab85e2dd5
                        • Opcode Fuzzy Hash: e81dc6c232fbf25c9f4303eaecd6c32cf878fa6ade90f3459c38fdb627002fe4
                        • Instruction Fuzzy Hash: F3F024B1B4422026DB1066755C0AFF73F6CAB41314F04047AB605E30C0CFA8A489C7ED
                        APIs
                        • GetModuleHandleA.KERNEL32(KERNEL32,004109FF), ref: 00416792
                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004167A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: IsProcessorFeaturePresent$KERNEL32
                        • API String ID: 1646373207-3105848591
                        • Opcode ID: 519f102c3e8b7196681c4ca824b0bd4c509e96051e09164f47707db8e903fa96
                        • Instruction ID: f88f7e4e6e8b32d4c2468356532679ad6ebd5312a7c460b54ee1ba46f9e40001
                        • Opcode Fuzzy Hash: 519f102c3e8b7196681c4ca824b0bd4c509e96051e09164f47707db8e903fa96
                        • Instruction Fuzzy Hash: 0EF03030A00A09E2EF005BA5BD4E6EF7B78BB80746FD205A1E9E5A00C4DF34C0B1924A
                        APIs
                        • LoadCursorW.USER32(00000000,00007F00), ref: 0040CFF7
                        • RegisterClassExW.USER32(00000030), ref: 0040D018
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ClassCursorLoadRegister
                        • String ID: 0$RarHtmlClassName
                        • API String ID: 1693014935-3342523147
                        • Opcode ID: 8b9452714b5488d1718bcfb2fb259f6f1dd695b1296e806264c14c88e0fa96b2
                        • Instruction ID: d3b5dd53cca1e837a88324ff0f9d330da1fec9034eb220009d887778b38f9281
                        • Opcode Fuzzy Hash: 8b9452714b5488d1718bcfb2fb259f6f1dd695b1296e806264c14c88e0fa96b2
                        • Instruction Fuzzy Hash: AAF019B1C00228ABCB009F99D9449EEFFF8FF99344F10805BE510B7250C7B816058F98
                        APIs
                        • ___addlocaleref.LIBCMT ref: 00415598
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(00000000), ref: 00415470
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 0041547D
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 0041548A
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 00415497
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 004154A4
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 004154C0
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 004154D0
                          • Part of subcall function 0041545E: InterlockedIncrement.KERNEL32(?), ref: 004154E6
                        • ___removelocaleref.LIBCMT ref: 004155A3
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(00000000), ref: 00415507
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 00415514
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 00415521
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 0041552E
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 0041553B
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 00415557
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 00415567
                          • Part of subcall function 004154ED: InterlockedDecrement.KERNEL32(?), ref: 0041557D
                        • ___freetlocinfo.LIBCMT ref: 004155B7
                          • Part of subcall function 00415315: ___free_lconv_mon.LIBCMT ref: 0041535B
                          • Part of subcall function 00415315: ___free_lconv_num.LIBCMT ref: 0041537C
                          • Part of subcall function 00415315: ___free_lc_time.LIBCMT ref: 00415401
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                        • String ID: p,B
                        • API String ID: 467427115-173275728
                        • Opcode ID: 759f551d1a4c2ea3aed142a453e0d614c178826bafaa905dffe4e4cd66ad8b62
                        • Instruction ID: 2d05972105efa1d506076b3b3ace647e384ff1ec923bc9120237b0665417a835
                        • Opcode Fuzzy Hash: 759f551d1a4c2ea3aed142a453e0d614c178826bafaa905dffe4e4cd66ad8b62
                        • Instruction Fuzzy Hash: 55E04F32602D21E68A31272D64447EBB2AB4FC2725B69009BFC54A7348EB6C4DC145EE
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32,0040B0DF,00000001), ref: 0040B652
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040B662
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: SetDllDirectoryW$kernel32
                        • API String ID: 1646373207-2052158636
                        • Opcode ID: ead768bed559d47730ba08b141db8175194db865805386a8b7e48161c40d41ab
                        • Instruction ID: 11b57a1e6f903894a535b1ee7787f3a2085fc8107e344f4ab8ebdaeb3d917108
                        • Opcode Fuzzy Hash: ead768bed559d47730ba08b141db8175194db865805386a8b7e48161c40d41ab
                        • Instruction Fuzzy Hash: C2D0A7F0F48210A1871C1B754D1AFA72E5C9850B05B05C53E7543E00C0CF3DD000913D
                        APIs
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 00403A3C
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800), ref: 00403A73
                        • SetFileTime.KERNEL32(?,00000000,00000000,00000000), ref: 00403AE4
                        • CloseHandle.KERNEL32(?), ref: 00403AED
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: File$Create$CloseHandleTime
                        • String ID:
                        • API String ID: 2287278272-0
                        • Opcode ID: 025e2fad24d050583f83027e22d45dc57d438ba40617a9cdeb9aa5b6350c5993
                        • Instruction ID: d1bc4cc0439291590de603c86e4b2619751da04a80a91ae89b421731e8af74cd
                        • Opcode Fuzzy Hash: 025e2fad24d050583f83027e22d45dc57d438ba40617a9cdeb9aa5b6350c5993
                        • Instruction Fuzzy Hash: 1D418B71900188BEDF11DFA8C846BEE7FB8AB01308F1480A6F441B72D1C6B99B45CB54
                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00418708
                        • __isleadbyte_l.LIBCMT ref: 0041873C
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,0040DE07,?,00000000,00000000,?,?,?,?,0040DE07,00000000,?), ref: 0041876D
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,0040DE07,00000001,00000000,00000000,?,?,?,?,0040DE07,00000000,?), ref: 004187DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: 713a4c16d6bb2382d018e53f9b057f78d003fcf8b439cd40719d0ca2c7632cf8
                        • Instruction ID: ddd861560c12cdd08227d47635af48774f3fff62cc1b149f01918cdd923001ca
                        • Opcode Fuzzy Hash: 713a4c16d6bb2382d018e53f9b057f78d003fcf8b439cd40719d0ca2c7632cf8
                        • Instruction Fuzzy Hash: 7E31A031A00296EFDB20DFA4CC949EA7BA5BF01310F28856EE4658B2D1DB34DDC1DB59
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction ID: eac2e277536dc58d0532413fd044bdbb95bdd1e897bec5266c4c4f58b8e9b867
                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction Fuzzy Hash: 0611437244014DBBCF125F85DD11CEE3F26BB18354B5A8416FA1855131D33AC9B1AB89
                        APIs
                          • Part of subcall function 0040822F: LoadStringW.USER32(?,?,00000200), ref: 00408280
                          • Part of subcall function 0040822F: LoadStringW.USER32(?,?,00000200), ref: 00408292
                        • _swprintf.LIBCMT ref: 0040BFC4
                          • Part of subcall function 0040BEA8: __vswprintf_c_l.LIBCMT ref: 0040BEBB
                        • GetLastError.KERNEL32 ref: 0040BFCC
                        • MessageBoxW.USER32(?,00000000,00000096,00000035), ref: 0040BFEE
                        • SetLastError.KERNEL32(00000000), ref: 0040BFFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ErrorLastLoadString$Message__vswprintf_c_l_swprintf
                        • String ID:
                        • API String ID: 2205000856-0
                        • Opcode ID: 2e760ad1ade77472cfb4a9022eb0087d3d0242b9fa8d582bd199bd99dd893702
                        • Instruction ID: 63b2ddbfb60464817982f3c7a36ad13ddddf7d358c9cd809b5521c8761fdd01d
                        • Opcode Fuzzy Hash: 2e760ad1ade77472cfb4a9022eb0087d3d0242b9fa8d582bd199bd99dd893702
                        • Instruction Fuzzy Hash: 08F0F6728402147BFB1137A09C09FCA375DEB15785F0485BAF101F60D2DA79991487AC
                        APIs
                        • _malloc.LIBCMT ref: 0040E7D2
                          • Part of subcall function 0040E86C: __FF_MSGBANNER.LIBCMT ref: 0040E88F
                          • Part of subcall function 0040E86C: __NMSG_WRITE.LIBCMT ref: 0040E896
                          • Part of subcall function 0040E86C: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00414AC1,00000000,00000001,00000000,?,00410F2A,00000018,0041FF98,0000000C,00410FBB), ref: 0040E8E3
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 0040E7F5
                          • Part of subcall function 0040E74E: std::exception::exception.LIBCMT ref: 0040E75A
                        • std::bad_exception::bad_exception.LIBCMT ref: 0040E809
                        • __CxxThrowException@8.LIBCMT ref: 0040E817
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                        • String ID:
                        • API String ID: 1411284514-0
                        • Opcode ID: db4f9b2fe98251016b46d03ed5f4942ae793f5572c6da704c7c7c39c6a323678
                        • Instruction ID: ab6203a9b9cc4c520743700927e9e448a9101c470a3ba205c8bfa1776ff42f78
                        • Opcode Fuzzy Hash: db4f9b2fe98251016b46d03ed5f4942ae793f5572c6da704c7c7c39c6a323678
                        • Instruction Fuzzy Hash: 0AF0E93650020862CB047367EC469CD37595F4171CF10487FF801B70E2DBBDC9A5819C
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: __rar_
                        • API String ID: 176396367-2561138058
                        • Opcode ID: 26885f8111a958a2295528ec8be133bd63c65ad80cca18e922472fe3dd06af13
                        • Instruction ID: cd931b21f47bd20171016537d801d272d519882461015641af4f3dcaa0053db5
                        • Opcode Fuzzy Hash: 26885f8111a958a2295528ec8be133bd63c65ad80cca18e922472fe3dd06af13
                        • Instruction Fuzzy Hash: A941C67290020AA6DF31AE658C85BEF736EEF05344F05047BF90AB71D2D63CD9618E68
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __calloc_crt
                        • String ID: p$B
                        • API String ID: 3494438863-3263852632
                        • Opcode ID: 3a0d020bfdd9790be4edac3b1b198965e852a69fa72c3af589b93cd209366f88
                        • Instruction ID: e78719ac8d6ef2faabb98cff803f6894448fb62028e17bb26b56bcf7541f357e
                        • Opcode Fuzzy Hash: 3a0d020bfdd9790be4edac3b1b198965e852a69fa72c3af589b93cd209366f88
                        • Instruction Fuzzy Hash: AC11A37230422167E7188F5DBC496E63392EBE5778B24453BF501CA2A1E7B8D8C2424C
                        APIs
                        • _realloc.LIBCMT ref: 00401D59
                          • Part of subcall function 004016AC: __vswprintf_c_l.LIBCMT ref: 004016CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __vswprintf_c_l_realloc
                        • String ID: Maximum allowed array size (%u) is exceeded$%C
                        • API String ID: 620378156-2594976075
                        • Opcode ID: 1e2a4be008ed3a221e42ae4629ac0cb962fef8b2d3a648e886dbe557779bb2c0
                        • Instruction ID: 3004f64bfeedd2c29eec414f66f2c2405c979449de4cdcbf1f061af0dd6d1d81
                        • Opcode Fuzzy Hash: 1e2a4be008ed3a221e42ae4629ac0cb962fef8b2d3a648e886dbe557779bb2c0
                        • Instruction Fuzzy Hash: 08018F757007055FD724AA25D89192BB3D9EF94764310883FE8ABD7BA1EA39FC408B18
                        APIs
                        • _realloc.LIBCMT ref: 00401DD1
                          • Part of subcall function 004016AC: __vswprintf_c_l.LIBCMT ref: 004016CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __vswprintf_c_l_realloc
                        • String ID: Maximum allowed array size (%u) is exceeded$%C
                        • API String ID: 620378156-2594976075
                        • Opcode ID: 0172bb0524d6d22ee9917ae7f630e9c925bdc60b30563aaa5a17e82c52c51dc6
                        • Instruction ID: becdddb7c3dc998086456df239d419f33f41eeb6a4f22340bec8688a37d00e71
                        • Opcode Fuzzy Hash: 0172bb0524d6d22ee9917ae7f630e9c925bdc60b30563aaa5a17e82c52c51dc6
                        • Instruction Fuzzy Hash: D801DF766002019FD364EA16D88086BB3D9EF84368314483FE8ABD37A1DA39BC008718
                        APIs
                        • _realloc.LIBCMT ref: 0040B54F
                          • Part of subcall function 004016AC: __vswprintf_c_l.LIBCMT ref: 004016CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __vswprintf_c_l_realloc
                        • String ID: Maximum allowed array size (%u) is exceeded$%C
                        • API String ID: 620378156-2594976075
                        • Opcode ID: 84903f8afe92d4e2614d2e25a462d932c3ec79fa0ef674f4b6e5b1f538ddc8cf
                        • Instruction ID: 5f31f37f7a9b00ca2a7b1e6a46ce8f5bd87afa17cc96febe5d9d63b72bf6627b
                        • Opcode Fuzzy Hash: 84903f8afe92d4e2614d2e25a462d932c3ec79fa0ef674f4b6e5b1f538ddc8cf
                        • Instruction Fuzzy Hash: DC01B1726007016FD320AA16D88192BB3D9EB90768310483FE89B93791EB39EC408758
                        APIs
                        • __EH_prolog.LIBCMT ref: 0040C37E
                        • _memset.LIBCMT ref: 0040C39A
                          • Part of subcall function 0040D81B: __lock.LIBCMT ref: 0040D839
                          • Part of subcall function 0040D81B: ___sbh_find_block.LIBCMT ref: 0040D844
                          • Part of subcall function 0040D81B: ___sbh_free_block.LIBCMT ref: 0040D853
                          • Part of subcall function 0040D81B: RtlFreeHeap.NTDLL(00000000,00000000,0041FE80,0000000C,00410F81,00000000,0041FF98,0000000C,00410FBB,00000000,004108DE,?,00419065,00000004,00420350,0000000C), ref: 0040D883
                          • Part of subcall function 0040D81B: GetLastError.KERNEL32(?,00419065,00000004,00420350,0000000C,00414B0B,00000000,004108ED,00000000,00000000,00000000,?,00412BCD,00000001,00000214), ref: 0040D894
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: ErrorFreeH_prologHeapLast___sbh_find_block___sbh_free_block__lock_memset
                        • String ID: %C
                        • API String ID: 3064684680-3809956945
                        • Opcode ID: 510e421064b7e4003c24847bc48205bc0f4d6669853a2b46a2af3257ad3b3a5c
                        • Instruction ID: 1c6e065f90d983e799cb579f3836dd42247f76c0780d385ea6e45e5d12d2f52e
                        • Opcode Fuzzy Hash: 510e421064b7e4003c24847bc48205bc0f4d6669853a2b46a2af3257ad3b3a5c
                        • Instruction Fuzzy Hash: D5F0C8B6A54214EBD710ABEAACC26AE7358DB09708B10853FF501F72C1C6BC5C05435D
                        APIs
                          • Part of subcall function 0040DBDD: __getptd.LIBCMT ref: 0040DBE3
                          • Part of subcall function 0040DBDD: __getptd.LIBCMT ref: 0040DBF3
                        • __getptd.LIBCMT ref: 00412121
                          • Part of subcall function 00412C1B: __getptd_noexit.LIBCMT ref: 00412C1E
                          • Part of subcall function 00412C1B: __amsg_exit.LIBCMT ref: 00412C2B
                        • __getptd.LIBCMT ref: 0041212F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: csm
                        • API String ID: 803148776-1018135373
                        • Opcode ID: ff5b31ade68d11468cf0f9f1e6f326bdfbde0329a3dab75420affff8dc8860ab
                        • Instruction ID: a39780ffd4bb4e9c8a9937c906020b6ccab40e469c0a20b319ade9ea681f6d79
                        • Opcode Fuzzy Hash: ff5b31ade68d11468cf0f9f1e6f326bdfbde0329a3dab75420affff8dc8860ab
                        • Instruction Fuzzy Hash: 2E012C38800306ABCF38DF61C584AEEB3B5AF10315F14442FE541A6791DBB89DF6CA49
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _swprintf
                        • String ID: z%s%02d$z%s%d
                        • API String ID: 589789837-468824935
                        • Opcode ID: 07c5751eed2a425caa22dca4b6361295ce6f1b4f79da5b9c65b78c54df0ef5fc
                        • Instruction ID: 9fa279cf70ced8ffd914f957093f6b0eb21a2488377ecf0576c634874b3def54
                        • Opcode Fuzzy Hash: 07c5751eed2a425caa22dca4b6361295ce6f1b4f79da5b9c65b78c54df0ef5fc
                        • Instruction Fuzzy Hash: ABF017B19001187ADA045A05C946DEE366DDB1435CF40503AFD01AA2A2E778ADA242AD
                        APIs
                        Strings
                        • Insidious_protected.exe, xrefs: 0040B58A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1662027189.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1662014039.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662043657.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662061199.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1662163434.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_nyen2eabmfb.jbxd
                        Similarity
                        • API ID: _wcscpy_wcslen
                        • String ID: Insidious_protected.exe
                        • API String ID: 2972469078-4103763255
                        • Opcode ID: 29344488206824d5a7d64f7186423211e9ff5efc9a7111d5fce438a9cd72ce10
                        • Instruction ID: b1a2016403ef4d6dd5fef6bfb4a21e9a60382232af0f71637cedbae0cb1edb28
                        • Opcode Fuzzy Hash: 29344488206824d5a7d64f7186423211e9ff5efc9a7111d5fce438a9cd72ce10
                        • Instruction Fuzzy Hash: BCE048B26043116FD224969AD8C1C5BB7DCDF58769310483FF64597542CB34EC0547AC

                        Execution Graph

                        Execution Coverage:10.5%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:2
                        Total number of Limit Nodes:0
                        execution_graph 23596 b01598 23597 b015a5 VirtualAlloc 23596->23597

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 152 3132ba8-3132bb4 153 3132bb6-3132bd2 152->153 154 3132b6b-3132b8e 152->154 156 3132bd4 153->156 157 3132bd9-3132c29 153->157 158 3132b90 154->158 159 3132b95 call 3132ba8 154->159 156->157 164 3132c37-3132c4c 157->164 165 3132c2b-3132c35 157->165 158->159 161 3132b9b-3132ba0 159->161 173 3132c4f call 3133710 164->173 174 3132c4f call 3133139 164->174 175 3132c4f call 3133539 164->175 176 3132c4f call 313351f 164->176 177 3132c4f call 313371e 164->177 178 3132c4f call 313351d 164->178 179 3132c4f call 31334c3 164->179 180 3132c4f call 3133707 164->180 181 3132c4f call 3133705 164->181 182 3132c4f call 31336ab 164->182 183 3132c4f call 3133148 164->183 184 3132c4f call 3133528 164->184 185 3132c4f call 313372c 164->185 168 3132ca4-3132cba 165->168 167 3132c55-3132c6a 186 3132c6d call 3133710 167->186 187 3132c6d call 3133139 167->187 188 3132c6d call 3133539 167->188 189 3132c6d call 313351f 167->189 190 3132c6d call 313371e 167->190 191 3132c6d call 313351d 167->191 192 3132c6d call 31334c3 167->192 193 3132c6d call 3133707 167->193 194 3132c6d call 3133705 167->194 195 3132c6d call 31336ab 167->195 196 3132c6d call 3133148 167->196 197 3132c6d call 3133528 167->197 198 3132c6d call 313372c 167->198 170 3132c73-3132c99 200 3132c9c call 31334c3 170->200 201 3132c9c call 3133710 170->201 202 3132c9c call 3133707 170->202 203 3132c9c call 3133705 170->203 204 3132c9c call 3133139 170->204 205 3132c9c call 3133539 170->205 206 3132c9c call 3133148 170->206 207 3132c9c call 3133528 170->207 208 3132c9c call 313371e 170->208 209 3132c9c call 313372c 170->209 172 3132ca2-3132ca3 172->168 173->167 174->167 175->167 176->167 177->167 178->167 179->167 180->167 181->167 182->167 183->167 184->167 185->167 186->170 187->170 188->170 189->170 190->170 191->170 192->170 193->170 194->170 195->170 196->170 197->170 198->170 200->172 201->172 202->172 203->172 204->172 205->172 206->172 207->172 208->172 209->172
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID: `S
                        • API String ID: 0-3154622632
                        • Opcode ID: e5c8b6f3bd028244adf279694462237ba9db7af78ae57475b67b2205d662d455
                        • Instruction ID: 57d2cc0623139e240ed3f43e5e63001217fdb95d0546a327a77841cbdfd99356
                        • Opcode Fuzzy Hash: e5c8b6f3bd028244adf279694462237ba9db7af78ae57475b67b2205d662d455
                        • Instruction Fuzzy Hash: 2431AC38E44249DFCB14DFA9E944BEEBBBAFB8E301F144959E404A3260C7354D46CB65
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 52c400f9311035112db958346a9f34f1abd7c255c8d5bc226d78647dd2ee846f
                        • Instruction ID: 4b4ded21e165b68eebb87535a934e6715f10eb475882872bef001627cd6397ac
                        • Opcode Fuzzy Hash: 52c400f9311035112db958346a9f34f1abd7c255c8d5bc226d78647dd2ee846f
                        • Instruction Fuzzy Hash: EB92A174E012198FDB64CF69C984BDDFBB2BB49300F1482A5E508AB355DB70AE85CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 856 313a0d0-313a0dc 857 313a136-313a1cb 856->857 858 313a0de-313a101 856->858 863 313a1d3-313a23b 857->863 864 313a1cd-313a1ce 857->864 859 313a103 858->859 860 313a108-313a133 858->860 859->860 860->857 870 313a2e6-313a2ef 863->870 865 313a515-313a51c 864->865 871 313a240-313a249 870->871 872 313a2f5-313a305 870->872 873 313a250-313a2b1 call 3130414 871->873 874 313a24b 871->874 875 313a4d8-313a4e4 872->875 889 313a2b3-313a2e1 873->889 890 313a2e2-313a2e3 873->890 874->873 876 313a30a-313a316 875->876 877 313a4ea-313a4ec 875->877 879 313a318 876->879 880 313a31d-313a3ba call 31303c4 call 31303d4 876->880 877->865 879->880 896 313a3c2-313a3c4 880->896 897 313a3bc 880->897 889->890 890->870 900 313a3cb-313a3d2 896->900 898 313a3c6 897->898 899 313a3be-313a3c0 897->899 898->900 899->896 899->898 901 313a3d4-313a3d5 900->901 902 313a3da-313a3f4 900->902 903 313a4d5 901->903 905 313a416-313a418 902->905 906 313a3f6-313a414 902->906 903->875 907 313a41b-313a426 905->907 906->907 909 313a449-313a463 907->909 910 313a428-313a444 call 3134de4 907->910 914 313a4a0 909->914 915 313a465-313a47f 909->915 910->903 916 313a4a7-313a4b2 914->916 915->914 920 313a481-313a49e 915->920 917 313a4b4-313a4cd call 3134de4 916->917 918 313a4ce-313a4d4 916->918 917->918 918->903 920->916
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79912c1e03d9056e28157481eebbab9631f59d5d0a4e8c7e2ae74588c6b7b019
                        • Instruction ID: eeb83974ffae87f85d90eb8ccc29d67d934bc30def57cbc6a4dfaeaded794620
                        • Opcode Fuzzy Hash: 79912c1e03d9056e28157481eebbab9631f59d5d0a4e8c7e2ae74588c6b7b019
                        • Instruction Fuzzy Hash: A3D1D374E00218CFDB28CFAAD984B9DFBB2BF89304F1491A9D449AB355DB349981CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 924 5e20040-5e20068 925 5e2006a 924->925 926 5e2006f-5e20105 924->926 925->926 976 5e20108 call 31380b8 926->976 977 5e20108 call 31380c8 926->977 929 5e2010d-5e2012d 930 5e2013b call 5e20470 929->930 931 5e2012f-5e20136 929->931 933 5e20141-5e20161 930->933 932 5e20459-5e20462 931->932 934 5e20163-5e2016a 933->934 935 5e2016f-5e20198 933->935 934->932 937 5e201a6-5e20295 935->937 938 5e2019a-5e201a1 935->938 949 5e20442-5e20457 937->949 950 5e2029b-5e202b9 937->950 938->932 949->932 953 5e202c7-5e202d4 950->953 954 5e202bb-5e202c6 950->954 955 5e2042b-5e20434 953->955 954->953 957 5e2043a-5e20441 955->957 958 5e202d9-5e202e2 955->958 957->949 959 5e202e4 958->959 960 5e202e9-5e203a5 958->960 959->960 968 5e20427-5e20428 960->968 969 5e203ab-5e20426 960->969 968->955 969->968 976->929 977->929
                        Memory Dump Source
                        • Source File: 00000001.00000002.1862642816.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_5e20000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 38a3583cc2ed8e9995a4ca377b520120cb2a147b4f5a0347e06876b574d2a70b
                        • Instruction ID: 2c0f6679f97068533083d3d52ab9d2efce04eae12bb6ae273a1d85d90db62893
                        • Opcode Fuzzy Hash: 38a3583cc2ed8e9995a4ca377b520120cb2a147b4f5a0347e06876b574d2a70b
                        • Instruction Fuzzy Hash: 2BD1BF74E00228CFDB14DFA6D988B9DBBF2FF89305F1091AAD409A7255EB745A85CF40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 979 3135330-3135368 980 313536a 979->980 981 313536f-31353e2 979->981 980->981 983 31353f3-3135402 981->983 984 31353e4 981->984 985 3135783-313578c 983->985 986 31353ec-31353f2 984->986 987 3135792-3135799 985->987 988 3135407-3135410 985->988 986->983 989 3135412 988->989 990 3135417-313543d 988->990 989->990 992 313545f-3135473 990->992 993 313543f-313545d 990->993 996 3135476-313548c 992->996 993->996 998 3135492-31354ab 996->998 999 313577f-3135780 996->999 1001 3135770-3135779 998->1001 999->985 1001->999 1002 31354b0-31354b9 1001->1002 1003 31354c0-3135529 1002->1003 1004 31354bb 1002->1004 1034 313552f call 3135900 1003->1034 1035 313552f call 31358f0 1003->1035 1004->1003 1009 3135535-3135558 1036 313555e call 3135cd0 1009->1036 1037 313555e call 3135cc7 1009->1037 1011 3135564-31355b6 1038 31355bc call 3136318 1011->1038 1039 31355bc call 3136328 1011->1039 1015 31355c2-3135623 1040 3135629 call 3136e00 1015->1040 1041 3135629 call 3136df0 1015->1041 1019 313562f-3135690 1032 3135696 call 3137370 1019->1032 1033 3135696 call 31373a0 1019->1033 1023 313569c-313576d 1023->1001 1032->1023 1033->1023 1034->1009 1035->1009 1036->1011 1037->1011 1038->1015 1039->1015 1040->1019 1041->1019
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 22d342c4efaa2ea4435136fc9d355e61b20005c2dfa914394b9a0ccf46f2a020
                        • Instruction ID: 81c6157163fe0f3a7a611b959817023bcecd2a39f900b2c417c8371224fdc775
                        • Opcode Fuzzy Hash: 22d342c4efaa2ea4435136fc9d355e61b20005c2dfa914394b9a0ccf46f2a020
                        • Instruction Fuzzy Hash: 3CE18278E002198FDB54DFA9D994B9EBBB2FF89300F1091AAD819A7354DB305E85CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1112 313ea81-313eab8 1113 313eaba 1112->1113 1114 313eabf-313eb36 1112->1114 1113->1114 1117 313eb38-313eb39 1114->1117 1118 313eb3e-313eb79 1114->1118 1119 313ee11-313ee18 1117->1119 1123 313ee02-313ee0b 1118->1123 1123->1119 1124 313eb7e-313eb87 1123->1124 1125 313eb89 1124->1125 1126 313eb8e-313ebbd 1124->1126 1125->1126 1129 313ebc3-313ebd5 1126->1129 1130 313edfe-313edff 1126->1130 1164 313ebd8 call 313ee30 1129->1164 1165 313ebd8 call 313ee1f 1129->1165 1130->1123 1132 313ebde-313ebf8 1162 313ebfb call 313f0c9 1132->1162 1163 313ebfb call 313f0d8 1132->1163 1134 313ec01-313ec53 call 3135cd0 1139 313ec58-313edfd call 3135f58 call 3136e00 call 3137720 call 31379b8 call 31370a0 call 31373a0 call 3137428 1134->1139 1139->1130 1162->1134 1163->1134 1164->1132 1165->1132
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cbf160be354f12caf8132062360dc7319b60f908c7d92351908496ac125f971e
                        • Instruction ID: 194435202e65cd927d7562e9499e2ab0c8093c1eb32fe99574f99b87871a84f2
                        • Opcode Fuzzy Hash: cbf160be354f12caf8132062360dc7319b60f908c7d92351908496ac125f971e
                        • Instruction Fuzzy Hash: CEB18178E012198FDB54DFA9D990B9EBBB2FF89300F1091AAD409A7354DB306D86CF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1219 31399e8-3139a08 1220 3139a0a 1219->1220 1221 3139a0f-3139a91 1219->1221 1220->1221 1224 3139cab-3139cb4 1221->1224 1225 3139a96-3139a9f 1224->1225 1226 3139cba-3139d03 1224->1226 1227 3139aa1 1225->1227 1228 3139aa6-3139ac2 1225->1228 1227->1228 1233 3139aca-3139b29 call 3130414 1228->1233 1240 3139b31-3139b5d 1233->1240 1241 3139b2b-3139b2c 1233->1241 1245 3139c8e-3139c97 1240->1245 1242 3139ca8 1241->1242 1242->1224 1246 3139b62-3139b6b 1245->1246 1247 3139c9d-3139ca7 1245->1247 1248 3139b72-3139b91 1246->1248 1249 3139b6d 1246->1249 1247->1242 1252 3139b93-3139bb4 1248->1252 1253 3139bb6-3139bb8 1248->1253 1249->1248 1254 3139bbb-3139bc6 1252->1254 1253->1254 1256 3139bc8-3139bc9 1254->1256 1257 3139bce-3139c1c 1254->1257 1258 3139c8b 1256->1258 1262 3139c84-3139c8a 1257->1262 1263 3139c1e-3139c56 1257->1263 1258->1245 1262->1258 1265 3139c70-3139c83 1263->1265 1266 3139c58-3139c6a 1263->1266 1265->1262 1266->1265
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c5435891eb3be6058e0262c937b273bbc34e530b741ce321c3526c0dea78fae
                        • Instruction ID: b9c687ac64ba77997fb90d7e01a97946a7e78fb9927fdfe5924bc5dc3d6d1963
                        • Opcode Fuzzy Hash: 3c5435891eb3be6058e0262c937b273bbc34e530b741ce321c3526c0dea78fae
                        • Instruction Fuzzy Hash: D0A1C274E01218CFDB14DFAAC580A9DFBF2BF8A300F2491A9D409AB355DB349982CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9fda2b51551233f98a82dca2f446829425ba8da871ceea96434b3277a902e623
                        • Instruction ID: cf799ca6292a3b83a74f93df6bffcd6c7108bb7b74de449f13db3919fa58b080
                        • Opcode Fuzzy Hash: 9fda2b51551233f98a82dca2f446829425ba8da871ceea96434b3277a902e623
                        • Instruction Fuzzy Hash: E5817078E012188FDB54DFA9D980A9DBBF2FF89310F1491AAD809AB355DB306D42CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b3943b23cb12ad2d28268092ef8f938eafcccbd8972480d8df5905275657b3de
                        • Instruction ID: 204be2cc332162fe764556e3d05e5be0e2b04732070ad57074064e535369ba01
                        • Opcode Fuzzy Hash: b3943b23cb12ad2d28268092ef8f938eafcccbd8972480d8df5905275657b3de
                        • Instruction Fuzzy Hash: D651C078E01208DFDB14DFA9D580A9DBBB2FF89314F249169E409AB354DB35AC82CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1862642816.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_5e20000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: febeacf887524b889d598470024eadc25db6f56fdfa45eb35eabcfc46830606f
                        • Instruction ID: 61871ae4c7b5bb19a691b35fe7ee36793ad77a6300a1c0cd96d2b7fc618d5b8d
                        • Opcode Fuzzy Hash: febeacf887524b889d598470024eadc25db6f56fdfa45eb35eabcfc46830606f
                        • Instruction Fuzzy Hash: CB41C871D057588FEB19CFAAC94469DBFF2AF85304F18C0AAC448AB265E734194ACF41
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4c24ff55aca7319c124a794511985ca62c601e1323b70b7acc9971d923f7e10d
                        • Instruction ID: 41ba6f47ddd437123666a4a3d09abe36aebb653e3abee1b3d8e981fc31ac0a0b
                        • Opcode Fuzzy Hash: 4c24ff55aca7319c124a794511985ca62c601e1323b70b7acc9971d923f7e10d
                        • Instruction Fuzzy Hash: F6418978D80229CFCB68DF25C985BADBBB1BB49305F1089E9D41AA3240DB749EC1CF44

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 59 3130839-3130863 61 3130865 59->61 62 313086a 59->62 61->62 63 3130871-3130877 62->63 64 3130882 63->64 65 313088c-3130892 64->65 66 313089d 65->66 67 31308a7-31308fe 66->67 74 3130909 67->74 75 3130913-31309f8 74->75 90 31309fa 75->90 91 31309ff-3130a25 75->91 90->91 94 3130a30-3130a49 91->94 96 3130a54-3130abc 94->96 103 3130ac6-3130ac9 96->103 104 3130ad1-3130aed 103->104
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0oAp
                        • API String ID: 0-730047704
                        • Opcode ID: 75c70d713cb6dfc3008d5ec10d73afdccf4a7c16e89216f55f7ade4cac0d4b81
                        • Instruction ID: c529115eb2074f2512bd5253a0a034aa59027dd34356df99d3efcba5637696c6
                        • Opcode Fuzzy Hash: 75c70d713cb6dfc3008d5ec10d73afdccf4a7c16e89216f55f7ade4cac0d4b81
                        • Instruction Fuzzy Hash: 42710F38E4024A9FCB41DFA8EA80ADDBBB1FF84304F109565D405AB364DB34AD4ACB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 106 3130848-3130863 107 3130865 106->107 108 313086a-31309f8 106->108 107->108 136 31309fa 108->136 137 31309ff-3130ac9 108->137 136->137 150 3130ad1-3130aed 137->150
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0oAp
                        • API String ID: 0-730047704
                        • Opcode ID: ec478fad739e51dadf1ffd78d00cd14da3ce787d4bfe62db1304f475ca529064
                        • Instruction ID: 5ac94a44c68e53e90cf97ea7439b912d82c1ca3c429579e2fd4fd5f830170f8a
                        • Opcode Fuzzy Hash: ec478fad739e51dadf1ffd78d00cd14da3ce787d4bfe62db1304f475ca529064
                        • Instruction Fuzzy Hash: 6471F178E4024A9FCB45DFA8EA80ADDBBB1FF84304F109564D4056B364DB74AD4ACF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 b01598-b015a3 211 b015a5-b015aa 210->211 212 b015ac-b015af 210->212 213 b015b6-b015ca VirtualAlloc 211->213 212->213 214 b015b1 212->214 214->213
                        APIs
                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 00B015C3
                        Memory Dump Source
                        • Source File: 00000001.00000002.1858330946.0000000000AF5000.00000040.00000001.01000000.00000007.sdmp, Offset: 00994000, based on PE: true
                        • Associated: 00000001.00000002.1858330946.0000000000994000.00000040.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.1858330946.0000000000AD5000.00000040.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.1858330946.0000000000ADA000.00000040.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_940000_Insidious_protected.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 9a7affeb50e8566ad8b570fec52442baa61b95e95ac64b8f15db43b0b4a656a6
                        • Instruction ID: 7c999612f3dc51da98af89f3376a1069fa2566aa62b0aff37546c06dadc0657d
                        • Opcode Fuzzy Hash: 9a7affeb50e8566ad8b570fec52442baa61b95e95ac64b8f15db43b0b4a656a6
                        • Instruction Fuzzy Hash: 77E0ECB5700108ABDB14CE4CDD84B5A37DDE7A8710F108451F60ADB280C634EC109765
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 463d7add62b6de00539e7c6c30be7f2e0d59713ebd51936b9f5be52f717e0f3e
                        • Instruction ID: db1403caf8580ad9e5e14025c717ffe19fe6766e0ed3c86398543066c95ef786
                        • Opcode Fuzzy Hash: 463d7add62b6de00539e7c6c30be7f2e0d59713ebd51936b9f5be52f717e0f3e
                        • Instruction Fuzzy Hash: 52B2C374A052198FDB64CF58C984B9DFBB1BF49310F14C2A5E848AB356EB31AE80CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 654 3131468-3131490 655 3131492 654->655 656 3131497-31314c7 654->656 655->656 658 3132860-3132867 656->658 659 31314cd-3131504 call 3131074 656->659 664 313150a-313156c 659->664 665 313285f 659->665 669 31315be-313161d 664->669 670 313156e-31315b8 664->670 665->658 677 313166f-31316ce 669->677 678 313161f-3131669 669->678 670->669 685 3131720-313177f 677->685 686 31316d0-313171a 677->686 678->677 693 31317d1-3131830 685->693 694 3131781-31317cb 685->694 686->685 701 3131882-31318e1 693->701 702 3131832-313187c 693->702 694->693 709 3131933-313198a 701->709 710 31318e3-313192d 701->710 702->701 718 31319b3-31319cd 709->718 710->709 720 31319cf-31319f3 718->720 721 313198c-31319ab 718->721 725 31319b2 721->725 725->718
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e2b4902a113f2eac65f2467a89d1b1bf082fdefaaafd66b03b303f0c1957b2dc
                        • Instruction ID: 8d0550793717ea3c3ebd3a773646b49f68dc483c3fd72795bdce072236548bfa
                        • Opcode Fuzzy Hash: e2b4902a113f2eac65f2467a89d1b1bf082fdefaaafd66b03b303f0c1957b2dc
                        • Instruction Fuzzy Hash: 49E1CF74E012299FCB64EF28DA88B99B7B5FB89305F1045E9D80CA7350DB35AE85CF40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 799 313c30e-313c344 800 313c346 799->800 801 313c34b-313c3a4 799->801 800->801 802 313c40c-313c425 801->802 803 313c3a6-313c3b3 802->803 804 313c42b-313c43c 802->804 807 313c3b5 803->807 808 313c3ba-313c3fc 803->808 805 313c449-313c455 804->805 806 313c43e-313c444 804->806 810 313c457 805->810 811 313c45c-313c475 805->811 809 313c719-313c723 806->809 807->808 819 313c408-313c409 808->819 820 313c3fe-313c406 808->820 810->811 812 313c477 811->812 813 313c47c-313c4d7 811->813 812->813 822 313c4d9 813->822 823 313c4de-313c50c 813->823 819->802 820->804 822->823 825 313c692-313c6ab 823->825 826 313c511-313c51b 825->826 827 313c6b1-313c6bd 825->827 828 313c522-313c57c 826->828 829 313c51d 826->829 830 313c6c4-313c6f0 827->830 831 313c6bf 827->831 837 313c583-313c5ad 828->837 838 313c57e 828->838 829->828 854 313c6f3 call 313c738 830->854 855 313c6f3 call 313c728 830->855 831->830 834 313c6f9-313c704 834->809 840 313c604-313c60d 837->840 841 313c5af-313c5c7 837->841 838->837 844 313c614-313c647 840->844 845 313c60f 840->845 842 313c5c9 841->842 843 313c5ce-313c5fc 841->843 842->843 843->840 848 313c649-313c674 844->848 849 313c68e-313c68f 844->849 845->844 851 313c676 848->851 852 313c67b-313c68d 848->852 849->825 851->852 852->849 854->834 855->834
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9c248de7f46af249e86953bf8dabd637dcd1253dd5c1a0cb127132602ebd3b66
                        • Instruction ID: 38a79f0007f2cefafc7aca46a084a9fbd8dc0d445675e1bb0d81fda704d83bc0
                        • Opcode Fuzzy Hash: 9c248de7f46af249e86953bf8dabd637dcd1253dd5c1a0cb127132602ebd3b66
                        • Instruction Fuzzy Hash: E4D1F674E01218CFDB14DFA9C484A9DFBB2FF49304F2492A9E409AB355DB31A985CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 726 3131458-3131490 728 3131492 726->728 729 3131497-31314c7 726->729 728->729 731 3132860-3132867 729->731 732 31314cd 729->732 733 31314d4-31314dc call 3131074 732->733 735 31314e1-3131504 733->735 737 313150a-313150c 735->737 738 313285f 735->738 739 3131517-313156c 737->739 738->731 742 31315be-313161d 739->742 743 313156e-31315b8 739->743 750 313166f-31316ce 742->750 751 313161f-3131669 742->751 743->742 758 3131720-313177f 750->758 759 31316d0-313171a 750->759 751->750 766 31317d1-3131830 758->766 767 3131781-31317cb 758->767 759->758 774 3131882-31318e1 766->774 775 3131832-313187c 766->775 767->766 782 3131933-313198a 774->782 783 31318e3-313192d 774->783 775->774 791 31319b3-31319cd 782->791 783->782 793 31319cf-31319f3 791->793 794 313198c-313198f 791->794 796 3131999-31319ab 794->796 798 31319b2 796->798 798->791
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c593e9f90ca44a8b6d665f1ee94f7cb9a024720e63baf0ba3b0f53b774dd189f
                        • Instruction ID: 6dd7d80f40af44e98130094c7298af7cac634d19dad0753a634b4c0614956b91
                        • Opcode Fuzzy Hash: c593e9f90ca44a8b6d665f1ee94f7cb9a024720e63baf0ba3b0f53b774dd189f
                        • Instruction Fuzzy Hash: 53E1BF74E012299FCB65EF28CA98B99B7F5FB89305F1045E9D808A7350DB35AE85CF40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1042 3133148-3133174 1043 3133176 1042->1043 1044 313317b-313323b 1042->1044 1043->1044 1107 313323e call 3133d41 1044->1107 1108 313323e call 3133c60 1044->1108 1109 313323e call 3133df5 1044->1109 1110 313323e call 3133d8a 1044->1110 1111 313323e call 3133e4d 1044->1111 1050 3133244-3133257 1051 313373b-3133759 1050->1051 1053 313375f-3133772 1051->1053 1054 313325c-31332df 1051->1054 1063 31334d3 1054->1063 1064 31334df-31334e6 1063->1064 1065 31332e4-313335d 1064->1065 1066 31334ec-3133500 1064->1066 1075 3133366-31333fc call 31303c4 call 31303d4 1065->1075 1076 313335f-3133361 1065->1076 1067 3133502-3133509 1066->1067 1068 313350b-3133517 1067->1068 1069 3133518 1067->1069 1068->1069 1069->1051 1086 3133404-3133406 1075->1086 1087 31333fe 1075->1087 1076->1063 1090 313340d-3133414 1086->1090 1088 3133400-3133402 1087->1088 1089 3133408 1087->1089 1088->1086 1088->1089 1089->1090 1091 313341a-3133486 call 31303c4 call 31303d4 1090->1091 1092 31334bf-31334d2 1090->1092 1100 3133488 1091->1100 1101 313348f-3133491 1091->1101 1092->1063 1102 3133493 1100->1102 1103 313348a-313348d 1100->1103 1104 3133498-313349f 1101->1104 1102->1104 1103->1101 1103->1102 1105 31334a1-31334b6 1104->1105 1106 31334b8-31334be 1104->1106 1105->1067 1106->1092 1107->1050 1108->1050 1109->1050 1110->1050 1111->1050
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1ed41696fcb24ef5ad28a9c9517b81ac73f7afcf37c45733a0fa6548ed51f819
                        • Instruction ID: 89c07e409bea165ca5310dc4ddb3d23dc85fcc9e89b463ab1057cd075ee1fa5f
                        • Opcode Fuzzy Hash: 1ed41696fcb24ef5ad28a9c9517b81ac73f7afcf37c45733a0fa6548ed51f819
                        • Instruction Fuzzy Hash: 66C1D374E01228CFDB28DFA5D884B9DBBB2BF89304F1085A9D419B7250DB349E85CF54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1166 3139198-313919c 1167 313914e-3139168 call 3139198 1166->1167 1168 313919e-31391d3 1166->1168 1171 313916e-3139194 1167->1171 1169 31391d5 1168->1169 1170 31391da-313920f 1168->1170 1169->1170 1173 3139211-313921e 1170->1173 1174 3139220-3139226 1170->1174 1176 313922d-3139278 1173->1176 1174->1176 1181 31392a1-31392c3 1176->1181 1182 313927a-313929f 1176->1182 1185 31392c6-3139322 call 3134f78 1181->1185 1182->1185 1190 3139357-3139385 1185->1190 1191 3139324-3139355 1185->1191 1194 3139388-3139399 call 3134f78 1190->1194 1191->1194 1196 313939e-31393b2 1194->1196 1197 31393b4-31393bd 1196->1197 1198 31393bf-31393e3 call 3134f88 1196->1198 1199 3139403-3139416 1197->1199 1205 31393f0-31393fd 1198->1205 1206 31393e5-31393ee 1198->1206 1202 3139418-313941c 1199->1202 1203 313946d-3139490 1199->1203 1207 3139429-313944d call 3134f88 1202->1207 1208 313941e-3139427 1202->1208 1209 3139492-313949b 1203->1209 1210 313949c 1203->1210 1205->1199 1206->1199 1215 313945a-3139467 1207->1215 1216 313944f-3139458 1207->1216 1208->1203 1209->1210 1215->1203 1216->1203
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d5989c1157fbb069c58ec049652d854f1889f5b6f40a460786f4e82b3744f242
                        • Instruction ID: 7241545e324dabae7bf4fbbe1167a3bfb4ce81e5ce63f3a760b9dc10d7cde87a
                        • Opcode Fuzzy Hash: d5989c1157fbb069c58ec049652d854f1889f5b6f40a460786f4e82b3744f242
                        • Instruction Fuzzy Hash: D5B1D174E04228CFDB64CFA9D984B9DBBF2BB4A304F1490AAD809AB340DB745985CF51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2e9902765bcb96f48aa88c7c3a2ec8416b27a3a062f218f1903eb5545da114c5
                        • Instruction ID: 7e93e8871457a5fcd84bf65e3a9a200aed40af635ccdce5981202d702fe3234f
                        • Opcode Fuzzy Hash: 2e9902765bcb96f48aa88c7c3a2ec8416b27a3a062f218f1903eb5545da114c5
                        • Instruction Fuzzy Hash: 6B81C174D01218DFCB14DFE5D984AEDBBB2FF8A301F208569D405AB264EB759A86CF40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7060f36eaae90a600162bc9d14b3cfb6afdcfdf687f456a48f964a52fdcdaa0c
                        • Instruction ID: 626eea362256ddb6322e5776a6a72c9f3a6598bb356582b98312eba591fb9299
                        • Opcode Fuzzy Hash: 7060f36eaae90a600162bc9d14b3cfb6afdcfdf687f456a48f964a52fdcdaa0c
                        • Instruction Fuzzy Hash: 7B818E78E41218CFCB54DFA5D984A9CBBB2FF89305F6081AAD409A7254DB719E86CF10
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d74c4ac9e066575d2511d6b73ec4a88bead2bd6ca3a5bfc8eb82c82f24e6bcf8
                        • Instruction ID: 028982f80ec314ca6cfe77c49c05b60088a52b6102063bc27f83f70646648a4c
                        • Opcode Fuzzy Hash: d74c4ac9e066575d2511d6b73ec4a88bead2bd6ca3a5bfc8eb82c82f24e6bcf8
                        • Instruction Fuzzy Hash: C371AD78D00218CFDB18DFA5D9486EDBBF2FF89305F20852AE419AB294EB745946CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46545c6658342c488a7aafbb57db15aaf6a406ea26c51015e3f3fc233dd1d9d6
                        • Instruction ID: 5dcce7dbdd116adb3e52fc78fce9186dc61874f65392a9b4dd94d4b65274dd37
                        • Opcode Fuzzy Hash: 46545c6658342c488a7aafbb57db15aaf6a406ea26c51015e3f3fc233dd1d9d6
                        • Instruction Fuzzy Hash: B771AF78D41218CFDB14DFA5D584ADCBBB2FF89305F60816AD809A7254EB71AA86CF10
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 980e941a659b4d1e2feaeed35c2a9985aa50f1161b47c8a3eed17c43ea46ab9f
                        • Instruction ID: 8b721afbc660e874c782dc0f7b6805e5feb33328f71b83d3401d7d0a4b99c861
                        • Opcode Fuzzy Hash: 980e941a659b4d1e2feaeed35c2a9985aa50f1161b47c8a3eed17c43ea46ab9f
                        • Instruction Fuzzy Hash: 3D61B174D01218CFCB14DFA5D984AEDBBF2FF8A305F20816AD809A7254EB719986CF40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 936b29f2a85a40efe21a50c13f45fc9c5573d283f0c9bf3097f3db8819b6dc20
                        • Instruction ID: 1097a551e7fb49f812548e1746577b956fa92ba5e0036d7e80aee7fd37e57a69
                        • Opcode Fuzzy Hash: 936b29f2a85a40efe21a50c13f45fc9c5573d283f0c9bf3097f3db8819b6dc20
                        • Instruction Fuzzy Hash: 3751D278E01208DFDB14DFA8D580A9DBBB2FF89304F249169D409AB355DB35AD82CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76e8e2e66dc73b6a77d7a837d663ad8595e45c665c29c8eb2f6d121cb351e7c2
                        • Instruction ID: 94f9c4768bc5c966348ed7254bbc7c779ae6cff652fd7fcc2540b44f0832282e
                        • Opcode Fuzzy Hash: 76e8e2e66dc73b6a77d7a837d663ad8595e45c665c29c8eb2f6d121cb351e7c2
                        • Instruction Fuzzy Hash: EE51A278E01218DFCB14DFA9D544ADCBBF6FF89305F20812AD805AB254DB759946CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3a2ffce15221b6e9e627dc44e8fda9326879fe590adc0ac02386020244cc6b3f
                        • Instruction ID: ce3515f9ddc1dcde1a01d1adb916c65a8789fb844d01382d444991ec2165e74a
                        • Opcode Fuzzy Hash: 3a2ffce15221b6e9e627dc44e8fda9326879fe590adc0ac02386020244cc6b3f
                        • Instruction Fuzzy Hash: F3514730E402199FDB28DFB5C840A9EBBB6BF89305F10D4A9C818BB350DB31A946CF51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d0f54823f3fcebb35434a926dc3d1381c07de38b31bf585d2723866239dd2a33
                        • Instruction ID: 8e163491312c1beba888802d21166e9408fbbbe96cbf91c9c9ebdf853b0a4de6
                        • Opcode Fuzzy Hash: d0f54823f3fcebb35434a926dc3d1381c07de38b31bf585d2723866239dd2a33
                        • Instruction Fuzzy Hash: 0C51B274D00218DFCB04DFA9D584ADCBBF2FF89305F24812AE809AB254DB75A946CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9d53f97578f3f1b1c745e0171b5992a94951053645b8b38666358cf1a2858a7e
                        • Instruction ID: 2ceac8d380371e0211867a1a2a64ae208ad3f0b182f6880d8dd643f219572c29
                        • Opcode Fuzzy Hash: 9d53f97578f3f1b1c745e0171b5992a94951053645b8b38666358cf1a2858a7e
                        • Instruction Fuzzy Hash: 8441E331F441599FDB05DFB994506EEBBB6EFC9310F28C56AD508AB244CB348C46CBA4
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 24d29be3b353df7b0719a0370d28c4466b5290b83432a655cc721bfddd0b0ae8
                        • Instruction ID: 71ee6371c5fb9d234e9be91a9e1ca1e786e37cf5d4cf8079e6b618fdc8143558
                        • Opcode Fuzzy Hash: 24d29be3b353df7b0719a0370d28c4466b5290b83432a655cc721bfddd0b0ae8
                        • Instruction Fuzzy Hash: 3941D174E052188FDB08CFA9D9906DDFBF2BF89300F14916AE419BB254DB34688ACF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e5f24c54a2b24e79ad9946bff1460623f52d3b364d31cdf858e1cb7d7f92c6f2
                        • Instruction ID: cbeec4923d08c67b25d158741cde1d988150344a9224b20848669e48feabd418
                        • Opcode Fuzzy Hash: e5f24c54a2b24e79ad9946bff1460623f52d3b364d31cdf858e1cb7d7f92c6f2
                        • Instruction Fuzzy Hash: 8741D2B5D01218CFDB28CFA6D8447DDBBB2AF89304F2484AAD418A7251DB355986CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1962ffa6af4a3109b34cfcbefd21f36d1046f7a28bb4d84fa28579ddbbed692a
                        • Instruction ID: 17f82f0c3921b9cd6c56a091b462ebb8e3e6d48eaf19969fbe4a290d451f55a3
                        • Opcode Fuzzy Hash: 1962ffa6af4a3109b34cfcbefd21f36d1046f7a28bb4d84fa28579ddbbed692a
                        • Instruction Fuzzy Hash: D131BC75E012099BDB04CFAAD984ADEFBF2EB89310F14912AD408B7254DB349986CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45321535573e23fc47eb8165dbb8512589fce5d1136cac6fe1a9ade36abdf0e8
                        • Instruction ID: 1bf58a426a6b16fca73c5e0a7484a39cb172db2afa487c0d1efbeef00bfb109c
                        • Opcode Fuzzy Hash: 45321535573e23fc47eb8165dbb8512589fce5d1136cac6fe1a9ade36abdf0e8
                        • Instruction Fuzzy Hash: D031F274D012588FDB18CFA5C884AEDBBB2BF8A300F20942AD81ABB254DB305945CF44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 802cb76f97099c52a03a2884fa48fa74060f7ec0720c9c3d713f3129bb438afb
                        • Instruction ID: a884492a60372b459e448163b157daa6dc5b8593899cf7cc47cf0a0d0ea51c89
                        • Opcode Fuzzy Hash: 802cb76f97099c52a03a2884fa48fa74060f7ec0720c9c3d713f3129bb438afb
                        • Instruction Fuzzy Hash: C831F175E042189FCB08DFAAD484AEEBBF2BF89305F04902AE419B3350DB745A45CF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab1a154a630e396fdbeb8954722ab1cd1d0204bde62286d38da3396a275342b9
                        • Instruction ID: 9e795b9c6352b65bcf84ee93c92ff99f0bf27839e77aadd98b1204a85c2ccbc2
                        • Opcode Fuzzy Hash: ab1a154a630e396fdbeb8954722ab1cd1d0204bde62286d38da3396a275342b9
                        • Instruction Fuzzy Hash: 8A31E075E012189FCB08DFAAE444AEEBBF6BF89305F04912AE415B3350DB745A85CF94
                        Memory Dump Source
                        • Source File: 00000001.00000002.1862642816.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_5e20000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0c6b47ad3dc434e185136cb37bd0e1cc585099045272e42f020803f9db9a2633
                        • Instruction ID: 25e6c3dbd004939bac497ce70182850edc5e5d10f73c7c049c292c736f743778
                        • Opcode Fuzzy Hash: 0c6b47ad3dc434e185136cb37bd0e1cc585099045272e42f020803f9db9a2633
                        • Instruction Fuzzy Hash: 62310274E04219DFCB04CFAAD884AEEBBF2BF88300F14D569D459A7255E7345A45CF60
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 56e70a75f7b4ffbc863a5b391e80e672c29915bb27662b532727c7f6b5dbc276
                        • Instruction ID: 3ae77a012470d89a4781c8129a6d8b0071a9e574fbf07428cb8de4cdb0f655d4
                        • Opcode Fuzzy Hash: 56e70a75f7b4ffbc863a5b391e80e672c29915bb27662b532727c7f6b5dbc276
                        • Instruction Fuzzy Hash: 9931A2B5E002199FCB05DFA8D494AEDBBB2FF89300F10816AE515A7364DB749941CF61
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6fd9dd5d4a08d312aea6127c3386df16d2c0a23811470b92e97451fd1fea5cd0
                        • Instruction ID: 03f88ea82f87f396dd7058bf8bc12887e47a7749788d293c700c5f28cbfdc231
                        • Opcode Fuzzy Hash: 6fd9dd5d4a08d312aea6127c3386df16d2c0a23811470b92e97451fd1fea5cd0
                        • Instruction Fuzzy Hash: 6A311875E046988FDB18CFAAC9406DDFBB2AF8A300F18C16AD418BB255DB34594ACB54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1a1c70a4da79802a071777a12f7e1fda664fc19ae4f62f0e260f7113092c07b4
                        • Instruction ID: e47c1308f0989d2cf76085794e8eaae0f31f08b1f1f888e7d670baeb598b1792
                        • Opcode Fuzzy Hash: 1a1c70a4da79802a071777a12f7e1fda664fc19ae4f62f0e260f7113092c07b4
                        • Instruction Fuzzy Hash: E7310678E11218DFDB04DFA8E590ADDBBB2FB8A314B64842AD405BB354CB345D52CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3cc279cd5c85f63a1ebbe98f300531f1d4985b11f7649f5914c7f0b2221ff2cf
                        • Instruction ID: d942ec4466617ffeb963c2c66f08345063e862e43d183f1f160e1e3ffd7a8ccf
                        • Opcode Fuzzy Hash: 3cc279cd5c85f63a1ebbe98f300531f1d4985b11f7649f5914c7f0b2221ff2cf
                        • Instruction Fuzzy Hash: C3311478E11218DFDB04DFA8E490AEDBBB2FB8A305B54852AD405BB364DB359C42CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c184f73df411ba0676957b1c04c72a9c827f28e9829aa14721ac53a2b48ca926
                        • Instruction ID: 830f14d1670327a03adb6d92f75ee60b6426b3aeebc98e87624439eea5ffa02b
                        • Opcode Fuzzy Hash: c184f73df411ba0676957b1c04c72a9c827f28e9829aa14721ac53a2b48ca926
                        • Instruction Fuzzy Hash: 7E310578E11218DFDB04DFA8D490ADDB7B2FF8A304B20812AD405A7354DB34AC52CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 775a52a59d14ec4bb1997f6672c5267e35254c8bab1401f151e348b611e0d61f
                        • Instruction ID: b0704f472647d371ca496ecb8b93db67ca4b791205d1a27ea0ced44654cae622
                        • Opcode Fuzzy Hash: 775a52a59d14ec4bb1997f6672c5267e35254c8bab1401f151e348b611e0d61f
                        • Instruction Fuzzy Hash: 66310578E11218DFDB04DFA8E490A9DBBB2FF8A305B50812AD405B7354CB35AC42CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6336016be077fdea60a0e3c35fa75afbfb0ad3e2c4c442813de1195b4851da6e
                        • Instruction ID: 8383cac2d31765eade07388b45a4ef9dfeed596fd471549604a63ed536c2368b
                        • Opcode Fuzzy Hash: 6336016be077fdea60a0e3c35fa75afbfb0ad3e2c4c442813de1195b4851da6e
                        • Instruction Fuzzy Hash: 6931E478E11218DFDB04DFA8E490A9DBBB2FB8A304B50852AD405B7354DB35AC52CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b77ba4bb2e6343dc1a0043b2ca94e8a9c99ccc35165e5ee79965901225f438d2
                        • Instruction ID: 08a887099f1246ee2f2df83100fa8b17ea29566f2e0e4f6777259e6c936b0d13
                        • Opcode Fuzzy Hash: b77ba4bb2e6343dc1a0043b2ca94e8a9c99ccc35165e5ee79965901225f438d2
                        • Instruction Fuzzy Hash: EC310438E11218DFDB04DFA8D480A9DBBB2FB8A304B10812AD405B7364CB35AC52CF54
                        Memory Dump Source
                        • Source File: 00000001.00000002.1862642816.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_5e20000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 22795abece607c0414df5a7216bdb3c215d42c9490e4823f661592b70d772603
                        • Instruction ID: f4529950a612f5faf16bc27cb30ac4f201f19079886fa88060331a4f999d4200
                        • Opcode Fuzzy Hash: 22795abece607c0414df5a7216bdb3c215d42c9490e4823f661592b70d772603
                        • Instruction Fuzzy Hash: 8631E1B4D0021AEFCB44CFA9E584AEDBBF1BB88304F14906AD455B7290EB345A55CF61
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d721c4f58a99ca3ee793b029ecdf930b6308911958ba5481ab46eb091a5d9b96
                        • Instruction ID: 94ca0267deeb85d2909beb8f45b13243688c1c07f15e226afb1fe602106053ee
                        • Opcode Fuzzy Hash: d721c4f58a99ca3ee793b029ecdf930b6308911958ba5481ab46eb091a5d9b96
                        • Instruction Fuzzy Hash: AE314B71D052588FDB05CFAAC9142CDBFF1AF8A310F0480AAD415AB2A5D7741A0ACB51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1862642816.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_5e20000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 85b7b4ca567df66f3b9d4502278d19cb7ec8b98397c01dc06a359874647af127
                        • Instruction ID: 592abe8509bdbd399524f1df3f1766162f6dff2c609647c40ba1fdb573b0137c
                        • Opcode Fuzzy Hash: 85b7b4ca567df66f3b9d4502278d19cb7ec8b98397c01dc06a359874647af127
                        • Instruction Fuzzy Hash: D631D2B4D0021AEFCB04CFA9E584AEDBBF1BF88304F14902AD415B7294DB745A51CF61
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cb9bd2abf42ec160325917662cb652076140716487a8f444b89ea1530c68ae0f
                        • Instruction ID: a25344c61139a30a73bc9c1184a95a13b253792734952272539c74ee60923584
                        • Opcode Fuzzy Hash: cb9bd2abf42ec160325917662cb652076140716487a8f444b89ea1530c68ae0f
                        • Instruction Fuzzy Hash: A3210330C01219EFCB15DF91D848BDDBBB5BF4A305F018468E519AB260DBB16A89CF80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a9104b9497bda4f7add0ff91e31774758dceeceee62233a16fa2ecf6fb926bde
                        • Instruction ID: a9c64831ec3700ba68c7a7af84c81acaa535c92936ae7d9e42c60bdf34542cfc
                        • Opcode Fuzzy Hash: a9104b9497bda4f7add0ff91e31774758dceeceee62233a16fa2ecf6fb926bde
                        • Instruction Fuzzy Hash: 9321A934E00209CFCB04EF75EA589AEBB72FF8A306B109524D41AB76A4DF742946CF44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5a6d88a41a96bbbbffdf21ebc9f57a17e5495791ac78c2810486b2caa0ed82c1
                        • Instruction ID: 6cf33e12bbaacdf1dfb6b114052df3200403e7cf20568e516f11d3981dc217e6
                        • Opcode Fuzzy Hash: 5a6d88a41a96bbbbffdf21ebc9f57a17e5495791ac78c2810486b2caa0ed82c1
                        • Instruction Fuzzy Hash: E021D575E012588FDB18DFEAD9447DDBBF2AF89301F14C06AD405AB258DB741A4ACF40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d57a0eff620f633eb5ef3665e6a9550386b194a5951db907b5e90ee8617eb2b
                        • Instruction ID: 48a7e6fd05cab029b1b9fe2993c8dd634aee1e489de83f8b7de1f0afe11079d8
                        • Opcode Fuzzy Hash: 6d57a0eff620f633eb5ef3665e6a9550386b194a5951db907b5e90ee8617eb2b
                        • Instruction Fuzzy Hash: D421E274C40219DFCF04DF90E948ADDBBB5FF4A305F105529E406BB2A4DBB16A49CB80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 086a422a95f9e7952561c7ec2491a4ced3c15b511fb28c8072f757a7836f4964
                        • Instruction ID: ef68f782afaf700f853f2f196b6cfd0bb53643551a96c5e3977915e8acfdab72
                        • Opcode Fuzzy Hash: 086a422a95f9e7952561c7ec2491a4ced3c15b511fb28c8072f757a7836f4964
                        • Instruction Fuzzy Hash: D421F475E01218DFDF28DFAAD844ADDBBB2FF89305F04812AD404AB254DB74190ACF40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e2c7910d2c4d1644a7da929fdc8f61c7cc04e00795ccc62f98b54b27783602b8
                        • Instruction ID: 6c31881c986b7a7b4c809817fe2df78348d702f95e66ce4a7e041ab0b0a4f80c
                        • Opcode Fuzzy Hash: e2c7910d2c4d1644a7da929fdc8f61c7cc04e00795ccc62f98b54b27783602b8
                        • Instruction Fuzzy Hash: D2215875E002188BDF18DFE9D5447EDFBB2EF89311F048169D405AB289DB74194ACF50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b4844735c1fb2d249398b2e688abe8e60749bd716a86f381482ae18561da4f42
                        • Instruction ID: c22c2a23817275587af683622efa8eb62267a2fcf18c298517400ba8fec783f7
                        • Opcode Fuzzy Hash: b4844735c1fb2d249398b2e688abe8e60749bd716a86f381482ae18561da4f42
                        • Instruction Fuzzy Hash: B1213379E002588BDF18CFAAD9446DDBBB2EF8A301F14813AD409BB354DB741A4ACB51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 18f358ea4ac9431bd723705fcc63ef3911f27fcdb5acc27e53851fcd9ba31fb2
                        • Instruction ID: e740f85cc34b74dd0940fedb7a1c19feaee500aafa2d45870d44d99e5771bd7f
                        • Opcode Fuzzy Hash: 18f358ea4ac9431bd723705fcc63ef3911f27fcdb5acc27e53851fcd9ba31fb2
                        • Instruction Fuzzy Hash: A0115BB4E452489FDB05CFB9C8905AEBFF1AF4A310F1481AAD445EB2A2D7305A02CF51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30d4d726320fea8ef4124a8d2e5c7b6ed1acb766cbf12a682edf5d7e07a9e001
                        • Instruction ID: 99525db7dba93fe9d8215985d268495fb675fab07a482eecd14e6770ef753201
                        • Opcode Fuzzy Hash: 30d4d726320fea8ef4124a8d2e5c7b6ed1acb766cbf12a682edf5d7e07a9e001
                        • Instruction Fuzzy Hash: 01211075E002588FDF18DFEAD9847DDBBB2EF89301F04802AD804AB298DB74594ACF40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9b7975322a858ab830d1290fea756b650b6aa893e066770d63f02afb71125609
                        • Instruction ID: 8b04b790a3f0663cfe90e4febf55a2e897ff27154d00622c3328e9a5c48ad4bd
                        • Opcode Fuzzy Hash: 9b7975322a858ab830d1290fea756b650b6aa893e066770d63f02afb71125609
                        • Instruction Fuzzy Hash: AA21E475E00218DFDF18DFAAE9446DDFBB2FF89301F04812AE809A7254DB745A4ACB50
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 89b06c8629dc9127250be0b590e8a8ef9bbba882b57a01b601a5ee6b9f1186f9
                        • Instruction ID: 5f6c22dcb2e576d95c78a3f0f410f4dda8021e996d41b82bbe0e97a7f40c3b9c
                        • Opcode Fuzzy Hash: 89b06c8629dc9127250be0b590e8a8ef9bbba882b57a01b601a5ee6b9f1186f9
                        • Instruction Fuzzy Hash: B321A2B8D45218DFCB58CFA5D888AADFBB1BF49314F109829E829A7240D7345892CF44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5216ebc19b63a4379e11074c62ed5495e4b609bbd489bdbb7f0ccfb5bc53b475
                        • Instruction ID: 2c0cacdfb9a319fd88ec09e7958f03ea8acf8bcc3e03e444a2db982027fe43e7
                        • Opcode Fuzzy Hash: 5216ebc19b63a4379e11074c62ed5495e4b609bbd489bdbb7f0ccfb5bc53b475
                        • Instruction Fuzzy Hash: 9D11F731D02219AFDB14DFA5D5587EEBF75BB4A309F004469E5157B281DBB0158ACF80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 917e84a1c7fa4645623520e11eb4f12d5e64310bd0aaeea1dcca9a3e998f7167
                        • Instruction ID: 1dabe4809b8e0ede300ec91788b5ba1d6b410b906efad0614965d12ee699eeff
                        • Opcode Fuzzy Hash: 917e84a1c7fa4645623520e11eb4f12d5e64310bd0aaeea1dcca9a3e998f7167
                        • Instruction Fuzzy Hash: CE012278E402488FCB44DFA8D884AEDB7B1BB8E300F009025D805AB361CB35AA41CBA5
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 142a0b63c636b2e3511aea90f68f1801b6fe9027952494e3e984d6755a285f95
                        • Instruction ID: 130be04c90aec8f3732f4d838bff4a5da6ef5d162e8e043a169777010e234bb3
                        • Opcode Fuzzy Hash: 142a0b63c636b2e3511aea90f68f1801b6fe9027952494e3e984d6755a285f95
                        • Instruction Fuzzy Hash: 87018634E042089FCB40CFB8E094A9DBFF0EB8A204F1581AAC409E7311DB309E82CF01
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46eccdc8ce08a1a1feb97635d15eaa246cb349c8a8cf2a8c7963594b716907e1
                        • Instruction ID: ea70a69d7e8d3511c55ed662e3832b9b2683e9dbc59ae117aae23eb94b2324d0
                        • Opcode Fuzzy Hash: 46eccdc8ce08a1a1feb97635d15eaa246cb349c8a8cf2a8c7963594b716907e1
                        • Instruction Fuzzy Hash: B101A5B4E402099FCB44DFA9C584AAEBBF1BF49301F1080A9D819A7350DB705A41CF51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 083e5f3c15505554481e88d9ed7e14ac30b26f1555633ef4eacba32431b56798
                        • Instruction ID: ac47e7676daf538707e4820bcd3cb369b3d51fe5bb431cd797e24c6a2111ecd8
                        • Opcode Fuzzy Hash: 083e5f3c15505554481e88d9ed7e14ac30b26f1555633ef4eacba32431b56798
                        • Instruction Fuzzy Hash: D30162B1D0D3C49FC742CFB495A5698BFB0AB0B210F1A41D7C484DB2A3D6344E46CB12
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e8045b497ea02a63369cc362a79293c470863995aa85bed01e8dd1cd074d387b
                        • Instruction ID: fcd5262b788a6a06692ce9a2a0c1a1f4211f15179c7da8fcd2b890d7e008b62f
                        • Opcode Fuzzy Hash: e8045b497ea02a63369cc362a79293c470863995aa85bed01e8dd1cd074d387b
                        • Instruction Fuzzy Hash: 2B019E78E41245DFCB01DF78E644789BBF1F745308F148595C804A7361E7745E99CB80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e8e2c2171683fc0105f623a3ff0bfe4b082c144ba9ddbf018ac8ae7ccdf24071
                        • Instruction ID: 5c4d1e46f81d95ab9e123057f1147bb50971919006695f73cabe9bfe2ffd39f6
                        • Opcode Fuzzy Hash: e8e2c2171683fc0105f623a3ff0bfe4b082c144ba9ddbf018ac8ae7ccdf24071
                        • Instruction Fuzzy Hash: E9019E78D84229CFCB68DF21C8597ADBBB1BB0A305F1058AAD41AB3241CB744AC4CF44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7d92404898c5c652d24b6aad2424403b537740f979633b64834ccc72f2103ce1
                        • Instruction ID: 20a3b6d5d5a78b777f71474120784ce59b681f6dba75d83fcd76dc11ba90ebb5
                        • Opcode Fuzzy Hash: 7d92404898c5c652d24b6aad2424403b537740f979633b64834ccc72f2103ce1
                        • Instruction Fuzzy Hash: F8016D38E50245EFCB40DF68E644B89BBF1F784308F508664D904A7365EB749E95CB80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a13dcc1310a8abff422ae45655214f4d5673084cc2600ca469e2628746fedf03
                        • Instruction ID: 53c4d8c23ae4657dacd56b6f2865f5d54ba933712cd02bf40fc4c4433998b888
                        • Opcode Fuzzy Hash: a13dcc1310a8abff422ae45655214f4d5673084cc2600ca469e2628746fedf03
                        • Instruction Fuzzy Hash: 79F01D38E40208EFC744DFA9E554A5DBBF0EB89305F5085A9D418A3350DB309E82DF45
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5de8c5bf6ab91a6d6d8425815c6389e20cf116197e3169f49350a13ac8ff7866
                        • Instruction ID: a3c557dbbc036b9db7209b6e552a5a2aeafc1f0f047d1cde24b31bb667ac5073
                        • Opcode Fuzzy Hash: 5de8c5bf6ab91a6d6d8425815c6389e20cf116197e3169f49350a13ac8ff7866
                        • Instruction Fuzzy Hash: CAF0CF78D45208CFDB28DFA2D4487ADBBB0AB0E311F604829E426B7291CB740891CF08
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4325272e714751dc91e1e12a2117cc048dc75af2493c4dbcf518cf556a40d362
                        • Instruction ID: cd07a5feeff5040f5746fabbec0311d20a55ea2a2b9b7d87eb9919d65f048ec4
                        • Opcode Fuzzy Hash: 4325272e714751dc91e1e12a2117cc048dc75af2493c4dbcf518cf556a40d362
                        • Instruction Fuzzy Hash: 71E0D8708953858FC7219B35B45D6FABFB4FB0B312B491C99F44983802DB60099BDF41
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 058d474b8ddbff414311a899355b300dc6aa9fe76b504a6d1d04c2e563d5178c
                        • Instruction ID: 1f5f775b3a2095372e74bdfd05fb41544e0db784d8726f9698b2f92f18e896fe
                        • Opcode Fuzzy Hash: 058d474b8ddbff414311a899355b300dc6aa9fe76b504a6d1d04c2e563d5178c
                        • Instruction Fuzzy Hash: 0FF0E5B5E85208EFC705DFB5D640A89BBF9FB47304B408995D40597250DB325F01CB40
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5dad71a56eb724281e490363c7c63367e44b24f41e1d3bab410a4f57c31f36fd
                        • Instruction ID: c14d15a3481f836b0d71f6f1268216c60ac3b31389e69df171f0b922f6c62955
                        • Opcode Fuzzy Hash: 5dad71a56eb724281e490363c7c63367e44b24f41e1d3bab410a4f57c31f36fd
                        • Instruction Fuzzy Hash: 1EE0D83298A3845FC301DFA8EC66B897FB49F07314F0804C6D244DB1B2DAB45415D766
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9aa5deb8ff83c8870352bcfab39165a29c2d69c13eb248acd4e89bff59dd3f2a
                        • Instruction ID: a07977d5fb1b05fee3698d2afd1d65608f32692dc0b7f91e14daec5bac6cd003
                        • Opcode Fuzzy Hash: 9aa5deb8ff83c8870352bcfab39165a29c2d69c13eb248acd4e89bff59dd3f2a
                        • Instruction Fuzzy Hash: 88E0DF308562098FC700ABB2A15C26ABBB8FB0F32BB045880E40983512EFB00805CA10
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 07b658a8e471cb74b6c290e5982b62a4a3194b4a3a6df175b06d7df3334d8b00
                        • Instruction ID: 0f8c7ca317ab67c55a63c2f72ac8d97eda96da74a6f78d6b554a57a2cf81b462
                        • Opcode Fuzzy Hash: 07b658a8e471cb74b6c290e5982b62a4a3194b4a3a6df175b06d7df3334d8b00
                        • Instruction Fuzzy Hash: 83E09230555305DFC311BF65A55C6667BB8EB07302B441D86E40993151EB715560CB52
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0104d30d424bafd07e4ab899bc3c87675bda31075af8df055c7ecb5fce2e9d8
                        • Instruction ID: 41c9c466438d7371ee5666c203da8edd3bc912417888b4b848c64913172fe1d5
                        • Opcode Fuzzy Hash: b0104d30d424bafd07e4ab899bc3c87675bda31075af8df055c7ecb5fce2e9d8
                        • Instruction Fuzzy Hash: E0E0C9B8C9421ACFDB28DF21D8597ADFAB1AB0E305F105C99D02A66241C7740AC4CF48
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a0895f97435cbcd6da5093b2642976feed1026f1ffd2ef7b00a1bed557417b5b
                        • Instruction ID: af3a0d2de2a88eb4e955b912c809836444215e4c31d447fe09bd8ccac79fc366
                        • Opcode Fuzzy Hash: a0895f97435cbcd6da5093b2642976feed1026f1ffd2ef7b00a1bed557417b5b
                        • Instruction Fuzzy Hash: E2E0AE74C9422ACFDB39DF61C9197AEBA70BF0A305F0098AAD126A2140CB744AC4CF59
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fcbcaae396ca2bc98398c5fbdccc208c77891053e034ccd80568e7e8bb274739
                        • Instruction ID: 36a69ba52940b5a7142143cd5540df0d5dceb061143778b775a641251cd54f08
                        • Opcode Fuzzy Hash: fcbcaae396ca2bc98398c5fbdccc208c77891053e034ccd80568e7e8bb274739
                        • Instruction Fuzzy Hash: C6D02B70C8D3449FE315DAB158016D4BB78E707336F9401CAD44487142D7250543C663
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6187179509b7dce1aef934dce71963cf5e7ff88c499f10dc1f2a7ab801c4c668
                        • Instruction ID: 4e0898ac0f39cc018f077957d32563c1b024be5c7c3e4545b041cc724cfd5a66
                        • Opcode Fuzzy Hash: 6187179509b7dce1aef934dce71963cf5e7ff88c499f10dc1f2a7ab801c4c668
                        • Instruction Fuzzy Hash: 4FE0ED34C95209CFDB14DFA0C5597BEBB70AB0E711F646C29D012B7145C7744988CB59
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d2a9d7c6a7dac69d01593459b5ce94b63cab0173028a33db65a17400beef2396
                        • Instruction ID: 87ee9b2147ebe90595f716f532caf28aba1a7ecf5308f1b4bee18eb43da72c06
                        • Opcode Fuzzy Hash: d2a9d7c6a7dac69d01593459b5ce94b63cab0173028a33db65a17400beef2396
                        • Instruction Fuzzy Hash: 98E0ED74C85219DFDB28DF91D5587AEFBB0AB0A311F105C25D022B6150CB740995CF49
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 90854943dc051a0ef3a614bcc2c3da7aae51e93db674c4732f516c27262794bc
                        • Instruction ID: 82d6f53f95da28006248a3e5fb5e33da736250590f5cc325f335a0994fc2b6fa
                        • Opcode Fuzzy Hash: 90854943dc051a0ef3a614bcc2c3da7aae51e93db674c4732f516c27262794bc
                        • Instruction Fuzzy Hash: 01E0C270A893848FC3129AA56805699FF789707210F4846CED44897153D6244946C7A3
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa2a47f7345206a3b2cb313bd991f10357aa5ee1eb510604739d5d7bbc24753b
                        • Instruction ID: a482f4b2cacba21cfec7479d2566fe96f63f7db2fcd0853809255ac4980a92a0
                        • Opcode Fuzzy Hash: fa2a47f7345206a3b2cb313bd991f10357aa5ee1eb510604739d5d7bbc24753b
                        • Instruction Fuzzy Hash: 19E04F74E00209EFC744EFA8E544B5DFBF4EB49301F5081A9980893390EB309E81DB85
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7b82f91e375c735c39f46000964122a5244dae8fd5ee831d731d2867626bdd12
                        • Instruction ID: 988105248b8b5e42d76dca810f4770558f50f7459a52a5738f169ec85e04fc8b
                        • Opcode Fuzzy Hash: 7b82f91e375c735c39f46000964122a5244dae8fd5ee831d731d2867626bdd12
                        • Instruction Fuzzy Hash: 6CD05B30555305DFC3107F65B55C66A7BBCEB0B317F402D45E40D53544EFB10450CA56
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 82f47954cf10cd4fcb672db23f1e3967fdaed63e0863a4e11a5f89f3b2faf425
                        • Instruction ID: ba0d8d1d28a27fbcae4993eb808cd000012fc8b22da17922b0b420a25a4baaf0
                        • Opcode Fuzzy Hash: 82f47954cf10cd4fcb672db23f1e3967fdaed63e0863a4e11a5f89f3b2faf425
                        • Instruction Fuzzy Hash: E9D05E309A120ADFC740AF66F45C66A7BF8FB0B317F802C64F40D82900DFB049A5CA44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6c84dfc6609744dbf09d3599ac08595093a6eaf4d526421e09bd3fafcb2e46d5
                        • Instruction ID: f045092514ffabaaf8031cf615f9a8452175c18c6e54d2fcc2271752daa407f0
                        • Opcode Fuzzy Hash: 6c84dfc6609744dbf09d3599ac08595093a6eaf4d526421e09bd3fafcb2e46d5
                        • Instruction Fuzzy Hash: 41E08678E81208DFC700EFB5E604A5DB7F9EB46305F4099A8D80593250DB715F40DB80
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 19f702f9bf6670eb2df4256e799a15f75f47e1dd2aec065590460e9214308b9b
                        • Instruction ID: 7a04a737505abcc76dbdddcf1b6d88d0ed8455cccff12439dbef1c5c8ae7bf8a
                        • Opcode Fuzzy Hash: 19f702f9bf6670eb2df4256e799a15f75f47e1dd2aec065590460e9214308b9b
                        • Instruction Fuzzy Hash: 9ED0173086120A8FC644BFA6A25C62ABB78FB0B32BF406C44B90D83515EFB04850CA65
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 87d8d5e6ab89df979ab3d579bd9696b3b714d1f61c20d90d86503228b79017b1
                        • Instruction ID: 974f65f06cbaef0df6fc84abec02384cb186830267a7b617a8b7d2e1a314d074
                        • Opcode Fuzzy Hash: 87d8d5e6ab89df979ab3d579bd9696b3b714d1f61c20d90d86503228b79017b1
                        • Instruction Fuzzy Hash: 14C01274EC12089BC210DEA6A404759B6ACE707315F401558E90852140DB7545919695
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab16d120fc1dc99c6e1aa73190c21d1c86be7520458fa0336944e29c827832ee
                        • Instruction ID: 0eadcb303ddbf513a5043d289b3a9c0b1f783a9b8e78b23eb194b117c5c40208
                        • Opcode Fuzzy Hash: ab16d120fc1dc99c6e1aa73190c21d1c86be7520458fa0336944e29c827832ee
                        • Instruction Fuzzy Hash: 8EC01274D81208DBC210DEA6A404759B7ACD707225F801598A90853140DB714591D6A5
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0b3c1260beb001a41d4909e827e6aacd053464f65fdbc985ac3fa1aa455535c5
                        • Instruction ID: 5dc3b4f56f47cbe06cbd42c174fc61fb2854a7a75857a0b1e46d8601206fe21a
                        • Opcode Fuzzy Hash: 0b3c1260beb001a41d4909e827e6aacd053464f65fdbc985ac3fa1aa455535c5
                        • Instruction Fuzzy Hash: 0DC08C70D812089FC710EFEAF418B69BBBCE70B32AF445598E90C63240EFB15550D6AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0oAp
                        • API String ID: 0-730047704
                        • Opcode ID: bef59c2328466773ff6e8188adf6b59300c11d1c64ba44b512085919ca8cc429
                        • Instruction ID: 7e049c06b727f177807f6ec9d3cb2a6f1847cd7849ea0095bcf369ae44f6c4a4
                        • Opcode Fuzzy Hash: bef59c2328466773ff6e8188adf6b59300c11d1c64ba44b512085919ca8cc429
                        • Instruction Fuzzy Hash: 21C1C274E00218CFDB54DFA9D884B9DFBB2BF89300F1481A9D809AB365DB349986CF51
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 71bbed252e228e72d651311ce3e71eac750016ac0475333396fa37cdf2d95803
                        • Instruction ID: 7a1b5740671f33d6107bf9e4fe25030903c000c929c6c9001f37dacf8d6629be
                        • Opcode Fuzzy Hash: 71bbed252e228e72d651311ce3e71eac750016ac0475333396fa37cdf2d95803
                        • Instruction Fuzzy Hash: FFD1E074D01218DFDB24DFA9D984B9DFBB2FF89304F1491AAD409AB255DB305A86CF10
                        Memory Dump Source
                        • Source File: 00000001.00000002.1860020895.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3130000_Insidious_protected.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce89648dd4cdccc987410bf0c7648d3cac35c66123b7fac4fdee2e360a9dd967
                        • Instruction ID: 37bc1a54160dfc29afc07ab8b7e95e41c994b637f3f49585091fd3eaad049b72
                        • Opcode Fuzzy Hash: ce89648dd4cdccc987410bf0c7648d3cac35c66123b7fac4fdee2e360a9dd967
                        • Instruction Fuzzy Hash: C6D1E174D01218CFDB24DFA9D984B9DFBB2FF89304F1491AAD409AB255DB309A86CF50